@umbra-privacy/sdk 2.0.1 → 2.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-MKNCBUFA.js → chunk-KH3YTDKA.js} +16 -16
- package/dist/chunk-KH3YTDKA.js.map +1 -0
- package/dist/{chunk-CFFLOE7D.cjs → chunk-UEI7SYH6.cjs} +16 -16
- package/dist/chunk-UEI7SYH6.cjs.map +1 -0
- package/dist/common/pda/index.cjs +34 -34
- package/dist/common/pda/index.d.cts +5 -5
- package/dist/common/pda/index.d.ts +5 -5
- package/dist/common/pda/index.js +1 -1
- package/dist/crypto/index.cjs +1 -1
- package/dist/crypto/index.js +1 -1
- package/dist/index.cjs +35 -35
- package/dist/index.js +2 -2
- package/dist/utils/index.cjs +34 -34
- package/dist/utils/index.js +1 -1
- package/package.json +19 -19
- package/dist/chunk-CFFLOE7D.cjs.map +0 -1
- package/dist/chunk-MKNCBUFA.js.map +0 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
3
|
+
var chunkUEI7SYH6_cjs = require('../../chunk-UEI7SYH6.cjs');
|
|
4
4
|
require('../../chunk-TQQZGNOI.cjs');
|
|
5
5
|
require('../../chunk-5GUSMQ74.cjs');
|
|
6
6
|
require('../../chunk-FZYWLQAF.cjs');
|
|
@@ -11,135 +11,135 @@ require('../../chunk-PK6SKIKE.cjs');
|
|
|
11
11
|
|
|
12
12
|
Object.defineProperty(exports, "TOKEN_POOL_SEED", {
|
|
13
13
|
enumerable: true,
|
|
14
|
-
get: function () { return
|
|
14
|
+
get: function () { return chunkUEI7SYH6_cjs.TOKEN_POOL_SEED; }
|
|
15
15
|
});
|
|
16
16
|
Object.defineProperty(exports, "computeCompDefOffset", {
|
|
17
17
|
enumerable: true,
|
|
18
|
-
get: function () { return
|
|
18
|
+
get: function () { return chunkUEI7SYH6_cjs.computeCompDefOffset; }
|
|
19
19
|
});
|
|
20
20
|
Object.defineProperty(exports, "computeStructSeed", {
|
|
21
21
|
enumerable: true,
|
|
22
|
-
get: function () { return
|
|
22
|
+
get: function () { return chunkUEI7SYH6_cjs.computeStructSeed; }
|
|
23
23
|
});
|
|
24
24
|
Object.defineProperty(exports, "findActiveStealthPoolPda", {
|
|
25
25
|
enumerable: true,
|
|
26
|
-
get: function () { return
|
|
26
|
+
get: function () { return chunkUEI7SYH6_cjs.findActiveStealthPoolPda; }
|
|
27
27
|
});
|
|
28
28
|
Object.defineProperty(exports, "findArciumClusterPda", {
|
|
29
29
|
enumerable: true,
|
|
30
|
-
get: function () { return
|
|
30
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumClusterPda; }
|
|
31
31
|
});
|
|
32
32
|
Object.defineProperty(exports, "findArciumCompDefPda", {
|
|
33
33
|
enumerable: true,
|
|
34
|
-
get: function () { return
|
|
34
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumCompDefPda; }
|
|
35
35
|
});
|
|
36
36
|
Object.defineProperty(exports, "findArciumComputationPda", {
|
|
37
37
|
enumerable: true,
|
|
38
|
-
get: function () { return
|
|
38
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumComputationPda; }
|
|
39
39
|
});
|
|
40
40
|
Object.defineProperty(exports, "findArciumExecutingPoolPda", {
|
|
41
41
|
enumerable: true,
|
|
42
|
-
get: function () { return
|
|
42
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumExecutingPoolPda; }
|
|
43
43
|
});
|
|
44
44
|
Object.defineProperty(exports, "findArciumInfrastructurePdas", {
|
|
45
45
|
enumerable: true,
|
|
46
|
-
get: function () { return
|
|
46
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumInfrastructurePdas; }
|
|
47
47
|
});
|
|
48
48
|
Object.defineProperty(exports, "findArciumMempoolPda", {
|
|
49
49
|
enumerable: true,
|
|
50
|
-
get: function () { return
|
|
50
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumMempoolPda; }
|
|
51
51
|
});
|
|
52
52
|
Object.defineProperty(exports, "findArciumMxePda", {
|
|
53
53
|
enumerable: true,
|
|
54
|
-
get: function () { return
|
|
54
|
+
get: function () { return chunkUEI7SYH6_cjs.findArciumMxePda; }
|
|
55
55
|
});
|
|
56
56
|
Object.defineProperty(exports, "findClaimInputBufferPda", {
|
|
57
57
|
enumerable: true,
|
|
58
|
-
get: function () { return
|
|
58
|
+
get: function () { return chunkUEI7SYH6_cjs.findClaimInputBufferPda; }
|
|
59
59
|
});
|
|
60
60
|
Object.defineProperty(exports, "findConfidentialNullifierBufferPda", {
|
|
61
61
|
enumerable: true,
|
|
62
|
-
get: function () { return
|
|
62
|
+
get: function () { return chunkUEI7SYH6_cjs.findConfidentialNullifierBufferPda; }
|
|
63
63
|
});
|
|
64
64
|
Object.defineProperty(exports, "findEncryptedTokenAccountPda", {
|
|
65
65
|
enumerable: true,
|
|
66
|
-
get: function () { return
|
|
66
|
+
get: function () { return chunkUEI7SYH6_cjs.findEncryptedTokenAccountPda; }
|
|
67
67
|
});
|
|
68
68
|
Object.defineProperty(exports, "findEncryptedUserAccountPda", {
|
|
69
69
|
enumerable: true,
|
|
70
|
-
get: function () { return
|
|
70
|
+
get: function () { return chunkUEI7SYH6_cjs.findEncryptedUserAccountPda; }
|
|
71
71
|
});
|
|
72
72
|
Object.defineProperty(exports, "findFeeSchedulePda", {
|
|
73
73
|
enumerable: true,
|
|
74
|
-
get: function () { return
|
|
74
|
+
get: function () { return chunkUEI7SYH6_cjs.findFeeSchedulePda; }
|
|
75
75
|
});
|
|
76
76
|
Object.defineProperty(exports, "findNetworkComplianceGrantPda", {
|
|
77
77
|
enumerable: true,
|
|
78
|
-
get: function () { return
|
|
78
|
+
get: function () { return chunkUEI7SYH6_cjs.findNetworkComplianceGrantPda; }
|
|
79
79
|
});
|
|
80
80
|
Object.defineProperty(exports, "findNullifierSetPdas", {
|
|
81
81
|
enumerable: true,
|
|
82
|
-
get: function () { return
|
|
82
|
+
get: function () { return chunkUEI7SYH6_cjs.findNullifierSetPdas; }
|
|
83
83
|
});
|
|
84
84
|
Object.defineProperty(exports, "findProtocolConfigPda", {
|
|
85
85
|
enumerable: true,
|
|
86
|
-
get: function () { return
|
|
86
|
+
get: function () { return chunkUEI7SYH6_cjs.findProtocolConfigPda; }
|
|
87
87
|
});
|
|
88
88
|
Object.defineProperty(exports, "findProtocolFeeVaultPda", {
|
|
89
89
|
enumerable: true,
|
|
90
|
-
get: function () { return
|
|
90
|
+
get: function () { return chunkUEI7SYH6_cjs.findProtocolFeeVaultPda; }
|
|
91
91
|
});
|
|
92
92
|
Object.defineProperty(exports, "findPublicClaimComputationDataPda", {
|
|
93
93
|
enumerable: true,
|
|
94
|
-
get: function () { return
|
|
94
|
+
get: function () { return chunkUEI7SYH6_cjs.findPublicClaimComputationDataPda; }
|
|
95
95
|
});
|
|
96
96
|
Object.defineProperty(exports, "findPublicClaimInputBufferPda", {
|
|
97
97
|
enumerable: true,
|
|
98
|
-
get: function () { return
|
|
98
|
+
get: function () { return chunkUEI7SYH6_cjs.findPublicClaimInputBufferPda; }
|
|
99
99
|
});
|
|
100
100
|
Object.defineProperty(exports, "findPublicNullifierBufferPda", {
|
|
101
101
|
enumerable: true,
|
|
102
|
-
get: function () { return
|
|
102
|
+
get: function () { return chunkUEI7SYH6_cjs.findPublicNullifierBufferPda; }
|
|
103
103
|
});
|
|
104
104
|
Object.defineProperty(exports, "findPublicUtxoInputBufferPda", {
|
|
105
105
|
enumerable: true,
|
|
106
|
-
get: function () { return
|
|
106
|
+
get: function () { return chunkUEI7SYH6_cjs.findPublicUtxoInputBufferPda; }
|
|
107
107
|
});
|
|
108
108
|
Object.defineProperty(exports, "findRelayerFeeSchedulePda", {
|
|
109
109
|
enumerable: true,
|
|
110
|
-
get: function () { return
|
|
110
|
+
get: function () { return chunkUEI7SYH6_cjs.findRelayerFeeSchedulePda; }
|
|
111
111
|
});
|
|
112
112
|
Object.defineProperty(exports, "findRelayerFeeVaultPda", {
|
|
113
113
|
enumerable: true,
|
|
114
|
-
get: function () { return
|
|
114
|
+
get: function () { return chunkUEI7SYH6_cjs.findRelayerFeeVaultPda; }
|
|
115
115
|
});
|
|
116
116
|
Object.defineProperty(exports, "findRelayerPda", {
|
|
117
117
|
enumerable: true,
|
|
118
|
-
get: function () { return
|
|
118
|
+
get: function () { return chunkUEI7SYH6_cjs.findRelayerPda; }
|
|
119
119
|
});
|
|
120
120
|
Object.defineProperty(exports, "findSharedComplianceGrantPda", {
|
|
121
121
|
enumerable: true,
|
|
122
|
-
get: function () { return
|
|
122
|
+
get: function () { return chunkUEI7SYH6_cjs.findSharedComplianceGrantPda; }
|
|
123
123
|
});
|
|
124
124
|
Object.defineProperty(exports, "findStealthPoolPda", {
|
|
125
125
|
enumerable: true,
|
|
126
|
-
get: function () { return
|
|
126
|
+
get: function () { return chunkUEI7SYH6_cjs.findStealthPoolPda; }
|
|
127
127
|
});
|
|
128
128
|
Object.defineProperty(exports, "findTokenPoolPda", {
|
|
129
129
|
enumerable: true,
|
|
130
|
-
get: function () { return
|
|
130
|
+
get: function () { return chunkUEI7SYH6_cjs.findTokenPoolPda; }
|
|
131
131
|
});
|
|
132
132
|
Object.defineProperty(exports, "findUserComplianceGrantPda", {
|
|
133
133
|
enumerable: true,
|
|
134
|
-
get: function () { return
|
|
134
|
+
get: function () { return chunkUEI7SYH6_cjs.findUserComplianceGrantPda; }
|
|
135
135
|
});
|
|
136
136
|
Object.defineProperty(exports, "findUtxoInputBufferPda", {
|
|
137
137
|
enumerable: true,
|
|
138
|
-
get: function () { return
|
|
138
|
+
get: function () { return chunkUEI7SYH6_cjs.findUtxoInputBufferPda; }
|
|
139
139
|
});
|
|
140
140
|
Object.defineProperty(exports, "findVerifyingKeyPda", {
|
|
141
141
|
enumerable: true,
|
|
142
|
-
get: function () { return
|
|
142
|
+
get: function () { return chunkUEI7SYH6_cjs.findVerifyingKeyPda; }
|
|
143
143
|
});
|
|
144
144
|
//# sourceMappingURL=index.cjs.map
|
|
145
145
|
//# sourceMappingURL=index.cjs.map
|
|
@@ -1110,7 +1110,7 @@ declare function findRelayerFeeSchedulePda(instructionSeed: U128, relayerAddress
|
|
|
1110
1110
|
declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Address): Promise<Address>;
|
|
1111
1111
|
/**
|
|
1112
1112
|
* Derives the Program Derived Address for a confidential claim input buffer account.
|
|
1113
|
-
* Seeds: [
|
|
1113
|
+
* Seeds: [ClaimInputBuffer::SEED, payer_pubkey, offset]
|
|
1114
1114
|
*
|
|
1115
1115
|
* An ephemeral buffer account that holds the Groth16 proof bytes and encrypted
|
|
1116
1116
|
* public inputs required for a confidential claim instruction. Created by the
|
|
@@ -1140,7 +1140,7 @@ declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Addres
|
|
|
1140
1140
|
declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1141
1141
|
/**
|
|
1142
1142
|
* Derives the Program Derived Address for a confidential UTXO input buffer account.
|
|
1143
|
-
* Seeds: [
|
|
1143
|
+
* Seeds: [StealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
|
|
1144
1144
|
*
|
|
1145
1145
|
* An ephemeral buffer account that holds the Groth16 proof data required to
|
|
1146
1146
|
* create a new confidential UTXO from an existing encrypted MXE balance.
|
|
@@ -1169,7 +1169,7 @@ declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, um
|
|
|
1169
1169
|
declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1170
1170
|
/**
|
|
1171
1171
|
* Derives the Program Derived Address for a public UTXO input buffer account.
|
|
1172
|
-
* Seeds: [
|
|
1172
|
+
* Seeds: [PublicStealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
|
|
1173
1173
|
*
|
|
1174
1174
|
* An ephemeral buffer account that holds cryptographic proof data for the
|
|
1175
1175
|
* `create_deposit_into_mixer_tree_from_public_balance` instruction.
|
|
@@ -1184,7 +1184,7 @@ declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128,
|
|
|
1184
1184
|
declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1185
1185
|
/**
|
|
1186
1186
|
* Derives the Program Derived Address for a public claim input buffer account.
|
|
1187
|
-
* Seeds: [
|
|
1187
|
+
* Seeds: [PublicClaimInputBuffer::SEED, relayer_pubkey, offset]
|
|
1188
1188
|
*
|
|
1189
1189
|
* An ephemeral buffer account that holds the Groth16 proof data for a
|
|
1190
1190
|
* public-balance claim instruction (claiming UTXOs into a standard SPL
|
|
@@ -1215,7 +1215,7 @@ declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset:
|
|
|
1215
1215
|
declare function findPublicClaimInputBufferPda(relayerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1216
1216
|
/**
|
|
1217
1217
|
* Derives the Program Derived Address for a public claim MPC computation data account.
|
|
1218
|
-
* Seeds: [
|
|
1218
|
+
* Seeds: [ClaimIntoPublicBalanceV11ComputationData::SEED, relayer_pubkey, offset]
|
|
1219
1219
|
*
|
|
1220
1220
|
* Stores all data needed by the Arcium MPC callback handler for a public
|
|
1221
1221
|
* claim instruction. Initialised in the handler and closed when the callback
|
|
@@ -1110,7 +1110,7 @@ declare function findRelayerFeeSchedulePda(instructionSeed: U128, relayerAddress
|
|
|
1110
1110
|
declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Address): Promise<Address>;
|
|
1111
1111
|
/**
|
|
1112
1112
|
* Derives the Program Derived Address for a confidential claim input buffer account.
|
|
1113
|
-
* Seeds: [
|
|
1113
|
+
* Seeds: [ClaimInputBuffer::SEED, payer_pubkey, offset]
|
|
1114
1114
|
*
|
|
1115
1115
|
* An ephemeral buffer account that holds the Groth16 proof bytes and encrypted
|
|
1116
1116
|
* public inputs required for a confidential claim instruction. Created by the
|
|
@@ -1140,7 +1140,7 @@ declare function findVerifyingKeyPda(instructionSeed: U128, umbraProgram: Addres
|
|
|
1140
1140
|
declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1141
1141
|
/**
|
|
1142
1142
|
* Derives the Program Derived Address for a confidential UTXO input buffer account.
|
|
1143
|
-
* Seeds: [
|
|
1143
|
+
* Seeds: [StealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
|
|
1144
1144
|
*
|
|
1145
1145
|
* An ephemeral buffer account that holds the Groth16 proof data required to
|
|
1146
1146
|
* create a new confidential UTXO from an existing encrypted MXE balance.
|
|
@@ -1169,7 +1169,7 @@ declare function findClaimInputBufferPda(payerAddress: Address, offset: U128, um
|
|
|
1169
1169
|
declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1170
1170
|
/**
|
|
1171
1171
|
* Derives the Program Derived Address for a public UTXO input buffer account.
|
|
1172
|
-
* Seeds: [
|
|
1172
|
+
* Seeds: [PublicStealthPoolDepositInputBuffer::SEED, depositor_pubkey, offset]
|
|
1173
1173
|
*
|
|
1174
1174
|
* An ephemeral buffer account that holds cryptographic proof data for the
|
|
1175
1175
|
* `create_deposit_into_mixer_tree_from_public_balance` instruction.
|
|
@@ -1184,7 +1184,7 @@ declare function findUtxoInputBufferPda(depositorAddress: Address, offset: U128,
|
|
|
1184
1184
|
declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1185
1185
|
/**
|
|
1186
1186
|
* Derives the Program Derived Address for a public claim input buffer account.
|
|
1187
|
-
* Seeds: [
|
|
1187
|
+
* Seeds: [PublicClaimInputBuffer::SEED, relayer_pubkey, offset]
|
|
1188
1188
|
*
|
|
1189
1189
|
* An ephemeral buffer account that holds the Groth16 proof data for a
|
|
1190
1190
|
* public-balance claim instruction (claiming UTXOs into a standard SPL
|
|
@@ -1215,7 +1215,7 @@ declare function findPublicUtxoInputBufferPda(depositorAddress: Address, offset:
|
|
|
1215
1215
|
declare function findPublicClaimInputBufferPda(relayerAddress: Address, offset: U128, umbraProgram: Address): Promise<Address>;
|
|
1216
1216
|
/**
|
|
1217
1217
|
* Derives the Program Derived Address for a public claim MPC computation data account.
|
|
1218
|
-
* Seeds: [
|
|
1218
|
+
* Seeds: [ClaimIntoPublicBalanceV11ComputationData::SEED, relayer_pubkey, offset]
|
|
1219
1219
|
*
|
|
1220
1220
|
* Stores all data needed by the Arcium MPC callback handler for a public
|
|
1221
1221
|
* claim instruction. Initialised in the handler and closed when the callback
|
package/dist/common/pda/index.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
export { TOKEN_POOL_SEED, computeCompDefOffset, computeStructSeed, findActiveStealthPoolPda, findArciumClusterPda, findArciumCompDefPda, findArciumComputationPda, findArciumExecutingPoolPda, findArciumInfrastructurePdas, findArciumMempoolPda, findArciumMxePda, findClaimInputBufferPda, findConfidentialNullifierBufferPda, findEncryptedTokenAccountPda, findEncryptedUserAccountPda, findFeeSchedulePda, findNetworkComplianceGrantPda, findNullifierSetPdas, findProtocolConfigPda, findProtocolFeeVaultPda, findPublicClaimComputationDataPda, findPublicClaimInputBufferPda, findPublicNullifierBufferPda, findPublicUtxoInputBufferPda, findRelayerFeeSchedulePda, findRelayerFeeVaultPda, findRelayerPda, findSharedComplianceGrantPda, findStealthPoolPda, findTokenPoolPda, findUserComplianceGrantPda, findUtxoInputBufferPda, findVerifyingKeyPda } from '../../chunk-
|
|
1
|
+
export { TOKEN_POOL_SEED, computeCompDefOffset, computeStructSeed, findActiveStealthPoolPda, findArciumClusterPda, findArciumCompDefPda, findArciumComputationPda, findArciumExecutingPoolPda, findArciumInfrastructurePdas, findArciumMempoolPda, findArciumMxePda, findClaimInputBufferPda, findConfidentialNullifierBufferPda, findEncryptedTokenAccountPda, findEncryptedUserAccountPda, findFeeSchedulePda, findNetworkComplianceGrantPda, findNullifierSetPdas, findProtocolConfigPda, findProtocolFeeVaultPda, findPublicClaimComputationDataPda, findPublicClaimInputBufferPda, findPublicNullifierBufferPda, findPublicUtxoInputBufferPda, findRelayerFeeSchedulePda, findRelayerFeeVaultPda, findRelayerPda, findSharedComplianceGrantPda, findStealthPoolPda, findTokenPoolPda, findUserComplianceGrantPda, findUtxoInputBufferPda, findVerifyingKeyPda } from '../../chunk-KH3YTDKA.js';
|
|
2
2
|
import '../../chunk-EEKF4553.js';
|
|
3
3
|
import '../../chunk-FQX6ZYGJ.js';
|
|
4
4
|
import '../../chunk-DD2WCK4C.js';
|
package/dist/crypto/index.cjs
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
var chunk3LS5P32X_cjs = require('../chunk-3LS5P32X.cjs');
|
|
4
4
|
require('../chunk-ZY3TSHMJ.cjs');
|
|
5
|
-
require('../chunk-
|
|
5
|
+
require('../chunk-UEI7SYH6.cjs');
|
|
6
6
|
require('../chunk-TQQZGNOI.cjs');
|
|
7
7
|
require('../chunk-Y55PYKXH.cjs');
|
|
8
8
|
require('../chunk-DMPMQ74B.cjs');
|
package/dist/crypto/index.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
export { AES_AUTH_TAG_LENGTH, AES_IV_LENGTH, AES_KEY_LENGTH, AES_METADATA_OVERHEAD, ALPHA, ALPHA_INVERSE, BASE85_LIMB_MAX, BLOCK_SIZE, CIPHER_ROUND_COUNT, FIELD_ELEMENT_BYTE_LENGTH, FIELD_PRIME, GROTH16_G1_BYTE_LENGTH, GROTH16_G2_BYTE_LENGTH, HASH_CAPACITY, HASH_DIGEST_LENGTH, HASH_RATE, HASH_ROUND_COUNT, HASH_STATE_SIZE, MASTER_VIEWING_KEY_MAX, MAX_AGGREGATOR_INPUTS, MAX_POSEIDON_INPUTS, MAX_PRF_SEEDS, NONCE_BYTES, OPTIONAL_DATA_BYTE_LENGTH, PRECOMPUTED_FIELD_INVERSES, REDUCTION_CONST, SAMPLE_BUFFER_BYTE_LENGTH, SECRET_BYTES, SHAKE256_CIPHER_SEED, X25519_BYTE_LENGTH, ZK_PROOF_BYTE_LENGTH, assertAesCiphertextWithMetadata, assertAesKey, assertAesPlaintext, assertBase85Limb, assertCurve25519KeypairResult, assertDailyViewingKey, assertEd25519Keypair, assertGenerationSeed, assertGroth16ProofA, assertGroth16ProofB, assertGroth16ProofC, assertHourlyViewingKey, assertKeccak256Hash, assertKeccak512Hash, assertMasterSeed, assertMasterViewingKey, assertMintViewingKey, assertMinuteViewingKey, assertMonthlyViewingKey, assertOptionalData32, assertPoseidonCiphertext, assertPoseidonCounter, assertPoseidonHash, assertPoseidonKey, assertPoseidonKeystream, assertPoseidonPlaintext, assertRcCiphertext, assertRcCounter, assertRcEncryptionNonce, assertRcKey, assertRcPlaintext, assertSecondViewingKey, assertSharedSecret, assertX25519Bytes, assertX25519Keypair, assertX25519PrivateKey, assertX25519PublicKey, assertYearlyViewingKey, assertZkProofBytes, buildPersonalizationString, defaultAesDecryptor, defaultAesEncryptor, deriveBn254FieldElementFromKeccak512, deriveEphemeralMasterViewingKey, deriveEphemeralMasterViewingKeyBlindingFactor, deriveEphemeralPoseidonPrivateKey, deriveEphemeralPoseidonPrivateKeyBlindingFactor, deriveKeystreamBlindingFactor, deriveModifiedGenerationIndexForReceiverClaim, deriveModifiedGenerationIndexForSenderClaim, deriveNullifierFromModifiedGenerationIndex, deriveProofAccountOffsetFromModifiedGenerationIndex, deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex, deriveRandomSecretFromModifiedGenerationIndex, deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex, expandModifiedGenerationIndex, getAesDecryptor, getAesEncryptor, getBn254FieldElementFromKeccak512Deriver, getChallengePowersFunction, getDailyViewingKeyDeriver, getEphemeralMasterSeedDeriver, getEphemeralRescueCommitmentBlindingFactorDeriver, getEphemeralUtxoH2RandomSecretDeriver, getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver, getEphemeralUtxoMasterViewingKeyDeriver, getEphemeralUtxoNullifierDeriver, getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver, getEphemeralUtxoPoseidonPrivateKeyDeriver, getFiatShamirChallengeGeneratorFunction, getFieldArithmetic, getHourlyViewingKeyDeriver, getKeystreamCommitmentGenerator, getMasterSeedBasedFieldElementDeriver, getMasterViewingKeyBlindingFactorDeriver, getMasterViewingKeyDeriver, getMasterViewingKeyX25519KeypairDeriver, getMintViewingKeyDeriver, getMintX25519KeypairDeriver, getMinuteViewingKeyDeriver, getModuloPowCurve25519Function, getMonthlyViewingKeyDeriver, getPersonalizationStringBuilder, getPolynomialCommitmentFactorDeriver, getPolynomialEvaluatorFunction, getPoseidonAggregator, getPoseidonBlindingFactorDeriver, getPoseidonDecryptor, getPoseidonEncryptor, getPoseidonHasher, getPoseidonKeystreamBlindingFactorDeriver, getPoseidonKeystreamGenerator, getPoseidonPrf, getPoseidonPrivateKeyDeriver, getPseudorandomU512Deriver, getRescueCipher, getRescueCipherFromKeyPair, getRescueCipherInstance, getRescueCommitmentBlindingFactorDeriver, getRescueCommitmentGenerator, getRescueDecryptorFromPrivateKey, getRescueEncryptorFromPrivateKey, getRescueEncryptorWithNonceFromPrivateKey, getRescueKeyGeneratorFromPrivateKey, getRescuePrimeHashFunction, getSecondViewingKeyDeriver, getUserAccountX25519KeypairDeriver, getUserCommitmentGeneratorFunction, getUtxoCommitmentHashGenerator, getYearlyViewingKeyDeriver } from '../chunk-KMRROOME.js';
|
|
2
2
|
import '../chunk-UXMQI6B7.js';
|
|
3
|
-
import '../chunk-
|
|
3
|
+
import '../chunk-KH3YTDKA.js';
|
|
4
4
|
import '../chunk-EEKF4553.js';
|
|
5
5
|
import '../chunk-WN75ORDT.js';
|
|
6
6
|
import '../chunk-UOFYS6M3.js';
|
package/dist/index.cjs
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
3
|
var chunkNKVMSABR_cjs = require('./chunk-NKVMSABR.cjs');
|
|
4
|
-
var chunkZQOIYCGA_cjs = require('./chunk-ZQOIYCGA.cjs');
|
|
5
4
|
var chunk3LS5P32X_cjs = require('./chunk-3LS5P32X.cjs');
|
|
6
5
|
var chunkZY3TSHMJ_cjs = require('./chunk-ZY3TSHMJ.cjs');
|
|
7
|
-
var
|
|
6
|
+
var chunkUEI7SYH6_cjs = require('./chunk-UEI7SYH6.cjs');
|
|
7
|
+
var chunkZQOIYCGA_cjs = require('./chunk-ZQOIYCGA.cjs');
|
|
8
8
|
require('./chunk-TQQZGNOI.cjs');
|
|
9
9
|
var chunkBL6WXLPV_cjs = require('./chunk-BL6WXLPV.cjs');
|
|
10
10
|
var chunkYEZBTYCP_cjs = require('./chunk-YEZBTYCP.cjs');
|
|
@@ -5126,7 +5126,7 @@ function getComplianceGrantIssuerFunction(args, deps) {
|
|
|
5126
5126
|
const mvkProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
|
|
5127
5127
|
keypairResult.ed25519Keypair.seed
|
|
5128
5128
|
);
|
|
5129
|
-
await
|
|
5129
|
+
await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(userAddress, programId);
|
|
5130
5130
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
5131
5131
|
const instruction = await umbraCodama.getCreateUserGrantInstructionAsync({
|
|
5132
5132
|
granterX25519ProvingSigner: mvkProvingSigner,
|
|
@@ -5170,7 +5170,7 @@ function getComplianceGrantRevokerFunction(args, deps) {
|
|
|
5170
5170
|
const mvkProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
|
|
5171
5171
|
keypairResult.ed25519Keypair.seed
|
|
5172
5172
|
);
|
|
5173
|
-
await
|
|
5173
|
+
await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(userAddress, programId);
|
|
5174
5174
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
5175
5175
|
const instruction = await umbraCodama.getDeleteUserGrantInstructionAsync({
|
|
5176
5176
|
feePayer: noopSigner,
|
|
@@ -5228,7 +5228,7 @@ function getSharedCiphertextReencryptorForUserGrantFunction(args, deps) {
|
|
|
5228
5228
|
);
|
|
5229
5229
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5230
5230
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5231
|
-
const arciumAccounts = await
|
|
5231
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
5232
5232
|
client.networkConfig.programId,
|
|
5233
5233
|
client.networkConfig.arciumProgramAddress,
|
|
5234
5234
|
clusterOffset,
|
|
@@ -5314,7 +5314,7 @@ function getNetworkCiphertextReencryptorForNetworkGrantFunction(args, deps) {
|
|
|
5314
5314
|
);
|
|
5315
5315
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5316
5316
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5317
|
-
const arciumAccounts = await
|
|
5317
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
5318
5318
|
client.networkConfig.programId,
|
|
5319
5319
|
client.networkConfig.arciumProgramAddress,
|
|
5320
5320
|
clusterOffset,
|
|
@@ -5399,7 +5399,7 @@ function getSharedCiphertextReencryptorForNetworkGrantFunction(args, deps) {
|
|
|
5399
5399
|
);
|
|
5400
5400
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5401
5401
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5402
|
-
const arciumAccounts = await
|
|
5402
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
5403
5403
|
client.networkConfig.programId,
|
|
5404
5404
|
client.networkConfig.arciumProgramAddress,
|
|
5405
5405
|
clusterOffset,
|
|
@@ -5463,7 +5463,7 @@ function getUserComplianceGrantQuerierFunction(args, deps) {
|
|
|
5463
5463
|
const umbraProgram = client.networkConfig.programId;
|
|
5464
5464
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryUserComplianceGrant(granterX25519, nonce, receiverX25519, options) {
|
|
5465
5465
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5466
|
-
const pda = await
|
|
5466
|
+
const pda = await chunkUEI7SYH6_cjs.findUserComplianceGrantPda(
|
|
5467
5467
|
granterX25519,
|
|
5468
5468
|
nonce,
|
|
5469
5469
|
receiverX25519,
|
|
@@ -5484,7 +5484,7 @@ function getNetworkComplianceGrantQuerierFunction(args, deps) {
|
|
|
5484
5484
|
const umbraProgram = client.networkConfig.programId;
|
|
5485
5485
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryNetworkMxeComplianceGrant(nonce, receiverX25519, options) {
|
|
5486
5486
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5487
|
-
const pda = await
|
|
5487
|
+
const pda = await chunkUEI7SYH6_cjs.findNetworkComplianceGrantPda(nonce, receiverX25519, umbraProgram);
|
|
5488
5488
|
const accountMap = await accountInfoProvider([pda], { commitment: accountInfoCommitment });
|
|
5489
5489
|
const maybeAccount = accountMap.get(pda);
|
|
5490
5490
|
if (maybeAccount?.exists !== true) {
|
|
@@ -5500,7 +5500,7 @@ function getSharedComplianceGrantQuerierFunction(args, deps) {
|
|
|
5500
5500
|
const umbraProgram = client.networkConfig.programId;
|
|
5501
5501
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryNetworkSharedComplianceGrant(granterX25519, nonce, receiverX25519, options) {
|
|
5502
5502
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5503
|
-
const pda = await
|
|
5503
|
+
const pda = await chunkUEI7SYH6_cjs.findSharedComplianceGrantPda(
|
|
5504
5504
|
granterX25519,
|
|
5505
5505
|
nonce,
|
|
5506
5506
|
receiverX25519,
|
|
@@ -5543,7 +5543,7 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
|
|
|
5543
5543
|
const pdaDerivations = await Promise.all(
|
|
5544
5544
|
mints.map(async (mint) => ({
|
|
5545
5545
|
mint,
|
|
5546
|
-
pda: await
|
|
5546
|
+
pda: await chunkUEI7SYH6_cjs.findEncryptedTokenAccountPda(
|
|
5547
5547
|
userAddress,
|
|
5548
5548
|
mint,
|
|
5549
5549
|
client.networkConfig.programId
|
|
@@ -5593,7 +5593,7 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
|
|
|
5593
5593
|
const transactionPromises = eligibleMints.map(async (mint) => {
|
|
5594
5594
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5595
5595
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5596
|
-
const arciumAccounts = await
|
|
5596
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
5597
5597
|
client.networkConfig.programId,
|
|
5598
5598
|
client.networkConfig.arciumProgramAddress,
|
|
5599
5599
|
clusterOffset,
|
|
@@ -5704,7 +5704,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
|
|
|
5704
5704
|
const x25519ProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
|
|
5705
5705
|
keypairResult.ed25519Keypair.seed
|
|
5706
5706
|
);
|
|
5707
|
-
const tokenAccountPda = await
|
|
5707
|
+
const tokenAccountPda = await chunkUEI7SYH6_cjs.findEncryptedTokenAccountPda(
|
|
5708
5708
|
userAddress,
|
|
5709
5709
|
mint,
|
|
5710
5710
|
client.networkConfig.programId
|
|
@@ -5746,7 +5746,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
|
|
|
5746
5746
|
}
|
|
5747
5747
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5748
5748
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5749
|
-
const arciumAccounts = await
|
|
5749
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
5750
5750
|
client.networkConfig.programId,
|
|
5751
5751
|
client.networkConfig.arciumProgramAddress,
|
|
5752
5752
|
clusterOffset,
|
|
@@ -6057,8 +6057,8 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6057
6057
|
let encryptedUserAccountPda;
|
|
6058
6058
|
try {
|
|
6059
6059
|
[encryptedTokenAccountPda, encryptedUserAccountPda] = await Promise.all([
|
|
6060
|
-
|
|
6061
|
-
|
|
6060
|
+
chunkUEI7SYH6_cjs.findEncryptedTokenAccountPda(destinationAddress, mint, client.networkConfig.programId),
|
|
6061
|
+
chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(destinationAddress, client.networkConfig.programId)
|
|
6062
6062
|
]);
|
|
6063
6063
|
} catch (error) {
|
|
6064
6064
|
throw new chunkBL6WXLPV_cjs.EncryptedDepositError(
|
|
@@ -6127,7 +6127,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6127
6127
|
const resetCompDefName = isSharedMode ? "reset_shared_eta_queue_v9" : "reset_mxe_eta_queue_v9";
|
|
6128
6128
|
const resetComputationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
6129
6129
|
const resetMpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
6130
|
-
const resetArciumAccounts = await
|
|
6130
|
+
const resetArciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
6131
6131
|
client.networkConfig.programId,
|
|
6132
6132
|
client.networkConfig.arciumProgramAddress,
|
|
6133
6133
|
clusterOffset,
|
|
@@ -6196,7 +6196,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6196
6196
|
[DepositInstructionVariant.ExistingSharedBalance]: "deposit_from_public_balance_into_existing_shared_balance_v11"
|
|
6197
6197
|
}[instructionVariant];
|
|
6198
6198
|
const altEntry = chunkAXD7LXYY_cjs.lookupAltEntry(client.networkConfig.addressLookupTables, clusterOffset, compDefInstructionName);
|
|
6199
|
-
const arciumAccounts = await
|
|
6199
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
6200
6200
|
client.networkConfig.programId,
|
|
6201
6201
|
client.networkConfig.arciumProgramAddress,
|
|
6202
6202
|
clusterOffset,
|
|
@@ -7004,11 +7004,11 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7004
7004
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
7005
7005
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
7006
7006
|
const stealthPoolIndex = 0n;
|
|
7007
|
-
const stealthPoolAddress = await
|
|
7007
|
+
const stealthPoolAddress = await chunkUEI7SYH6_cjs.findStealthPoolPda(
|
|
7008
7008
|
stealthPoolIndex,
|
|
7009
7009
|
client.networkConfig.programId
|
|
7010
7010
|
);
|
|
7011
|
-
const arciumAccounts = await
|
|
7011
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
7012
7012
|
client.networkConfig.programId,
|
|
7013
7013
|
client.networkConfig.arciumProgramAddress,
|
|
7014
7014
|
clusterOffset,
|
|
@@ -7095,7 +7095,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7095
7095
|
}
|
|
7096
7096
|
chunkPK6SKIKE_cjs.__name(executeTransaction, "executeTransaction");
|
|
7097
7097
|
async function checkAndCloseExistingProofAccount(offset) {
|
|
7098
|
-
const proofAccountPda = await
|
|
7098
|
+
const proofAccountPda = await chunkUEI7SYH6_cjs.findUtxoInputBufferPda(
|
|
7099
7099
|
client.signer.address,
|
|
7100
7100
|
offset,
|
|
7101
7101
|
client.networkConfig.programId
|
|
@@ -7404,7 +7404,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7404
7404
|
for (let index = 0; index < 16; index++) {
|
|
7405
7405
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
7406
7406
|
}
|
|
7407
|
-
const receiverUserAccountPda = await
|
|
7407
|
+
const receiverUserAccountPda = await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(
|
|
7408
7408
|
destinationAddress,
|
|
7409
7409
|
client.networkConfig.programId
|
|
7410
7410
|
);
|
|
@@ -7994,11 +7994,11 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7994
7994
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
7995
7995
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
7996
7996
|
const stealthPoolIndex = 0n;
|
|
7997
|
-
const stealthPoolAddress = await
|
|
7997
|
+
const stealthPoolAddress = await chunkUEI7SYH6_cjs.findStealthPoolPda(
|
|
7998
7998
|
stealthPoolIndex,
|
|
7999
7999
|
client.networkConfig.programId
|
|
8000
8000
|
);
|
|
8001
|
-
const arciumAccounts = await
|
|
8001
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
8002
8002
|
client.networkConfig.programId,
|
|
8003
8003
|
client.networkConfig.arciumProgramAddress,
|
|
8004
8004
|
clusterOffset,
|
|
@@ -8085,7 +8085,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8085
8085
|
}
|
|
8086
8086
|
chunkPK6SKIKE_cjs.__name(executeTransaction, "executeTransaction");
|
|
8087
8087
|
async function checkAndCloseExistingProofAccount(offset) {
|
|
8088
|
-
const proofAccountPda = await
|
|
8088
|
+
const proofAccountPda = await chunkUEI7SYH6_cjs.findUtxoInputBufferPda(
|
|
8089
8089
|
client.signer.address,
|
|
8090
8090
|
offset,
|
|
8091
8091
|
client.networkConfig.programId
|
|
@@ -8637,7 +8637,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8637
8637
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
8638
8638
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
8639
8639
|
const stealthPoolIndex = 0n;
|
|
8640
|
-
const stealthPoolAddress = await
|
|
8640
|
+
const stealthPoolAddress = await chunkUEI7SYH6_cjs.findStealthPoolPda(
|
|
8641
8641
|
stealthPoolIndex,
|
|
8642
8642
|
client.networkConfig.programId
|
|
8643
8643
|
);
|
|
@@ -8698,7 +8698,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8698
8698
|
chunkPK6SKIKE_cjs.__name(buildAndSendTransaction, "buildAndSendTransaction");
|
|
8699
8699
|
chunkLTCKPTZC_cjs.assertU128(proofAccountOffset);
|
|
8700
8700
|
let closeProofAccountSignature;
|
|
8701
|
-
const proofAccountPda = await
|
|
8701
|
+
const proofAccountPda = await chunkUEI7SYH6_cjs.findPublicUtxoInputBufferPda(
|
|
8702
8702
|
client.signer.address,
|
|
8703
8703
|
proofAccountOffset,
|
|
8704
8704
|
client.networkConfig.programId
|
|
@@ -8876,7 +8876,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8876
8876
|
for (let index = 0; index < 16; index++) {
|
|
8877
8877
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
8878
8878
|
}
|
|
8879
|
-
const receiverUserAccountPda = await
|
|
8879
|
+
const receiverUserAccountPda = await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(
|
|
8880
8880
|
destinationAddress,
|
|
8881
8881
|
client.networkConfig.programId
|
|
8882
8882
|
);
|
|
@@ -9167,7 +9167,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9167
9167
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
9168
9168
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
9169
9169
|
const stealthPoolIndex = 0n;
|
|
9170
|
-
const stealthPoolAddress = await
|
|
9170
|
+
const stealthPoolAddress = await chunkUEI7SYH6_cjs.findStealthPoolPda(
|
|
9171
9171
|
stealthPoolIndex,
|
|
9172
9172
|
client.networkConfig.programId
|
|
9173
9173
|
);
|
|
@@ -9228,7 +9228,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9228
9228
|
chunkPK6SKIKE_cjs.__name(buildAndSendTransaction, "buildAndSendTransaction");
|
|
9229
9229
|
chunkLTCKPTZC_cjs.assertU128(proofAccountOffset);
|
|
9230
9230
|
let closeProofAccountSignature;
|
|
9231
|
-
const proofAccountPda = await
|
|
9231
|
+
const proofAccountPda = await chunkUEI7SYH6_cjs.findPublicUtxoInputBufferPda(
|
|
9232
9232
|
client.signer.address,
|
|
9233
9233
|
proofAccountOffset,
|
|
9234
9234
|
client.networkConfig.programId
|
|
@@ -9406,7 +9406,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9406
9406
|
pdaDerivations = await Promise.all(
|
|
9407
9407
|
mints.map(async (mint) => ({
|
|
9408
9408
|
mint,
|
|
9409
|
-
pda: await
|
|
9409
|
+
pda: await chunkUEI7SYH6_cjs.findEncryptedTokenAccountPda(
|
|
9410
9410
|
userAddress,
|
|
9411
9411
|
mint,
|
|
9412
9412
|
client.networkConfig.programId
|
|
@@ -9534,7 +9534,7 @@ function getUserAccountQuerierFunction(args, deps) {
|
|
|
9534
9534
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
9535
9535
|
let userAccountPda;
|
|
9536
9536
|
try {
|
|
9537
|
-
userAccountPda = await
|
|
9537
|
+
userAccountPda = await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(userAddress, umbraProgram);
|
|
9538
9538
|
} catch (error) {
|
|
9539
9539
|
throw new chunkBL6WXLPV_cjs.QueryError(
|
|
9540
9540
|
"pda-derivation",
|
|
@@ -9721,7 +9721,7 @@ function getUserRegistrationFunction(args, deps) {
|
|
|
9721
9721
|
"ZK prover is required for anonymous mode registration. Provide zkProver in the deps argument."
|
|
9722
9722
|
);
|
|
9723
9723
|
}
|
|
9724
|
-
const userAccountPda = await
|
|
9724
|
+
const userAccountPda = await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(
|
|
9725
9725
|
signer.address,
|
|
9726
9726
|
client.networkConfig.programId
|
|
9727
9727
|
);
|
|
@@ -10161,7 +10161,7 @@ function getUserRegistrationFunction(args, deps) {
|
|
|
10161
10161
|
}
|
|
10162
10162
|
const zkProof = await zkProver.prove(zkCircuitInputs);
|
|
10163
10163
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
10164
|
-
const arciumAccounts = await
|
|
10164
|
+
const arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
10165
10165
|
client.networkConfig.programId,
|
|
10166
10166
|
client.networkConfig.arciumProgramAddress,
|
|
10167
10167
|
clusterOffset,
|
|
@@ -10545,7 +10545,7 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10545
10545
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
10546
10546
|
let arciumAccounts;
|
|
10547
10547
|
try {
|
|
10548
|
-
arciumAccounts = await
|
|
10548
|
+
arciumAccounts = await chunkUEI7SYH6_cjs.findArciumInfrastructurePdas(
|
|
10549
10549
|
client.networkConfig.programId,
|
|
10550
10550
|
client.networkConfig.arciumProgramAddress,
|
|
10551
10551
|
clusterOffset,
|
package/dist/index.js
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
export { RelayerError, getUmbraRelayer, pollClaimUntilTerminal } from './chunk-4RHXVBNI.js';
|
|
2
|
-
import { getNetworkConfig, getNetworkSpecifier, getDefaultSchemeVersion, getDefaultAlgorithmVersion, getDefaultProtocolVersion, createSetComputeUnitLimitInstruction, TOKEN_2022_PROGRAM_ID, SPL_TOKEN_PROGRAM_ID } from './chunk-INJ73LXQ.js';
|
|
3
2
|
import { getPoseidonAggregator, getPoseidonHasher, getAesDecryptor, getUserAccountX25519KeypairDeriver, deriveNullifierFromModifiedGenerationIndex, deriveRandomSecretFromModifiedGenerationIndex, deriveKeystreamBlindingFactor, getRescueEncryptorFromPrivateKey, getRescueKeyGeneratorFromPrivateKey, getRescueCommitmentGenerator, getModuloPowCurve25519Function, getPolynomialEvaluatorFunction, getMasterViewingKeyDeriver, getMasterViewingKeyBlindingFactorDeriver, getPoseidonPrivateKeyDeriver, getPoseidonBlindingFactorDeriver, getSecondViewingKeyDeriver, getPoseidonEncryptor, getPoseidonKeystreamGenerator, getUserCommitmentGeneratorFunction, getKeystreamCommitmentGenerator, getFiatShamirChallengeGeneratorFunction, expandModifiedGenerationIndex, getEphemeralUtxoMasterViewingKeyDeriver, getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver, getEphemeralUtxoPoseidonPrivateKeyDeriver, getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver, getMasterViewingKeyX25519KeypairDeriver, getMintX25519KeypairDeriver, getPoseidonKeystreamBlindingFactorDeriver, getUtxoCommitmentHashGenerator, getChallengePowersFunction, getAesEncryptor, deriveProofAccountOffsetFromModifiedGenerationIndex, deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex, deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex, getRescueCommitmentBlindingFactorDeriver, getPolynomialCommitmentFactorDeriver, getRescueEncryptorWithNonceFromPrivateKey, getRescueDecryptorFromPrivateKey } from './chunk-KMRROOME.js';
|
|
4
3
|
export { AES_AUTH_TAG_LENGTH, AES_IV_LENGTH, AES_KEY_LENGTH, AES_METADATA_OVERHEAD, ALPHA, ALPHA_INVERSE, BASE85_LIMB_MAX, BLOCK_SIZE, CIPHER_ROUND_COUNT, FIELD_ELEMENT_BYTE_LENGTH, FIELD_PRIME, GROTH16_G1_BYTE_LENGTH, GROTH16_G2_BYTE_LENGTH, HASH_CAPACITY, HASH_DIGEST_LENGTH, HASH_RATE, HASH_ROUND_COUNT, HASH_STATE_SIZE, MASTER_VIEWING_KEY_MAX, MAX_AGGREGATOR_INPUTS, MAX_POSEIDON_INPUTS, MAX_PRF_SEEDS, NONCE_BYTES, OPTIONAL_DATA_BYTE_LENGTH, PRECOMPUTED_FIELD_INVERSES, REDUCTION_CONST, SAMPLE_BUFFER_BYTE_LENGTH, SECRET_BYTES, SHAKE256_CIPHER_SEED, X25519_BYTE_LENGTH, ZK_PROOF_BYTE_LENGTH, assertAesCiphertextWithMetadata, assertAesKey, assertAesPlaintext, assertBase85Limb, assertCurve25519KeypairResult, assertDailyViewingKey, assertEd25519Keypair, assertGenerationSeed, assertGroth16ProofA, assertGroth16ProofB, assertGroth16ProofC, assertHourlyViewingKey, assertKeccak256Hash, assertKeccak512Hash, assertMasterSeed, assertMasterViewingKey, assertMintViewingKey, assertMinuteViewingKey, assertMonthlyViewingKey, assertOptionalData32, assertPoseidonCiphertext, assertPoseidonCounter, assertPoseidonHash, assertPoseidonKey, assertPoseidonKeystream, assertPoseidonPlaintext, assertRcCiphertext, assertRcCounter, assertRcEncryptionNonce, assertRcKey, assertRcPlaintext, assertSecondViewingKey, assertSharedSecret, assertX25519Bytes, assertX25519Keypair, assertX25519PrivateKey, assertX25519PublicKey, assertYearlyViewingKey, assertZkProofBytes, buildPersonalizationString, defaultAesDecryptor, defaultAesEncryptor, deriveBn254FieldElementFromKeccak512, deriveEphemeralMasterViewingKey, deriveEphemeralMasterViewingKeyBlindingFactor, deriveEphemeralPoseidonPrivateKey, deriveEphemeralPoseidonPrivateKeyBlindingFactor, deriveKeystreamBlindingFactor, deriveModifiedGenerationIndexForReceiverClaim, deriveModifiedGenerationIndexForSenderClaim, deriveNullifierFromModifiedGenerationIndex, deriveProofAccountOffsetFromModifiedGenerationIndex, deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex, deriveRandomSecretFromModifiedGenerationIndex, deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex, expandModifiedGenerationIndex, getAesDecryptor, getAesEncryptor, getBn254FieldElementFromKeccak512Deriver, getChallengePowersFunction, getDailyViewingKeyDeriver, getEphemeralMasterSeedDeriver, getEphemeralRescueCommitmentBlindingFactorDeriver, getEphemeralUtxoH2RandomSecretDeriver, getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver, getEphemeralUtxoMasterViewingKeyDeriver, getEphemeralUtxoNullifierDeriver, getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver, getEphemeralUtxoPoseidonPrivateKeyDeriver, getFiatShamirChallengeGeneratorFunction, getFieldArithmetic, getHourlyViewingKeyDeriver, getKeystreamCommitmentGenerator, getMasterSeedBasedFieldElementDeriver, getMasterViewingKeyBlindingFactorDeriver, getMasterViewingKeyDeriver, getMasterViewingKeyX25519KeypairDeriver, getMintViewingKeyDeriver, getMintX25519KeypairDeriver, getMinuteViewingKeyDeriver, getModuloPowCurve25519Function, getMonthlyViewingKeyDeriver, getPersonalizationStringBuilder, getPolynomialCommitmentFactorDeriver, getPolynomialEvaluatorFunction, getPoseidonAggregator, getPoseidonBlindingFactorDeriver, getPoseidonDecryptor, getPoseidonEncryptor, getPoseidonHasher, getPoseidonKeystreamBlindingFactorDeriver, getPoseidonKeystreamGenerator, getPoseidonPrf, getPoseidonPrivateKeyDeriver, getPseudorandomU512Deriver, getRescueCipher, getRescueCipherFromKeyPair, getRescueCipherInstance, getRescueCommitmentBlindingFactorDeriver, getRescueCommitmentGenerator, getRescueDecryptorFromPrivateKey, getRescueEncryptorFromPrivateKey, getRescueEncryptorWithNonceFromPrivateKey, getRescueKeyGeneratorFromPrivateKey, getRescuePrimeHashFunction, getSecondViewingKeyDeriver, getUserAccountX25519KeypairDeriver, getUserCommitmentGeneratorFunction, getUtxoCommitmentHashGenerator, getYearlyViewingKeyDeriver } from './chunk-KMRROOME.js';
|
|
5
4
|
import { splitAddressToLowHigh, createBn254FieldElement, createPoseidonKey, splitU256IntoTwoU128s, createRcPlaintext, splitX25519PublicKeyIntoTwoU128s, convertU256ToBase85Limbs, createU256, createCurve25519FieldElement, bigintToBinaryArrayLSB, generateRandomU256, generateRandomU128, createU64, extractClusterOffsetFromMxeAccount, generateRandomU64, extractTransferFeeConfig, calculateTransferFee, generateComputationOffset, extractUtcComponents, getByteAt } from './chunk-UXMQI6B7.js';
|
|
6
|
-
import { findEncryptedUserAccountPda, findArciumInfrastructurePdas, findUserComplianceGrantPda, findNetworkComplianceGrantPda, findSharedComplianceGrantPda, findEncryptedTokenAccountPda, findStealthPoolPda, findUtxoInputBufferPda, findPublicUtxoInputBufferPda } from './chunk-
|
|
5
|
+
import { findEncryptedUserAccountPda, findArciumInfrastructurePdas, findUserComplianceGrantPda, findNetworkComplianceGrantPda, findSharedComplianceGrantPda, findEncryptedTokenAccountPda, findStealthPoolPda, findUtxoInputBufferPda, findPublicUtxoInputBufferPda } from './chunk-KH3YTDKA.js';
|
|
6
|
+
import { getNetworkConfig, getNetworkSpecifier, getDefaultSchemeVersion, getDefaultAlgorithmVersion, getDefaultProtocolVersion, createSetComputeUnitLimitInstruction, TOKEN_2022_PROGRAM_ID, SPL_TOKEN_PROGRAM_ID } from './chunk-INJ73LXQ.js';
|
|
7
7
|
import './chunk-EEKF4553.js';
|
|
8
8
|
import { ComputationMonitorError, FetchUtxosError, ClaimUtxoError, RpcError, ConversionError, TransactionSigningError, TransactionError, EncryptedDepositError, CreateUtxoError, QueryError, RegistrationError, MasterSeedSigningRejectedError, EncryptedWithdrawalError } from './chunk-GP26R377.js';
|
|
9
9
|
export { ClaimUtxoError, ComputationMonitorError, ConversionError, CreateUtxoError, EncryptedDepositError, EncryptedWithdrawalError, FetchUtxosError, QueryError, RegistrationError, isClaimUtxoError, isComputationMonitorError, isConversionError, isCreateUtxoError, isEncryptedDepositError, isEncryptedWithdrawalError, isFetchUtxosError, isQueryError, isRegistrationError } from './chunk-GP26R377.js';
|