@umbra-privacy/sdk 2.0.0 → 2.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/dist/{addresses-B7HybtbJ.d.ts → addresses-BIzQplvu.d.ts} +1 -1
  2. package/dist/{addresses-CTVY1oi7.d.cts → addresses-Djkrs22V.d.cts} +1 -1
  3. package/dist/{chunk-MKNCBUFA.js → chunk-D5MWU3TV.js} +17 -17
  4. package/dist/chunk-D5MWU3TV.js.map +1 -0
  5. package/dist/{chunk-CFFLOE7D.cjs → chunk-DQ25W34A.cjs} +17 -17
  6. package/dist/chunk-DQ25W34A.cjs.map +1 -0
  7. package/dist/{chunk-YEZBTYCP.cjs → chunk-GXCRPFTT.cjs} +3 -3
  8. package/dist/{chunk-YEZBTYCP.cjs.map → chunk-GXCRPFTT.cjs.map} +1 -1
  9. package/dist/{chunk-OFDWNWCL.js → chunk-ZPSWMSXL.js} +3 -3
  10. package/dist/{chunk-OFDWNWCL.js.map → chunk-ZPSWMSXL.js.map} +1 -1
  11. package/dist/{client-DkVBHMWb.d.cts → client-BmzzZ8qS.d.cts} +5 -5
  12. package/dist/{client-V4AF6Bz9.d.ts → client-CQytBtEn.d.ts} +5 -5
  13. package/dist/common/pda/index.cjs +35 -35
  14. package/dist/common/pda/index.d.cts +7 -7
  15. package/dist/common/pda/index.d.ts +7 -7
  16. package/dist/common/pda/index.js +2 -2
  17. package/dist/constants/index.d.cts +3 -3
  18. package/dist/constants/index.d.ts +3 -3
  19. package/dist/crypto/index.cjs +2 -2
  20. package/dist/crypto/index.d.cts +13 -13
  21. package/dist/crypto/index.d.ts +13 -13
  22. package/dist/crypto/index.js +2 -2
  23. package/dist/{cryptography-D6tPDh-Y.d.cts → cryptography-BJ5sCytb.d.cts} +1 -1
  24. package/dist/{cryptography-BFSJcvi6.d.ts → cryptography-Dk1cBuym.d.ts} +1 -1
  25. package/dist/{index-BG0yjL7C.d.cts → index-Ckj9PfBk.d.cts} +8 -8
  26. package/dist/{index-ByynoyBO.d.ts → index-DAO_47xr.d.ts} +8 -8
  27. package/dist/index.cjs +252 -243
  28. package/dist/index.cjs.map +1 -1
  29. package/dist/index.d.cts +19 -19
  30. package/dist/index.d.ts +19 -19
  31. package/dist/index.js +22 -13
  32. package/dist/index.js.map +1 -1
  33. package/dist/interfaces/index.d.cts +12 -12
  34. package/dist/interfaces/index.d.ts +12 -12
  35. package/dist/{interfaces-D2NO6kDD.d.cts → interfaces-2b_ySL0r.d.cts} +2 -2
  36. package/dist/{interfaces-z_xYJlgV.d.ts → interfaces-C-N3oLgJ.d.ts} +4 -4
  37. package/dist/{interfaces-43cReBcS.d.cts → interfaces-CpZDActo.d.cts} +4 -4
  38. package/dist/{interfaces-B8xKNl_6.d.ts → interfaces-CxrUtnVG.d.ts} +2 -2
  39. package/dist/math/index.cjs +8 -8
  40. package/dist/math/index.d.cts +4 -4
  41. package/dist/math/index.d.ts +4 -4
  42. package/dist/math/index.js +2 -2
  43. package/dist/{networks-RMd3abPE.d.ts → networks-B3pArLLR.d.ts} +1 -1
  44. package/dist/{networks-yAoO8peQ.d.cts → networks-Bkl2oP0q.d.cts} +1 -1
  45. package/dist/solana/index.d.cts +7 -7
  46. package/dist/solana/index.d.ts +7 -7
  47. package/dist/{temporal-BbRaEPoO.d.ts → temporal-B3yk1YkA.d.ts} +1 -1
  48. package/dist/{temporal-oUj7iCaq.d.cts → temporal-BHMGDS-0.d.cts} +1 -1
  49. package/dist/{transaction-forwarder-5mAMTjw6.d.ts → transaction-forwarder-BODYfi-S.d.ts} +2 -2
  50. package/dist/{transaction-forwarder-C6gMUG7a.d.cts → transaction-forwarder-DwAK9whb.d.cts} +2 -2
  51. package/dist/types/index.d.cts +8 -8
  52. package/dist/types/index.d.ts +8 -8
  53. package/dist/{types-BohhvPth.d.cts → types-2UHG9wC-.d.cts} +1 -1
  54. package/dist/{types-CuKeoI19.d.cts → types-4rAlbodI.d.cts} +2 -2
  55. package/dist/{types-IMGYmlv-.d.cts → types-BYBfXNV_.d.cts} +1 -1
  56. package/dist/{types-Ca7frykr.d.ts → types-BrQv82ne.d.ts} +2 -2
  57. package/dist/{types-CW0oTT0j.d.ts → types-C42QtYXI.d.ts} +1 -1
  58. package/dist/{types-PwNLi_2k.d.cts → types-C8HrYlDv.d.cts} +2 -2
  59. package/dist/{types-C_V_CaKK.d.cts → types-CM3nVKl2.d.cts} +1 -1
  60. package/dist/{types-C_V_CaKK.d.ts → types-CM3nVKl2.d.ts} +1 -1
  61. package/dist/{types-D1jDUjfN.d.ts → types-DfmTaW3z.d.ts} +1 -1
  62. package/dist/{types-DKEDUlH9.d.ts → types-KMWXIyOY.d.ts} +2 -2
  63. package/dist/{types-CxfTIpN9.d.ts → types-gNnLmOsz.d.ts} +2 -2
  64. package/dist/{types-EKuIfxTz.d.cts → types-i26vVlXf.d.cts} +2 -2
  65. package/dist/utils/index.cjs +120 -120
  66. package/dist/utils/index.d.cts +5 -5
  67. package/dist/utils/index.d.ts +5 -5
  68. package/dist/utils/index.js +2 -2
  69. package/package.json +1 -1
  70. package/dist/chunk-CFFLOE7D.cjs.map +0 -1
  71. package/dist/chunk-MKNCBUFA.js.map +0 -1
@@ -1,8 +1,8 @@
1
1
  'use strict';
2
2
 
3
- var chunkCFFLOE7D_cjs = require('../../chunk-CFFLOE7D.cjs');
4
- require('../../chunk-TQQZGNOI.cjs');
3
+ var chunkDQ25W34A_cjs = require('../../chunk-DQ25W34A.cjs');
5
4
  require('../../chunk-5GUSMQ74.cjs');
5
+ require('../../chunk-TQQZGNOI.cjs');
6
6
  require('../../chunk-FZYWLQAF.cjs');
7
7
  require('../../chunk-LTCKPTZC.cjs');
8
8
  require('../../chunk-PK6SKIKE.cjs');
@@ -11,135 +11,135 @@ require('../../chunk-PK6SKIKE.cjs');
11
11
 
12
12
  Object.defineProperty(exports, "TOKEN_POOL_SEED", {
13
13
  enumerable: true,
14
- get: function () { return chunkCFFLOE7D_cjs.TOKEN_POOL_SEED; }
14
+ get: function () { return chunkDQ25W34A_cjs.TOKEN_POOL_SEED; }
15
15
  });
16
16
  Object.defineProperty(exports, "computeCompDefOffset", {
17
17
  enumerable: true,
18
- get: function () { return chunkCFFLOE7D_cjs.computeCompDefOffset; }
18
+ get: function () { return chunkDQ25W34A_cjs.computeCompDefOffset; }
19
19
  });
20
20
  Object.defineProperty(exports, "computeStructSeed", {
21
21
  enumerable: true,
22
- get: function () { return chunkCFFLOE7D_cjs.computeStructSeed; }
22
+ get: function () { return chunkDQ25W34A_cjs.computeStructSeed; }
23
23
  });
24
24
  Object.defineProperty(exports, "findActiveStealthPoolPda", {
25
25
  enumerable: true,
26
- get: function () { return chunkCFFLOE7D_cjs.findActiveStealthPoolPda; }
26
+ get: function () { return chunkDQ25W34A_cjs.findActiveStealthPoolPda; }
27
27
  });
28
28
  Object.defineProperty(exports, "findArciumClusterPda", {
29
29
  enumerable: true,
30
- get: function () { return chunkCFFLOE7D_cjs.findArciumClusterPda; }
30
+ get: function () { return chunkDQ25W34A_cjs.findArciumClusterPda; }
31
31
  });
32
32
  Object.defineProperty(exports, "findArciumCompDefPda", {
33
33
  enumerable: true,
34
- get: function () { return chunkCFFLOE7D_cjs.findArciumCompDefPda; }
34
+ get: function () { return chunkDQ25W34A_cjs.findArciumCompDefPda; }
35
35
  });
36
36
  Object.defineProperty(exports, "findArciumComputationPda", {
37
37
  enumerable: true,
38
- get: function () { return chunkCFFLOE7D_cjs.findArciumComputationPda; }
38
+ get: function () { return chunkDQ25W34A_cjs.findArciumComputationPda; }
39
39
  });
40
40
  Object.defineProperty(exports, "findArciumExecutingPoolPda", {
41
41
  enumerable: true,
42
- get: function () { return chunkCFFLOE7D_cjs.findArciumExecutingPoolPda; }
42
+ get: function () { return chunkDQ25W34A_cjs.findArciumExecutingPoolPda; }
43
43
  });
44
44
  Object.defineProperty(exports, "findArciumInfrastructurePdas", {
45
45
  enumerable: true,
46
- get: function () { return chunkCFFLOE7D_cjs.findArciumInfrastructurePdas; }
46
+ get: function () { return chunkDQ25W34A_cjs.findArciumInfrastructurePdas; }
47
47
  });
48
48
  Object.defineProperty(exports, "findArciumMempoolPda", {
49
49
  enumerable: true,
50
- get: function () { return chunkCFFLOE7D_cjs.findArciumMempoolPda; }
50
+ get: function () { return chunkDQ25W34A_cjs.findArciumMempoolPda; }
51
51
  });
52
52
  Object.defineProperty(exports, "findArciumMxePda", {
53
53
  enumerable: true,
54
- get: function () { return chunkCFFLOE7D_cjs.findArciumMxePda; }
54
+ get: function () { return chunkDQ25W34A_cjs.findArciumMxePda; }
55
55
  });
56
56
  Object.defineProperty(exports, "findClaimInputBufferPda", {
57
57
  enumerable: true,
58
- get: function () { return chunkCFFLOE7D_cjs.findClaimInputBufferPda; }
58
+ get: function () { return chunkDQ25W34A_cjs.findClaimInputBufferPda; }
59
59
  });
60
60
  Object.defineProperty(exports, "findConfidentialNullifierBufferPda", {
61
61
  enumerable: true,
62
- get: function () { return chunkCFFLOE7D_cjs.findConfidentialNullifierBufferPda; }
62
+ get: function () { return chunkDQ25W34A_cjs.findConfidentialNullifierBufferPda; }
63
63
  });
64
64
  Object.defineProperty(exports, "findEncryptedTokenAccountPda", {
65
65
  enumerable: true,
66
- get: function () { return chunkCFFLOE7D_cjs.findEncryptedTokenAccountPda; }
66
+ get: function () { return chunkDQ25W34A_cjs.findEncryptedTokenAccountPda; }
67
67
  });
68
68
  Object.defineProperty(exports, "findEncryptedUserAccountPda", {
69
69
  enumerable: true,
70
- get: function () { return chunkCFFLOE7D_cjs.findEncryptedUserAccountPda; }
70
+ get: function () { return chunkDQ25W34A_cjs.findEncryptedUserAccountPda; }
71
71
  });
72
72
  Object.defineProperty(exports, "findFeeSchedulePda", {
73
73
  enumerable: true,
74
- get: function () { return chunkCFFLOE7D_cjs.findFeeSchedulePda; }
74
+ get: function () { return chunkDQ25W34A_cjs.findFeeSchedulePda; }
75
75
  });
76
76
  Object.defineProperty(exports, "findNetworkComplianceGrantPda", {
77
77
  enumerable: true,
78
- get: function () { return chunkCFFLOE7D_cjs.findNetworkComplianceGrantPda; }
78
+ get: function () { return chunkDQ25W34A_cjs.findNetworkComplianceGrantPda; }
79
79
  });
80
80
  Object.defineProperty(exports, "findNullifierSetPdas", {
81
81
  enumerable: true,
82
- get: function () { return chunkCFFLOE7D_cjs.findNullifierSetPdas; }
82
+ get: function () { return chunkDQ25W34A_cjs.findNullifierSetPdas; }
83
83
  });
84
84
  Object.defineProperty(exports, "findProtocolConfigPda", {
85
85
  enumerable: true,
86
- get: function () { return chunkCFFLOE7D_cjs.findProtocolConfigPda; }
86
+ get: function () { return chunkDQ25W34A_cjs.findProtocolConfigPda; }
87
87
  });
88
88
  Object.defineProperty(exports, "findProtocolFeeVaultPda", {
89
89
  enumerable: true,
90
- get: function () { return chunkCFFLOE7D_cjs.findProtocolFeeVaultPda; }
90
+ get: function () { return chunkDQ25W34A_cjs.findProtocolFeeVaultPda; }
91
91
  });
92
92
  Object.defineProperty(exports, "findPublicClaimComputationDataPda", {
93
93
  enumerable: true,
94
- get: function () { return chunkCFFLOE7D_cjs.findPublicClaimComputationDataPda; }
94
+ get: function () { return chunkDQ25W34A_cjs.findPublicClaimComputationDataPda; }
95
95
  });
96
96
  Object.defineProperty(exports, "findPublicClaimInputBufferPda", {
97
97
  enumerable: true,
98
- get: function () { return chunkCFFLOE7D_cjs.findPublicClaimInputBufferPda; }
98
+ get: function () { return chunkDQ25W34A_cjs.findPublicClaimInputBufferPda; }
99
99
  });
100
100
  Object.defineProperty(exports, "findPublicNullifierBufferPda", {
101
101
  enumerable: true,
102
- get: function () { return chunkCFFLOE7D_cjs.findPublicNullifierBufferPda; }
102
+ get: function () { return chunkDQ25W34A_cjs.findPublicNullifierBufferPda; }
103
103
  });
104
104
  Object.defineProperty(exports, "findPublicUtxoInputBufferPda", {
105
105
  enumerable: true,
106
- get: function () { return chunkCFFLOE7D_cjs.findPublicUtxoInputBufferPda; }
106
+ get: function () { return chunkDQ25W34A_cjs.findPublicUtxoInputBufferPda; }
107
107
  });
108
108
  Object.defineProperty(exports, "findRelayerFeeSchedulePda", {
109
109
  enumerable: true,
110
- get: function () { return chunkCFFLOE7D_cjs.findRelayerFeeSchedulePda; }
110
+ get: function () { return chunkDQ25W34A_cjs.findRelayerFeeSchedulePda; }
111
111
  });
112
112
  Object.defineProperty(exports, "findRelayerFeeVaultPda", {
113
113
  enumerable: true,
114
- get: function () { return chunkCFFLOE7D_cjs.findRelayerFeeVaultPda; }
114
+ get: function () { return chunkDQ25W34A_cjs.findRelayerFeeVaultPda; }
115
115
  });
116
116
  Object.defineProperty(exports, "findRelayerPda", {
117
117
  enumerable: true,
118
- get: function () { return chunkCFFLOE7D_cjs.findRelayerPda; }
118
+ get: function () { return chunkDQ25W34A_cjs.findRelayerPda; }
119
119
  });
120
120
  Object.defineProperty(exports, "findSharedComplianceGrantPda", {
121
121
  enumerable: true,
122
- get: function () { return chunkCFFLOE7D_cjs.findSharedComplianceGrantPda; }
122
+ get: function () { return chunkDQ25W34A_cjs.findSharedComplianceGrantPda; }
123
123
  });
124
124
  Object.defineProperty(exports, "findStealthPoolPda", {
125
125
  enumerable: true,
126
- get: function () { return chunkCFFLOE7D_cjs.findStealthPoolPda; }
126
+ get: function () { return chunkDQ25W34A_cjs.findStealthPoolPda; }
127
127
  });
128
128
  Object.defineProperty(exports, "findTokenPoolPda", {
129
129
  enumerable: true,
130
- get: function () { return chunkCFFLOE7D_cjs.findTokenPoolPda; }
130
+ get: function () { return chunkDQ25W34A_cjs.findTokenPoolPda; }
131
131
  });
132
132
  Object.defineProperty(exports, "findUserComplianceGrantPda", {
133
133
  enumerable: true,
134
- get: function () { return chunkCFFLOE7D_cjs.findUserComplianceGrantPda; }
134
+ get: function () { return chunkDQ25W34A_cjs.findUserComplianceGrantPda; }
135
135
  });
136
136
  Object.defineProperty(exports, "findUtxoInputBufferPda", {
137
137
  enumerable: true,
138
- get: function () { return chunkCFFLOE7D_cjs.findUtxoInputBufferPda; }
138
+ get: function () { return chunkDQ25W34A_cjs.findUtxoInputBufferPda; }
139
139
  });
140
140
  Object.defineProperty(exports, "findVerifyingKeyPda", {
141
141
  enumerable: true,
142
- get: function () { return chunkCFFLOE7D_cjs.findVerifyingKeyPda; }
142
+ get: function () { return chunkDQ25W34A_cjs.findVerifyingKeyPda; }
143
143
  });
144
144
  //# sourceMappingURL=index.cjs.map
145
145
  //# sourceMappingURL=index.cjs.map
@@ -1,6 +1,6 @@
1
1
  import { Address } from '@solana/kit';
2
- import { R as RcEncryptionNonce } from '../../cryptography-D6tPDh-Y.cjs';
3
- import { U as U128 } from '../../types-C_V_CaKK.cjs';
2
+ import { R as RcEncryptionNonce } from '../../cryptography-BJ5sCytb.cjs';
3
+ import { U as U128 } from '../../types-CM3nVKl2.cjs';
4
4
 
5
5
  /**
6
6
  * User PDA Utilities
@@ -1110,7 +1110,7 @@ declare function findRelayerFeeSchedulePda(instructionSeed: U128, relayerAddress
1110
1110
  declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Address): Promise<Address>;
1111
1111
  /**
1112
1112
  * Derives the Program Derived Address for a confidential claim input buffer account.
1113
- * Seeds: [ConfidentialClaimProofAccount::SEED, payer_pubkey, offset]
1113
+ * Seeds: [ClaimInputBuffer::SEED, payer_pubkey, offset]
1114
1114
  *
1115
1115
  * An ephemeral buffer account that holds the Groth16 proof bytes and encrypted
1116
1116
  * public inputs required for a confidential claim instruction. Created by the
@@ -1140,7 +1140,7 @@ declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Addres
1140
1140
  declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1141
1141
  /**
1142
1142
  * Derives the Program Derived Address for a confidential UTXO input buffer account.
1143
- * Seeds: [ConfidentialUtxoProofAccount::SEED, depositor_pubkey, offset]
1143
+ * Seeds: [StealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
1144
1144
  *
1145
1145
  * An ephemeral buffer account that holds the Groth16 proof data required to
1146
1146
  * create a new confidential UTXO from an existing encrypted MXE balance.
@@ -1169,7 +1169,7 @@ declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, um
1169
1169
  declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1170
1170
  /**
1171
1171
  * Derives the Program Derived Address for a public UTXO input buffer account.
1172
- * Seeds: [PublicUtxoProofAccount::SEED, depositor_pubkey, offset]
1172
+ * Seeds: [PublicStealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
1173
1173
  *
1174
1174
  * An ephemeral buffer account that holds cryptographic proof data for the
1175
1175
  * `create_deposit_into_mixer_tree_from_public_balance` instruction.
@@ -1184,7 +1184,7 @@ declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128,
1184
1184
  declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1185
1185
  /**
1186
1186
  * Derives the Program Derived Address for a public claim input buffer account.
1187
- * Seeds: [PublicClaimProofAccount::SEED, relayer_pubkey, offset]
1187
+ * Seeds: [PublicClaimInputBuffer::SEED, relayer_pubkey, offset]
1188
1188
  *
1189
1189
  * An ephemeral buffer account that holds the Groth16 proof data for a
1190
1190
  * public-balance claim instruction (claiming UTXOs into a standard SPL
@@ -1215,7 +1215,7 @@ declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset:
1215
1215
  declare function findPublicClaimInputBufferPda(relayerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1216
1216
  /**
1217
1217
  * Derives the Program Derived Address for a public claim MPC computation data account.
1218
- * Seeds: [PublicClaimMxeMpcCallbackData::SEED, relayer_pubkey, offset]
1218
+ * Seeds: [ClaimIntoPublicBalanceV11ComputationData::SEED, relayer_pubkey, offset]
1219
1219
  *
1220
1220
  * Stores all data needed by the Arcium MPC callback handler for a public
1221
1221
  * claim instruction. Initialised in the handler and closed when the callback
@@ -1,6 +1,6 @@
1
1
  import { Address } from '@solana/kit';
2
- import { R as RcEncryptionNonce } from '../../cryptography-BFSJcvi6.js';
3
- import { U as U128 } from '../../types-C_V_CaKK.js';
2
+ import { R as RcEncryptionNonce } from '../../cryptography-Dk1cBuym.js';
3
+ import { U as U128 } from '../../types-CM3nVKl2.js';
4
4
 
5
5
  /**
6
6
  * User PDA Utilities
@@ -1110,7 +1110,7 @@ declare function findRelayerFeeSchedulePda(instructionSeed: U128, relayerAddress
1110
1110
  declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Address): Promise<Address>;
1111
1111
  /**
1112
1112
  * Derives the Program Derived Address for a confidential claim input buffer account.
1113
- * Seeds: [ConfidentialClaimProofAccount::SEED, payer_pubkey, offset]
1113
+ * Seeds: [ClaimInputBuffer::SEED, payer_pubkey, offset]
1114
1114
  *
1115
1115
  * An ephemeral buffer account that holds the Groth16 proof bytes and encrypted
1116
1116
  * public inputs required for a confidential claim instruction. Created by the
@@ -1140,7 +1140,7 @@ declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Addres
1140
1140
  declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1141
1141
  /**
1142
1142
  * Derives the Program Derived Address for a confidential UTXO input buffer account.
1143
- * Seeds: [ConfidentialUtxoProofAccount::SEED, depositor_pubkey, offset]
1143
+ * Seeds: [StealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
1144
1144
  *
1145
1145
  * An ephemeral buffer account that holds the Groth16 proof data required to
1146
1146
  * create a new confidential UTXO from an existing encrypted MXE balance.
@@ -1169,7 +1169,7 @@ declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, um
1169
1169
  declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1170
1170
  /**
1171
1171
  * Derives the Program Derived Address for a public UTXO input buffer account.
1172
- * Seeds: [PublicUtxoProofAccount::SEED, depositor_pubkey, offset]
1172
+ * Seeds: [PublicStealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
1173
1173
  *
1174
1174
  * An ephemeral buffer account that holds cryptographic proof data for the
1175
1175
  * `create_deposit_into_mixer_tree_from_public_balance` instruction.
@@ -1184,7 +1184,7 @@ declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128,
1184
1184
  declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1185
1185
  /**
1186
1186
  * Derives the Program Derived Address for a public claim input buffer account.
1187
- * Seeds: [PublicClaimProofAccount::SEED, relayer_pubkey, offset]
1187
+ * Seeds: [PublicClaimInputBuffer::SEED, relayer_pubkey, offset]
1188
1188
  *
1189
1189
  * An ephemeral buffer account that holds the Groth16 proof data for a
1190
1190
  * public-balance claim instruction (claiming UTXOs into a standard SPL
@@ -1215,7 +1215,7 @@ declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset:
1215
1215
  declare function findPublicClaimInputBufferPda(relayerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
1216
1216
  /**
1217
1217
  * Derives the Program Derived Address for a public claim MPC computation data account.
1218
- * Seeds: [PublicClaimMxeMpcCallbackData::SEED, relayer_pubkey, offset]
1218
+ * Seeds: [ClaimIntoPublicBalanceV11ComputationData::SEED, relayer_pubkey, offset]
1219
1219
  *
1220
1220
  * Stores all data needed by the Arcium MPC callback handler for a public
1221
1221
  * claim instruction. Initialised in the handler and closed when the callback
@@ -1,6 +1,6 @@
1
- export { TOKEN_POOL_SEED, computeCompDefOffset, computeStructSeed, findActiveStealthPoolPda, findArciumClusterPda, findArciumCompDefPda, findArciumComputationPda, findArciumExecutingPoolPda, findArciumInfrastructurePdas, findArciumMempoolPda, findArciumMxePda, findClaimInputBufferPda, findConfidentialNullifierBufferPda, findEncryptedTokenAccountPda, findEncryptedUserAccountPda, findFeeSchedulePda, findNetworkComplianceGrantPda, findNullifierSetPdas, findProtocolConfigPda, findProtocolFeeVaultPda, findPublicClaimComputationDataPda, findPublicClaimInputBufferPda, findPublicNullifierBufferPda, findPublicUtxoInputBufferPda, findRelayerFeeSchedulePda, findRelayerFeeVaultPda, findRelayerPda, findSharedComplianceGrantPda, findStealthPoolPda, findTokenPoolPda, findUserComplianceGrantPda, findUtxoInputBufferPda, findVerifyingKeyPda } from '../../chunk-MKNCBUFA.js';
2
- import '../../chunk-EEKF4553.js';
1
+ export { TOKEN_POOL_SEED, computeCompDefOffset, computeStructSeed, findActiveStealthPoolPda, findArciumClusterPda, findArciumCompDefPda, findArciumComputationPda, findArciumExecutingPoolPda, findArciumInfrastructurePdas, findArciumMempoolPda, findArciumMxePda, findClaimInputBufferPda, findConfidentialNullifierBufferPda, findEncryptedTokenAccountPda, findEncryptedUserAccountPda, findFeeSchedulePda, findNetworkComplianceGrantPda, findNullifierSetPdas, findProtocolConfigPda, findProtocolFeeVaultPda, findPublicClaimComputationDataPda, findPublicClaimInputBufferPda, findPublicNullifierBufferPda, findPublicUtxoInputBufferPda, findRelayerFeeSchedulePda, findRelayerFeeVaultPda, findRelayerPda, findSharedComplianceGrantPda, findStealthPoolPda, findTokenPoolPda, findUserComplianceGrantPda, findUtxoInputBufferPda, findVerifyingKeyPda } from '../../chunk-D5MWU3TV.js';
3
2
  import '../../chunk-FQX6ZYGJ.js';
3
+ import '../../chunk-EEKF4553.js';
4
4
  import '../../chunk-DD2WCK4C.js';
5
5
  import '../../chunk-CFTW5WNG.js';
6
6
  import '../../chunk-7QVYU63E.js';
@@ -1,8 +1,8 @@
1
- export { A as AltEntry, N as NetworkConfig, g as getNetworkConfig } from '../networks-yAoO8peQ.cjs';
1
+ export { A as AltEntry, N as NetworkConfig, g as getNetworkConfig } from '../networks-Bkl2oP0q.cjs';
2
2
  export { A as AlgorithmVersion, a as AlgorithmVersionSpecifierFunction, D as DEFAULT_ALGORITHM_VERSION, b as DEFAULT_NETWORK, c as DEFAULT_PROTOCOL_VERSION, d as DEFAULT_SCHEME_VERSION, N as Network, e as NetworkSpecifierFunction, P as ProtocolVersion, f as ProtocolVersionSpecifierFunction, S as SchemeVersion, g as SchemeVersionSpecifierFunction, h as assertNetwork, i as assertValidAlgorithmVersion, j as assertValidProtocolVersion, k as assertValidSchemeVersion, l as assertValidVersion, m as getDefaultAlgorithmVersion, n as getDefaultProtocolVersion, o as getDefaultSchemeVersion, p as getNetworkSpecifier } from '../versions-BRlR36EA.cjs';
3
3
  import { Address } from '@solana/kit';
4
- import '../cryptography-D6tPDh-Y.cjs';
5
- import '../types-C_V_CaKK.cjs';
4
+ import '../cryptography-BJ5sCytb.cjs';
5
+ import '../types-CM3nVKl2.cjs';
6
6
 
7
7
  /**
8
8
  * Arcium Protocol Constants
@@ -1,8 +1,8 @@
1
- export { A as AltEntry, N as NetworkConfig, g as getNetworkConfig } from '../networks-RMd3abPE.js';
1
+ export { A as AltEntry, N as NetworkConfig, g as getNetworkConfig } from '../networks-B3pArLLR.js';
2
2
  export { A as AlgorithmVersion, a as AlgorithmVersionSpecifierFunction, D as DEFAULT_ALGORITHM_VERSION, b as DEFAULT_NETWORK, c as DEFAULT_PROTOCOL_VERSION, d as DEFAULT_SCHEME_VERSION, N as Network, e as NetworkSpecifierFunction, P as ProtocolVersion, f as ProtocolVersionSpecifierFunction, S as SchemeVersion, g as SchemeVersionSpecifierFunction, h as assertNetwork, i as assertValidAlgorithmVersion, j as assertValidProtocolVersion, k as assertValidSchemeVersion, l as assertValidVersion, m as getDefaultAlgorithmVersion, n as getDefaultProtocolVersion, o as getDefaultSchemeVersion, p as getNetworkSpecifier } from '../versions-BRlR36EA.js';
3
3
  import { Address } from '@solana/kit';
4
- import '../cryptography-BFSJcvi6.js';
5
- import '../types-C_V_CaKK.js';
4
+ import '../cryptography-Dk1cBuym.js';
5
+ import '../types-CM3nVKl2.js';
6
6
 
7
7
  /**
8
8
  * Arcium Protocol Constants
@@ -3,10 +3,10 @@
3
3
  var chunkJPDF7BIT_cjs = require('../chunk-JPDF7BIT.cjs');
4
4
  require('../chunk-Y55PYKXH.cjs');
5
5
  require('../chunk-ZY3TSHMJ.cjs');
6
- require('../chunk-CFFLOE7D.cjs');
7
- require('../chunk-TQQZGNOI.cjs');
8
6
  require('../chunk-DMPMQ74B.cjs');
7
+ require('../chunk-DQ25W34A.cjs');
9
8
  require('../chunk-5GUSMQ74.cjs');
9
+ require('../chunk-TQQZGNOI.cjs');
10
10
  require('../chunk-QJAUUYZU.cjs');
11
11
  require('../chunk-ENVYYEM4.cjs');
12
12
  require('../chunk-FZYWLQAF.cjs');
@@ -1,19 +1,19 @@
1
- import { o as AesDecryptorFunction, p as AesEncryptorFunction, d as IUmbraClient } from '../client-DkVBHMWb.cjs';
2
- import { b as SubBrandedType, B as Bytes, f as U256, U as U128, S as SubSubBrandedType, a as SubSubSubBrandedType } from '../types-C_V_CaKK.cjs';
3
- import { T as PseudorandomU512DeriverFunction, a5 as Kmac256Function, x as MasterSeedBasedFieldElementDeriverFunction, N as PoseidonHashFunction, D as DailyViewingKeyGeneratorFunction, E as EphemeralMasterSeedDeriverFunction, k as EphemeralRescueCommitmentBlindingFactorDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, o as EphemeralUtxoNullifierDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, w as HourlyViewingKeyGeneratorFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, a as MasterViewingKeyDeriverFunction, C as Curve25519KeypairGeneratorFunction, z as MintViewingKeyDeriverFunction, M as MintX25519KeypairDeriverFunction, A as MinuteViewingKeyGeneratorFunction, G as MonthlyViewingKeyGeneratorFunction, d as PolynomialCommitmentFactorDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, R as RescueCommitmentBlindingFactorDeriverFunction, a1 as SecondViewingKeyGeneratorFunction, a4 as YearlyViewingKeyGeneratorFunction, r as FieldArithmetic, X as RescueCipherDeps, Y as RescueCipherInstance, $ as RescuePrimeHashDeps, a0 as RescuePrimeHashFunction, Q as PoseidonKeystreamGeneratorFunction, S as PoseidonPrfFunction, K as KeystreamCommitmentFunction, J as PoseidonDecryptorFunction, L as PoseidonEncryptorFunction, u as H2GeneratorFns, a6 as RandomNonceGeneratorFunction, f as RcEncryptorWithNonceFunction, a7 as X25519GetSharedSecretFunction, V as RcDecryptorFunction, W as RcEncryptorFunction, e as RcKeyGeneratorFunction, j as ChallengePowersDeps, g as ChallengePowersFunction, F as FiatShamirChallengeGeneratorFunction, B as ModuloPowCurve25519Function, I as PolynomialEvaluatorDeps, h as PolynomialEvaluatorFunction, a2 as UserCommitmentGeneratorDeps, U as UserCommitmentGeneratorFunction } from '../interfaces-43cReBcS.cjs';
4
- export { H as H2CircuitProvableHashFunction, s as H2CircuitProvableParams, t as H2FullParams, v as H2HashFunction, y as MasterSeedGeneratorFunction, i as PoseidonAggregatorHashFunction, Z as RescueKeyDerivationFunction, _ as RescuePermuteFunction, a3 as ViewingKeyGeneratorOptions } from '../interfaces-43cReBcS.cjs';
5
- import { B as Bn254FieldElement, M as MasterSeed, C as Curve25519FieldElement, s as Base85LimbTuple, c as X25519PrivateKey, X as X25519PublicKey, q as SharedSecret, m as RcCiphertext$1, N as Nonce$1 } from '../cryptography-D6tPDh-Y.cjs';
6
- import { U as U512BasedBn254FieldElementSamplerFunction, a as U512BasedCurve25519FieldElementSamplerFunction, b as ModuloSubFunction, c as ModuloAddFunction, C as Curve25519FieldElement$1 } from '../interfaces-D2NO6kDD.cjs';
7
- export { B as BASE85_LIMB_MAX, a as Base85Limb, b as Base85LimbTuple, P as PoseidonCiphertext, c as PoseidonCounter, d as PoseidonHash, e as PoseidonKey, f as PoseidonKeystream, g as PoseidonPlaintext, h as assertBase85Limb, i as assertPoseidonCiphertext, j as assertPoseidonCounter, k as assertPoseidonHash, l as assertPoseidonKey, m as assertPoseidonKeystream, n as assertPoseidonPlaintext } from '../types-PwNLi_2k.cjs';
1
+ import { o as AesDecryptorFunction, p as AesEncryptorFunction, d as IUmbraClient } from '../client-BmzzZ8qS.cjs';
2
+ import { a as SubBrandedType, B as Bytes, g as U256, U as U128, S as SubSubBrandedType, b as SubSubSubBrandedType } from '../types-CM3nVKl2.cjs';
3
+ import { T as PseudorandomU512DeriverFunction, a5 as Kmac256Function, x as MasterSeedBasedFieldElementDeriverFunction, N as PoseidonHashFunction, D as DailyViewingKeyGeneratorFunction, E as EphemeralMasterSeedDeriverFunction, k as EphemeralRescueCommitmentBlindingFactorDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, o as EphemeralUtxoNullifierDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, w as HourlyViewingKeyGeneratorFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, a as MasterViewingKeyDeriverFunction, C as Curve25519KeypairGeneratorFunction, z as MintViewingKeyDeriverFunction, M as MintX25519KeypairDeriverFunction, A as MinuteViewingKeyGeneratorFunction, G as MonthlyViewingKeyGeneratorFunction, d as PolynomialCommitmentFactorDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, R as RescueCommitmentBlindingFactorDeriverFunction, a1 as SecondViewingKeyGeneratorFunction, a4 as YearlyViewingKeyGeneratorFunction, r as FieldArithmetic, X as RescueCipherDeps, Y as RescueCipherInstance, $ as RescuePrimeHashDeps, a0 as RescuePrimeHashFunction, Q as PoseidonKeystreamGeneratorFunction, S as PoseidonPrfFunction, K as KeystreamCommitmentFunction, J as PoseidonDecryptorFunction, L as PoseidonEncryptorFunction, u as H2GeneratorFns, a6 as RandomNonceGeneratorFunction, f as RcEncryptorWithNonceFunction, a7 as X25519GetSharedSecretFunction, V as RcDecryptorFunction, W as RcEncryptorFunction, e as RcKeyGeneratorFunction, j as ChallengePowersDeps, g as ChallengePowersFunction, F as FiatShamirChallengeGeneratorFunction, B as ModuloPowCurve25519Function, I as PolynomialEvaluatorDeps, h as PolynomialEvaluatorFunction, a2 as UserCommitmentGeneratorDeps, U as UserCommitmentGeneratorFunction } from '../interfaces-CpZDActo.cjs';
4
+ export { H as H2CircuitProvableHashFunction, s as H2CircuitProvableParams, t as H2FullParams, v as H2HashFunction, y as MasterSeedGeneratorFunction, i as PoseidonAggregatorHashFunction, Z as RescueKeyDerivationFunction, _ as RescuePermuteFunction, a3 as ViewingKeyGeneratorOptions } from '../interfaces-CpZDActo.cjs';
5
+ import { B as Bn254FieldElement, M as MasterSeed, C as Curve25519FieldElement, s as Base85LimbTuple, c as X25519PrivateKey, X as X25519PublicKey, q as SharedSecret, m as RcCiphertext$1, N as Nonce$1 } from '../cryptography-BJ5sCytb.cjs';
6
+ import { j as U512BasedBn254FieldElementSamplerFunction, l as U512BasedCurve25519FieldElementSamplerFunction, i as ModuloSubFunction, f as ModuloAddFunction, m as Curve25519FieldElement$1 } from '../interfaces-2b_ySL0r.cjs';
7
+ export { B as BASE85_LIMB_MAX, a as Base85Limb, b as Base85LimbTuple, P as PoseidonCiphertext, c as PoseidonCounter, d as PoseidonHash, e as PoseidonKey, f as PoseidonKeystream, g as PoseidonPlaintext, h as assertBase85Limb, i as assertPoseidonCiphertext, j as assertPoseidonCounter, k as assertPoseidonHash, l as assertPoseidonKey, m as assertPoseidonKeystream, n as assertPoseidonPlaintext } from '../types-C8HrYlDv.cjs';
8
8
  import { kmac256 } from '@noble/hashes/sha3-addons.js';
9
9
  import { Address } from '@solana/kit';
10
- import { A as AddressSplitResult } from '../addresses-CTVY1oi7.cjs';
11
- export { C as Curve25519KeypairResult, D as DailyViewingKey, E as Ed25519Keypair, G as GenerationSeed, H as HourlyViewingKey, K as Keccak256Hash, a as Keccak512Hash, M as MASTER_VIEWING_KEY_MAX, b as MasterSeed, c as MasterViewingKey, d as MintViewingKey, e as MinuteViewingKey, f as MonthlyViewingKey, S as SecondViewingKey, g as SharedSecret, X as X25519Bytes, h as X25519Keypair, i as X25519PrivateKey, j as X25519PublicKey, k as X25519_BYTE_LENGTH, Y as YearlyViewingKey, l as assertCurve25519KeypairResult, m as assertDailyViewingKey, n as assertEd25519Keypair, o as assertGenerationSeed, p as assertHourlyViewingKey, q as assertKeccak256Hash, r as assertKeccak512Hash, s as assertMasterSeed, t as assertMasterViewingKey, u as assertMintViewingKey, v as assertMinuteViewingKey, w as assertMonthlyViewingKey, x as assertSecondViewingKey, y as assertSharedSecret, z as assertX25519Bytes, A as assertX25519Keypair, B as assertX25519PrivateKey, F as assertX25519PublicKey, I as assertYearlyViewingKey } from '../types-CuKeoI19.cjs';
12
- import '../types-EKuIfxTz.cjs';
10
+ import { A as AddressSplitResult } from '../addresses-Djkrs22V.cjs';
11
+ export { C as Curve25519KeypairResult, D as DailyViewingKey, E as Ed25519Keypair, G as GenerationSeed, H as HourlyViewingKey, K as Keccak256Hash, a as Keccak512Hash, M as MASTER_VIEWING_KEY_MAX, b as MasterSeed, c as MasterViewingKey, d as MintViewingKey, e as MinuteViewingKey, f as MonthlyViewingKey, S as SecondViewingKey, g as SharedSecret, X as X25519Bytes, h as X25519Keypair, i as X25519PrivateKey, j as X25519PublicKey, k as X25519_BYTE_LENGTH, Y as YearlyViewingKey, l as assertCurve25519KeypairResult, m as assertDailyViewingKey, n as assertEd25519Keypair, o as assertGenerationSeed, p as assertHourlyViewingKey, q as assertKeccak256Hash, r as assertKeccak512Hash, s as assertMasterSeed, t as assertMasterViewingKey, u as assertMintViewingKey, v as assertMinuteViewingKey, w as assertMonthlyViewingKey, x as assertSecondViewingKey, y as assertSharedSecret, z as assertX25519Bytes, A as assertX25519Keypair, B as assertX25519PrivateKey, F as assertX25519PublicKey, I as assertYearlyViewingKey } from '../types-4rAlbodI.cjs';
12
+ import '../types-i26vVlXf.cjs';
13
13
  import '../versions-BRlR36EA.cjs';
14
- import '../types-IMGYmlv-.cjs';
15
- import '../networks-yAoO8peQ.cjs';
16
- import '../types-BohhvPth.cjs';
14
+ import '../types-BYBfXNV_.cjs';
15
+ import '../networks-Bkl2oP0q.cjs';
16
+ import '../types-2UHG9wC-.cjs';
17
17
 
18
18
  /**
19
19
  * AES-256-GCM Encryption Implementation
@@ -1,19 +1,19 @@
1
- import { o as AesDecryptorFunction, p as AesEncryptorFunction, d as IUmbraClient } from '../client-V4AF6Bz9.js';
2
- import { b as SubBrandedType, B as Bytes, f as U256, U as U128, S as SubSubBrandedType, a as SubSubSubBrandedType } from '../types-C_V_CaKK.js';
3
- import { T as PseudorandomU512DeriverFunction, a5 as Kmac256Function, x as MasterSeedBasedFieldElementDeriverFunction, N as PoseidonHashFunction, D as DailyViewingKeyGeneratorFunction, E as EphemeralMasterSeedDeriverFunction, k as EphemeralRescueCommitmentBlindingFactorDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, o as EphemeralUtxoNullifierDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, w as HourlyViewingKeyGeneratorFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, a as MasterViewingKeyDeriverFunction, C as Curve25519KeypairGeneratorFunction, z as MintViewingKeyDeriverFunction, M as MintX25519KeypairDeriverFunction, A as MinuteViewingKeyGeneratorFunction, G as MonthlyViewingKeyGeneratorFunction, d as PolynomialCommitmentFactorDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, R as RescueCommitmentBlindingFactorDeriverFunction, a1 as SecondViewingKeyGeneratorFunction, a4 as YearlyViewingKeyGeneratorFunction, r as FieldArithmetic, X as RescueCipherDeps, Y as RescueCipherInstance, $ as RescuePrimeHashDeps, a0 as RescuePrimeHashFunction, Q as PoseidonKeystreamGeneratorFunction, S as PoseidonPrfFunction, K as KeystreamCommitmentFunction, J as PoseidonDecryptorFunction, L as PoseidonEncryptorFunction, u as H2GeneratorFns, a6 as RandomNonceGeneratorFunction, f as RcEncryptorWithNonceFunction, a7 as X25519GetSharedSecretFunction, V as RcDecryptorFunction, W as RcEncryptorFunction, e as RcKeyGeneratorFunction, j as ChallengePowersDeps, g as ChallengePowersFunction, F as FiatShamirChallengeGeneratorFunction, B as ModuloPowCurve25519Function, I as PolynomialEvaluatorDeps, h as PolynomialEvaluatorFunction, a2 as UserCommitmentGeneratorDeps, U as UserCommitmentGeneratorFunction } from '../interfaces-z_xYJlgV.js';
4
- export { H as H2CircuitProvableHashFunction, s as H2CircuitProvableParams, t as H2FullParams, v as H2HashFunction, y as MasterSeedGeneratorFunction, i as PoseidonAggregatorHashFunction, Z as RescueKeyDerivationFunction, _ as RescuePermuteFunction, a3 as ViewingKeyGeneratorOptions } from '../interfaces-z_xYJlgV.js';
5
- import { B as Bn254FieldElement, M as MasterSeed, C as Curve25519FieldElement, s as Base85LimbTuple, c as X25519PrivateKey, X as X25519PublicKey, q as SharedSecret, m as RcCiphertext$1, N as Nonce$1 } from '../cryptography-BFSJcvi6.js';
6
- import { U as U512BasedBn254FieldElementSamplerFunction, a as U512BasedCurve25519FieldElementSamplerFunction, b as ModuloSubFunction, c as ModuloAddFunction, C as Curve25519FieldElement$1 } from '../interfaces-B8xKNl_6.js';
7
- export { B as BASE85_LIMB_MAX, a as Base85Limb, b as Base85LimbTuple, P as PoseidonCiphertext, c as PoseidonCounter, d as PoseidonHash, e as PoseidonKey, f as PoseidonKeystream, g as PoseidonPlaintext, h as assertBase85Limb, i as assertPoseidonCiphertext, j as assertPoseidonCounter, k as assertPoseidonHash, l as assertPoseidonKey, m as assertPoseidonKeystream, n as assertPoseidonPlaintext } from '../types-Ca7frykr.js';
1
+ import { o as AesDecryptorFunction, p as AesEncryptorFunction, d as IUmbraClient } from '../client-CQytBtEn.js';
2
+ import { a as SubBrandedType, B as Bytes, g as U256, U as U128, S as SubSubBrandedType, b as SubSubSubBrandedType } from '../types-CM3nVKl2.js';
3
+ import { T as PseudorandomU512DeriverFunction, a5 as Kmac256Function, x as MasterSeedBasedFieldElementDeriverFunction, N as PoseidonHashFunction, D as DailyViewingKeyGeneratorFunction, E as EphemeralMasterSeedDeriverFunction, k as EphemeralRescueCommitmentBlindingFactorDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, o as EphemeralUtxoNullifierDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, w as HourlyViewingKeyGeneratorFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, a as MasterViewingKeyDeriverFunction, C as Curve25519KeypairGeneratorFunction, z as MintViewingKeyDeriverFunction, M as MintX25519KeypairDeriverFunction, A as MinuteViewingKeyGeneratorFunction, G as MonthlyViewingKeyGeneratorFunction, d as PolynomialCommitmentFactorDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, R as RescueCommitmentBlindingFactorDeriverFunction, a1 as SecondViewingKeyGeneratorFunction, a4 as YearlyViewingKeyGeneratorFunction, r as FieldArithmetic, X as RescueCipherDeps, Y as RescueCipherInstance, $ as RescuePrimeHashDeps, a0 as RescuePrimeHashFunction, Q as PoseidonKeystreamGeneratorFunction, S as PoseidonPrfFunction, K as KeystreamCommitmentFunction, J as PoseidonDecryptorFunction, L as PoseidonEncryptorFunction, u as H2GeneratorFns, a6 as RandomNonceGeneratorFunction, f as RcEncryptorWithNonceFunction, a7 as X25519GetSharedSecretFunction, V as RcDecryptorFunction, W as RcEncryptorFunction, e as RcKeyGeneratorFunction, j as ChallengePowersDeps, g as ChallengePowersFunction, F as FiatShamirChallengeGeneratorFunction, B as ModuloPowCurve25519Function, I as PolynomialEvaluatorDeps, h as PolynomialEvaluatorFunction, a2 as UserCommitmentGeneratorDeps, U as UserCommitmentGeneratorFunction } from '../interfaces-C-N3oLgJ.js';
4
+ export { H as H2CircuitProvableHashFunction, s as H2CircuitProvableParams, t as H2FullParams, v as H2HashFunction, y as MasterSeedGeneratorFunction, i as PoseidonAggregatorHashFunction, Z as RescueKeyDerivationFunction, _ as RescuePermuteFunction, a3 as ViewingKeyGeneratorOptions } from '../interfaces-C-N3oLgJ.js';
5
+ import { B as Bn254FieldElement, M as MasterSeed, C as Curve25519FieldElement, s as Base85LimbTuple, c as X25519PrivateKey, X as X25519PublicKey, q as SharedSecret, m as RcCiphertext$1, N as Nonce$1 } from '../cryptography-Dk1cBuym.js';
6
+ import { j as U512BasedBn254FieldElementSamplerFunction, l as U512BasedCurve25519FieldElementSamplerFunction, i as ModuloSubFunction, f as ModuloAddFunction, m as Curve25519FieldElement$1 } from '../interfaces-CxrUtnVG.js';
7
+ export { B as BASE85_LIMB_MAX, a as Base85Limb, b as Base85LimbTuple, P as PoseidonCiphertext, c as PoseidonCounter, d as PoseidonHash, e as PoseidonKey, f as PoseidonKeystream, g as PoseidonPlaintext, h as assertBase85Limb, i as assertPoseidonCiphertext, j as assertPoseidonCounter, k as assertPoseidonHash, l as assertPoseidonKey, m as assertPoseidonKeystream, n as assertPoseidonPlaintext } from '../types-BrQv82ne.js';
8
8
  import { kmac256 } from '@noble/hashes/sha3-addons.js';
9
9
  import { Address } from '@solana/kit';
10
- import { A as AddressSplitResult } from '../addresses-B7HybtbJ.js';
11
- export { C as Curve25519KeypairResult, D as DailyViewingKey, E as Ed25519Keypair, G as GenerationSeed, H as HourlyViewingKey, K as Keccak256Hash, a as Keccak512Hash, M as MASTER_VIEWING_KEY_MAX, b as MasterSeed, c as MasterViewingKey, d as MintViewingKey, e as MinuteViewingKey, f as MonthlyViewingKey, S as SecondViewingKey, g as SharedSecret, X as X25519Bytes, h as X25519Keypair, i as X25519PrivateKey, j as X25519PublicKey, k as X25519_BYTE_LENGTH, Y as YearlyViewingKey, l as assertCurve25519KeypairResult, m as assertDailyViewingKey, n as assertEd25519Keypair, o as assertGenerationSeed, p as assertHourlyViewingKey, q as assertKeccak256Hash, r as assertKeccak512Hash, s as assertMasterSeed, t as assertMasterViewingKey, u as assertMintViewingKey, v as assertMinuteViewingKey, w as assertMonthlyViewingKey, x as assertSecondViewingKey, y as assertSharedSecret, z as assertX25519Bytes, A as assertX25519Keypair, B as assertX25519PrivateKey, F as assertX25519PublicKey, I as assertYearlyViewingKey } from '../types-DKEDUlH9.js';
12
- import '../types-CxfTIpN9.js';
10
+ import { A as AddressSplitResult } from '../addresses-BIzQplvu.js';
11
+ export { C as Curve25519KeypairResult, D as DailyViewingKey, E as Ed25519Keypair, G as GenerationSeed, H as HourlyViewingKey, K as Keccak256Hash, a as Keccak512Hash, M as MASTER_VIEWING_KEY_MAX, b as MasterSeed, c as MasterViewingKey, d as MintViewingKey, e as MinuteViewingKey, f as MonthlyViewingKey, S as SecondViewingKey, g as SharedSecret, X as X25519Bytes, h as X25519Keypair, i as X25519PrivateKey, j as X25519PublicKey, k as X25519_BYTE_LENGTH, Y as YearlyViewingKey, l as assertCurve25519KeypairResult, m as assertDailyViewingKey, n as assertEd25519Keypair, o as assertGenerationSeed, p as assertHourlyViewingKey, q as assertKeccak256Hash, r as assertKeccak512Hash, s as assertMasterSeed, t as assertMasterViewingKey, u as assertMintViewingKey, v as assertMinuteViewingKey, w as assertMonthlyViewingKey, x as assertSecondViewingKey, y as assertSharedSecret, z as assertX25519Bytes, A as assertX25519Keypair, B as assertX25519PrivateKey, F as assertX25519PublicKey, I as assertYearlyViewingKey } from '../types-KMWXIyOY.js';
12
+ import '../types-gNnLmOsz.js';
13
13
  import '../versions-BRlR36EA.js';
14
- import '../types-D1jDUjfN.js';
15
- import '../networks-RMd3abPE.js';
16
- import '../types-CW0oTT0j.js';
14
+ import '../types-DfmTaW3z.js';
15
+ import '../networks-B3pArLLR.js';
16
+ import '../types-C42QtYXI.js';
17
17
 
18
18
  /**
19
19
  * AES-256-GCM Encryption Implementation
@@ -1,10 +1,10 @@
1
1
  export { AES_AUTH_TAG_LENGTH, AES_IV_LENGTH, AES_KEY_LENGTH, AES_METADATA_OVERHEAD, ALPHA, ALPHA_INVERSE, BASE85_LIMB_MAX, BLOCK_SIZE, CIPHER_ROUND_COUNT, FIELD_ELEMENT_BYTE_LENGTH, FIELD_PRIME, GROTH16_G1_BYTE_LENGTH, GROTH16_G2_BYTE_LENGTH, HASH_CAPACITY, HASH_DIGEST_LENGTH, HASH_RATE, HASH_ROUND_COUNT, HASH_STATE_SIZE, MASTER_VIEWING_KEY_MAX, MAX_AGGREGATOR_INPUTS, MAX_POSEIDON_INPUTS, MAX_PRF_SEEDS, NONCE_BYTES, OPTIONAL_DATA_BYTE_LENGTH, PRECOMPUTED_FIELD_INVERSES, REDUCTION_CONST, SAMPLE_BUFFER_BYTE_LENGTH, SECRET_BYTES, SHAKE256_CIPHER_SEED, X25519_BYTE_LENGTH, ZK_PROOF_BYTE_LENGTH, assertAesCiphertextWithMetadata, assertAesKey, assertAesPlaintext, assertBase85Limb, assertCurve25519KeypairResult, assertDailyViewingKey, assertEd25519Keypair, assertGenerationSeed, assertGroth16ProofA, assertGroth16ProofB, assertGroth16ProofC, assertHourlyViewingKey, assertKeccak256Hash, assertKeccak512Hash, assertMasterSeed, assertMasterViewingKey, assertMintViewingKey, assertMinuteViewingKey, assertMonthlyViewingKey, assertOptionalData32, assertPoseidonCiphertext, assertPoseidonCounter, assertPoseidonHash, assertPoseidonKey, assertPoseidonKeystream, assertPoseidonPlaintext, assertRcCiphertext, assertRcCounter, assertRcEncryptionNonce, assertRcKey, assertRcPlaintext, assertSecondViewingKey, assertSharedSecret, assertX25519Bytes, assertX25519Keypair, assertX25519PrivateKey, assertX25519PublicKey, assertYearlyViewingKey, assertZkProofBytes, buildPersonalizationString, defaultAesDecryptor, defaultAesEncryptor, deriveBn254FieldElementFromKeccak512, deriveEphemeralMasterViewingKey, deriveEphemeralMasterViewingKeyBlindingFactor, deriveEphemeralPoseidonPrivateKey, deriveEphemeralPoseidonPrivateKeyBlindingFactor, deriveKeystreamBlindingFactor, deriveModifiedGenerationIndexForReceiverClaim, deriveModifiedGenerationIndexForSenderClaim, deriveNullifierFromModifiedGenerationIndex, deriveProofAccountOffsetFromModifiedGenerationIndex, deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex, deriveRandomSecretFromModifiedGenerationIndex, deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex, expandModifiedGenerationIndex, getAesDecryptor, getAesEncryptor, getBn254FieldElementFromKeccak512Deriver, getChallengePowersFunction, getDailyViewingKeyDeriver, getEphemeralMasterSeedDeriver, getEphemeralRescueCommitmentBlindingFactorDeriver, getEphemeralUtxoH2RandomSecretDeriver, getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver, getEphemeralUtxoMasterViewingKeyDeriver, getEphemeralUtxoNullifierDeriver, getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver, getEphemeralUtxoPoseidonPrivateKeyDeriver, getFiatShamirChallengeGeneratorFunction, getFieldArithmetic, getHourlyViewingKeyDeriver, getKeystreamCommitmentGenerator, getMasterSeedBasedFieldElementDeriver, getMasterViewingKeyBlindingFactorDeriver, getMasterViewingKeyDeriver, getMasterViewingKeyX25519KeypairDeriver, getMintViewingKeyDeriver, getMintX25519KeypairDeriver, getMinuteViewingKeyDeriver, getModuloPowCurve25519Function, getMonthlyViewingKeyDeriver, getPersonalizationStringBuilder, getPolynomialCommitmentFactorDeriver, getPolynomialEvaluatorFunction, getPoseidonAggregator, getPoseidonBlindingFactorDeriver, getPoseidonDecryptor, getPoseidonEncryptor, getPoseidonHasher, getPoseidonKeystreamBlindingFactorDeriver, getPoseidonKeystreamGenerator, getPoseidonPrf, getPoseidonPrivateKeyDeriver, getPseudorandomU512Deriver, getRescueCipher, getRescueCipherFromKeyPair, getRescueCipherInstance, getRescueCommitmentBlindingFactorDeriver, getRescueCommitmentGenerator, getRescueDecryptorFromPrivateKey, getRescueEncryptorFromPrivateKey, getRescueEncryptorWithNonceFromPrivateKey, getRescueKeyGeneratorFromPrivateKey, getRescuePrimeHashFunction, getSecondViewingKeyDeriver, getUserAccountX25519KeypairDeriver, getUserCommitmentGeneratorFunction, getUtxoCommitmentHashGenerator, getYearlyViewingKeyDeriver } from '../chunk-RVUYPKKD.js';
2
2
  import '../chunk-WN75ORDT.js';
3
3
  import '../chunk-UXMQI6B7.js';
4
- import '../chunk-MKNCBUFA.js';
5
- import '../chunk-EEKF4553.js';
6
4
  import '../chunk-UOFYS6M3.js';
5
+ import '../chunk-D5MWU3TV.js';
7
6
  import '../chunk-FQX6ZYGJ.js';
7
+ import '../chunk-EEKF4553.js';
8
8
  import '../chunk-4TZVXB5G.js';
9
9
  import '../chunk-TLR7A64G.js';
10
10
  import '../chunk-DD2WCK4C.js';
@@ -1,4 +1,4 @@
1
- import { b as SubBrandedType, B as Bytes, S as SubSubBrandedType, f as U256, U as U128, a as SubSubSubBrandedType, c as SubSubSubSubBrandedType, d as U512LeBytes, e as U256LeBytes } from './types-C_V_CaKK.cjs';
1
+ import { a as SubBrandedType, B as Bytes, S as SubSubBrandedType, g as U256, U as U128, b as SubSubSubBrandedType, c as SubSubSubSubBrandedType, d as U512LeBytes, e as U256LeBytes } from './types-CM3nVKl2.cjs';
2
2
 
3
3
  /**
4
4
  * Cryptography Types
@@ -1,4 +1,4 @@
1
- import { b as SubBrandedType, B as Bytes, S as SubSubBrandedType, f as U256, U as U128, a as SubSubSubBrandedType, c as SubSubSubSubBrandedType, d as U512LeBytes, e as U256LeBytes } from './types-C_V_CaKK.js';
1
+ import { a as SubBrandedType, B as Bytes, S as SubSubBrandedType, g as U256, U as U128, b as SubSubSubBrandedType, c as SubSubSubSubBrandedType, d as U512LeBytes, e as U256LeBytes } from './types-CM3nVKl2.js';
2
2
 
3
3
  /**
4
4
  * Cryptography Types
@@ -1,15 +1,15 @@
1
- import { s as ComputationMonitorOptions, u as ComputationMonitorResult, v as ComputationMonitorResultWithSignature, I as IUmbraSigner, G as GetLatestBlockhash, T as TransactionForwarder, c as ComputationMonitor, L as GetMasterSeedFunction, d as IUmbraClient, A as AccountInfoProviderFunction, p as AesEncryptorFunction, a as GetEpochInfo, B as BatchMerkleProofFetcherFunction, k as ClaimableUtxoData } from './client-DkVBHMWb.cjs';
2
- import { V as RcDecryptorFunction, a as MasterViewingKeyDeriverFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, C as Curve25519KeypairGeneratorFunction, a1 as SecondViewingKeyGeneratorFunction, o as EphemeralUtxoNullifierDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, N as PoseidonHashFunction, f as RcEncryptorWithNonceFunction, F as FiatShamirChallengeGeneratorFunction, U as UserCommitmentGeneratorFunction, u as H2GeneratorFns, K as KeystreamCommitmentFunction, L as PoseidonEncryptorFunction, Q as PoseidonKeystreamGeneratorFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, i as PoseidonAggregatorHashFunction, e as RcKeyGeneratorFunction, M as MintX25519KeypairDeriverFunction } from './interfaces-43cReBcS.cjs';
3
- import './interfaces-D2NO6kDD.cjs';
1
+ import { s as ComputationMonitorOptions, u as ComputationMonitorResult, v as ComputationMonitorResultWithSignature, I as IUmbraSigner, G as GetLatestBlockhash, T as TransactionForwarder, c as ComputationMonitor, L as GetMasterSeedFunction, d as IUmbraClient, A as AccountInfoProviderFunction, p as AesEncryptorFunction, a as GetEpochInfo, B as BatchMerkleProofFetcherFunction, k as ClaimableUtxoData } from './client-BmzzZ8qS.cjs';
2
+ import { V as RcDecryptorFunction, a as MasterViewingKeyDeriverFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, C as Curve25519KeypairGeneratorFunction, a1 as SecondViewingKeyGeneratorFunction, o as EphemeralUtxoNullifierDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, N as PoseidonHashFunction, f as RcEncryptorWithNonceFunction, F as FiatShamirChallengeGeneratorFunction, U as UserCommitmentGeneratorFunction, u as H2GeneratorFns, K as KeystreamCommitmentFunction, L as PoseidonEncryptorFunction, Q as PoseidonKeystreamGeneratorFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, i as PoseidonAggregatorHashFunction, e as RcKeyGeneratorFunction, M as MintX25519KeypairDeriverFunction } from './interfaces-CpZDActo.cjs';
3
+ import './interfaces-2b_ySL0r.cjs';
4
4
  import * as _solana_kit from '@solana/kit';
5
5
  import { Address, Commitment, Instruction, partiallySignTransactionMessageWithSigners, KeyPairSigner } from '@solana/kit';
6
- import { f as U256, j as U32, k as U64, A as U8, U as U128 } from './types-C_V_CaKK.cjs';
7
- import { T as TransactionSignature, S as SignedTransaction } from './types-EKuIfxTz.cjs';
8
- import { A as AltEntry } from './networks-yAoO8peQ.cjs';
6
+ import { g as U256, j as U32, k as U64, A as U8, U as U128 } from './types-CM3nVKl2.cjs';
7
+ import { T as TransactionSignature, S as SignedTransaction } from './types-i26vVlXf.cjs';
8
+ import { A as AltEntry } from './networks-Bkl2oP0q.cjs';
9
9
  import { M as MicroLamportsPerAcu } from './arcium-BXXlryfe.cjs';
10
- import { O as OptionalData32, B as Bn254FieldElement, t as Base85Limb, G as Groth16ProofA, u as Groth16ProofB, v as Groth16ProofC, c as X25519PrivateKey, X as X25519PublicKey, A as AesKey, R as RcEncryptionNonce } from './cryptography-D6tPDh-Y.cjs';
10
+ import { O as OptionalData32, B as Bn254FieldElement, t as Base85Limb, G as Groth16ProofA, u as Groth16ProofB, v as Groth16ProofC, c as X25519PrivateKey, X as X25519PublicKey, A as AesKey, R as RcEncryptionNonce } from './cryptography-BJ5sCytb.cjs';
11
11
  import { QueryUserAccountResult, QueryComplianceGrantResult } from './types/index.cjs';
12
- import { U as UtcTimestampComponents } from './temporal-oUj7iCaq.cjs';
12
+ import { U as UtcTimestampComponents } from './temporal-BHMGDS-0.cjs';
13
13
 
14
14
  /**
15
15
  * Configuration for the transaction executor factory.
@@ -1,15 +1,15 @@
1
- import { s as ComputationMonitorOptions, u as ComputationMonitorResult, v as ComputationMonitorResultWithSignature, I as IUmbraSigner, G as GetLatestBlockhash, T as TransactionForwarder, c as ComputationMonitor, L as GetMasterSeedFunction, d as IUmbraClient, A as AccountInfoProviderFunction, p as AesEncryptorFunction, a as GetEpochInfo, B as BatchMerkleProofFetcherFunction, k as ClaimableUtxoData } from './client-V4AF6Bz9.js';
2
- import { V as RcDecryptorFunction, a as MasterViewingKeyDeriverFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, C as Curve25519KeypairGeneratorFunction, a1 as SecondViewingKeyGeneratorFunction, o as EphemeralUtxoNullifierDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, N as PoseidonHashFunction, f as RcEncryptorWithNonceFunction, F as FiatShamirChallengeGeneratorFunction, U as UserCommitmentGeneratorFunction, u as H2GeneratorFns, K as KeystreamCommitmentFunction, L as PoseidonEncryptorFunction, Q as PoseidonKeystreamGeneratorFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, i as PoseidonAggregatorHashFunction, e as RcKeyGeneratorFunction, M as MintX25519KeypairDeriverFunction } from './interfaces-z_xYJlgV.js';
3
- import './interfaces-B8xKNl_6.js';
1
+ import { s as ComputationMonitorOptions, u as ComputationMonitorResult, v as ComputationMonitorResultWithSignature, I as IUmbraSigner, G as GetLatestBlockhash, T as TransactionForwarder, c as ComputationMonitor, L as GetMasterSeedFunction, d as IUmbraClient, A as AccountInfoProviderFunction, p as AesEncryptorFunction, a as GetEpochInfo, B as BatchMerkleProofFetcherFunction, k as ClaimableUtxoData } from './client-CQytBtEn.js';
2
+ import { V as RcDecryptorFunction, a as MasterViewingKeyDeriverFunction, b as MasterViewingKeyBlindingFactorDeriverFunction, P as PoseidonPrivateKeyDeriverFunction, c as PoseidonBlindingFactorDeriverFunction, C as Curve25519KeypairGeneratorFunction, a1 as SecondViewingKeyGeneratorFunction, o as EphemeralUtxoNullifierDeriverFunction, l as EphemeralUtxoH2RandomSecretDeriverFunction, O as PoseidonKeystreamBlindingFactorDeriverFunction, N as PoseidonHashFunction, f as RcEncryptorWithNonceFunction, F as FiatShamirChallengeGeneratorFunction, U as UserCommitmentGeneratorFunction, u as H2GeneratorFns, K as KeystreamCommitmentFunction, L as PoseidonEncryptorFunction, Q as PoseidonKeystreamGeneratorFunction, n as EphemeralUtxoMasterViewingKeyDeriverFunction, m as EphemeralUtxoMasterViewingKeyBlindingFactorDeriverFunction, q as EphemeralUtxoPoseidonPrivateKeyDeriverFunction, p as EphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriverFunction, i as PoseidonAggregatorHashFunction, e as RcKeyGeneratorFunction, M as MintX25519KeypairDeriverFunction } from './interfaces-C-N3oLgJ.js';
3
+ import './interfaces-CxrUtnVG.js';
4
4
  import * as _solana_kit from '@solana/kit';
5
5
  import { Address, Commitment, Instruction, partiallySignTransactionMessageWithSigners, KeyPairSigner } from '@solana/kit';
6
- import { f as U256, j as U32, k as U64, A as U8, U as U128 } from './types-C_V_CaKK.js';
7
- import { T as TransactionSignature, S as SignedTransaction } from './types-CxfTIpN9.js';
8
- import { A as AltEntry } from './networks-RMd3abPE.js';
6
+ import { g as U256, j as U32, k as U64, A as U8, U as U128 } from './types-CM3nVKl2.js';
7
+ import { T as TransactionSignature, S as SignedTransaction } from './types-gNnLmOsz.js';
8
+ import { A as AltEntry } from './networks-B3pArLLR.js';
9
9
  import { M as MicroLamportsPerAcu } from './arcium-BXXlryfe.js';
10
- import { O as OptionalData32, B as Bn254FieldElement, t as Base85Limb, G as Groth16ProofA, u as Groth16ProofB, v as Groth16ProofC, c as X25519PrivateKey, X as X25519PublicKey, A as AesKey, R as RcEncryptionNonce } from './cryptography-BFSJcvi6.js';
10
+ import { O as OptionalData32, B as Bn254FieldElement, t as Base85Limb, G as Groth16ProofA, u as Groth16ProofB, v as Groth16ProofC, c as X25519PrivateKey, X as X25519PublicKey, A as AesKey, R as RcEncryptionNonce } from './cryptography-Dk1cBuym.js';
11
11
  import { QueryUserAccountResult, QueryComplianceGrantResult } from './types/index.js';
12
- import { U as UtcTimestampComponents } from './temporal-BbRaEPoO.js';
12
+ import { U as UtcTimestampComponents } from './temporal-B3yk1YkA.js';
13
13
 
14
14
  /**
15
15
  * Configuration for the transaction executor factory.