@volr/sdk-core 0.1.67 → 0.1.69
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +0 -10
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +0 -10
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -1075,7 +1075,6 @@ function createPasskeyProvider(passkey, options) {
|
|
|
1075
1075
|
}
|
|
1076
1076
|
sessionExpiresAt = Date.now() + sessionTtlMs;
|
|
1077
1077
|
lockTimer = setTimeout(async () => {
|
|
1078
|
-
console.log("[PasskeyProvider] Session expired, auto-locking");
|
|
1079
1078
|
await lock();
|
|
1080
1079
|
}, sessionTtlMs);
|
|
1081
1080
|
};
|
|
@@ -1086,7 +1085,6 @@ function createPasskeyProvider(passkey, options) {
|
|
|
1086
1085
|
}
|
|
1087
1086
|
sessionExpiresAt = null;
|
|
1088
1087
|
if (unwrappedKeypair) {
|
|
1089
|
-
console.log("[PasskeyProvider] lock(): zeroizing sensitive data from memory");
|
|
1090
1088
|
zeroize(unwrappedKeypair.privateKey);
|
|
1091
1089
|
zeroize(unwrappedKeypair.publicKey);
|
|
1092
1090
|
unwrappedKeypair = null;
|
|
@@ -1094,7 +1092,6 @@ function createPasskeyProvider(passkey, options) {
|
|
|
1094
1092
|
};
|
|
1095
1093
|
const ensureSession = async (opts) => {
|
|
1096
1094
|
if (opts?.force && unwrappedKeypair) {
|
|
1097
|
-
console.log("[PasskeyProvider] force=true: zeroizing existing session");
|
|
1098
1095
|
await lock();
|
|
1099
1096
|
}
|
|
1100
1097
|
if (unwrappedKeypair && !isSessionExpired()) {
|
|
@@ -1102,10 +1099,8 @@ function createPasskeyProvider(passkey, options) {
|
|
|
1102
1099
|
return;
|
|
1103
1100
|
}
|
|
1104
1101
|
if (unwrappedKeypair && isSessionExpired()) {
|
|
1105
|
-
console.log("[PasskeyProvider] Session expired, re-authenticating");
|
|
1106
1102
|
await lock();
|
|
1107
1103
|
}
|
|
1108
|
-
console.log("[PasskeyProvider] Triggering WebAuthn prompt for hardware-backed authentication");
|
|
1109
1104
|
const prfSalt = deriveWrapKey(options.prfInput);
|
|
1110
1105
|
const { prfOutput } = await passkey.authenticate({
|
|
1111
1106
|
salt: prfSalt,
|
|
@@ -1157,13 +1152,8 @@ function createPasskeyProvider(passkey, options) {
|
|
|
1157
1152
|
if (!unwrappedKeypair) {
|
|
1158
1153
|
throw new Error(`${ERR_INVALID_PARAM}: Session not established`);
|
|
1159
1154
|
}
|
|
1160
|
-
console.log("[PasskeyProvider] signTypedData input:", JSON.stringify(
|
|
1161
|
-
input,
|
|
1162
|
-
(_key, value) => typeof value === "bigint" ? value.toString() : value
|
|
1163
|
-
));
|
|
1164
1155
|
const hash = TypedDataEncoder.hash(input.domain, input.types, input.message);
|
|
1165
1156
|
const msgHash = hash;
|
|
1166
|
-
console.log("[PasskeyProvider] msgHash:", msgHash);
|
|
1167
1157
|
const msgHashBytes = new Uint8Array(32);
|
|
1168
1158
|
const hex = msgHash.startsWith("0x") ? msgHash.slice(2) : msgHash;
|
|
1169
1159
|
for (let i = 0; i < 32; i++) {
|