cojson-core-wasm 0.19.21 → 0.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/edge-lite.js CHANGED
@@ -1,9 +1,13 @@
1
1
  export * from "./public/cojson_core_wasm.js";
2
2
 
3
- import __wbg_init from "./public/cojson_core_wasm.js";
3
+ import __wbg_init, { initSync } from "./public/cojson_core_wasm.js";
4
4
  // ?module is to support the vercel edge runtime
5
5
  import wasm from "./public/cojson_core_wasm.wasm?module";
6
6
 
7
7
  export async function initialize() {
8
8
  return await __wbg_init({ module_or_path: wasm });
9
9
  }
10
+
11
+ export function initializeSync() {
12
+ return initSync({ module: wasm });
13
+ }
package/index.d.ts CHANGED
@@ -1,3 +1,4 @@
1
1
  export * from "./public/cojson_core_wasm.js";
2
2
 
3
3
  export async function initialize(): Promise<void>;
4
+ export function initializeSync(): void;
package/index.js CHANGED
@@ -1,6 +1,6 @@
1
1
  export * from "./public/cojson_core_wasm.js";
2
2
 
3
- import __wbg_init from "./public/cojson_core_wasm.js";
3
+ import __wbg_init, { initSync } from "./public/cojson_core_wasm.js";
4
4
  import { data } from "./public/cojson_core_wasm.wasm.js";
5
5
 
6
6
  export async function initialize() {
@@ -10,3 +10,28 @@ export async function initialize() {
10
10
 
11
11
  return await __wbg_init({ module_or_path: arrayBuffer });
12
12
  }
13
+
14
+ function base64ToArrayBuffer(base64) {
15
+ // Node.js environment
16
+ if (typeof Buffer !== "undefined") {
17
+ return Buffer.from(base64, "base64").buffer;
18
+ }
19
+
20
+ // Browser / edge-like environment
21
+ if (typeof globalThis !== "undefined" && typeof globalThis.atob === "function") {
22
+ const binary = globalThis.atob(base64);
23
+ const bytes = new Uint8Array(binary.length);
24
+ for (let i = 0; i < binary.length; i++) bytes[i] = binary.charCodeAt(i);
25
+ return bytes.buffer;
26
+ }
27
+
28
+ throw new Error("Unable to decode base64 WASM payload: no atob() or Buffer available.");
29
+ }
30
+
31
+ export function initializeSync() {
32
+ // `data` is a data URL produced by bundlers (e.g. `data:application/wasm;base64,...`).
33
+ // wasm-bindgen's `initSync` accepts raw bytes (BufferSource) or a WebAssembly.Module.
34
+ const base64 = data.split(",")[1];
35
+ const bytes = base64ToArrayBuffer(base64);
36
+ return initSync({ module: bytes });
37
+ }
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "cojson-core-wasm",
3
3
  "type": "module",
4
- "version": "0.19.21",
4
+ "version": "0.20.0",
5
5
  "files": [
6
6
  "public/cojson_core_wasm.js",
7
7
  "public/cojson_core_wasm.d.ts",
@@ -1,84 +1,83 @@
1
1
  /* tslint:disable */
2
2
  /* eslint-disable */
3
3
  /**
4
- * WASM-exposed function for XSalsa20 encryption without authentication.
5
- * - `key`: 32-byte key for encryption
6
- * - `nonce_material`: Raw bytes used to generate a 24-byte nonce via BLAKE3
7
- * - `plaintext`: Raw bytes to encrypt
8
- * Returns the encrypted bytes or throws a JsError if encryption fails.
9
- * Note: This function does not provide authentication. Use encrypt_xsalsa20_poly1305 for authenticated encryption.
4
+ * WASM-exposed function to derive the public key from an Ed25519 signing key.
5
+ * - `signing_key`: 32 bytes of signing key material
6
+ * Returns 32 bytes of public key material or throws JsError if key is invalid.
10
7
  */
11
- export function encryptXsalsa20(key: Uint8Array, nonce_material: Uint8Array, plaintext: Uint8Array): Uint8Array;
8
+ export function ed25519SigningKeyToPublic(signing_key: Uint8Array): Uint8Array;
12
9
  /**
13
- * WASM-exposed function for XSalsa20 decryption without authentication.
14
- * - `key`: 32-byte key for decryption (must match encryption key)
15
- * - `nonce_material`: Raw bytes used to generate a 24-byte nonce (must match encryption)
16
- * - `ciphertext`: Encrypted bytes to decrypt
17
- * Returns the decrypted bytes or throws a JsError if decryption fails.
18
- * Note: This function does not provide authentication. Use decrypt_xsalsa20_poly1305 for authenticated decryption.
10
+ * WASM-exposed function to validate and copy Ed25519 signing key bytes.
11
+ * - `bytes`: 32 bytes of signing key material to validate
12
+ * Returns the same 32 bytes if valid or throws JsError if invalid.
19
13
  */
20
- export function decryptXsalsa20(key: Uint8Array, nonce_material: Uint8Array, ciphertext: Uint8Array): Uint8Array;
14
+ export function ed25519SigningKeyFromBytes(bytes: Uint8Array): Uint8Array;
21
15
  /**
22
- * Generate a new X25519 private key using secure random number generation.
23
- * Returns 32 bytes of raw key material suitable for use with other X25519 functions.
24
- * This key can be reused for multiple Diffie-Hellman exchanges.
16
+ * WASM-exposed function to sign a message using Ed25519.
17
+ * - `signing_key`: 32 bytes of signing key material
18
+ * - `message`: Raw bytes to sign
19
+ * Returns 64 bytes of signature material or throws JsError if signing fails.
25
20
  */
26
- export function newX25519PrivateKey(): Uint8Array;
21
+ export function ed25519Sign(signing_key: Uint8Array, message: Uint8Array): Uint8Array;
27
22
  /**
28
- * WASM-exposed function to derive an X25519 public key from a private key.
29
- * - `private_key`: 32 bytes of private key material
30
- * Returns 32 bytes of public key material or throws JsError if key is invalid.
23
+ * Generate a new Ed25519 signing key using secure random number generation.
24
+ * Returns 32 bytes of raw key material suitable for use with other Ed25519 functions.
31
25
  */
32
- export function x25519PublicKey(private_key: Uint8Array): Uint8Array;
26
+ export function newEd25519SigningKey(): Uint8Array;
33
27
  /**
34
- * WASM-exposed function to perform X25519 Diffie-Hellman key exchange.
35
- * - `private_key`: 32 bytes of private key material
36
- * - `public_key`: 32 bytes of public key material
37
- * Returns 32 bytes of shared secret material or throws JsError if key exchange fails.
28
+ * WASM-exposed function to validate and copy Ed25519 signature bytes.
29
+ * - `bytes`: 64 bytes of signature material to validate
30
+ * Returns the same 64 bytes if valid or throws JsError if invalid.
38
31
  */
39
- export function x25519DiffieHellman(private_key: Uint8Array, public_key: Uint8Array): Uint8Array;
32
+ export function ed25519SignatureFromBytes(bytes: Uint8Array): Uint8Array;
40
33
  /**
41
- * WASM-exposed function to derive a sealer ID from a sealer secret.
42
- * - `secret`: Raw bytes of the sealer secret
43
- * Returns a base58-encoded sealer ID with "sealer_z" prefix or throws JsError if derivation fails.
34
+ * WASM-exposed function to derive an Ed25519 verifying key from a signing key.
35
+ * - `signing_key`: 32 bytes of signing key material
36
+ * Returns 32 bytes of verifying key material or throws JsError if key is invalid.
44
37
  */
45
- export function getSealerId(secret: Uint8Array): string;
38
+ export function ed25519VerifyingKey(signing_key: Uint8Array): Uint8Array;
46
39
  /**
47
- * WASM-exposed function to encrypt bytes with a key secret and nonce material.
48
- * - `value`: The raw bytes to encrypt
49
- * - `key_secret`: A base58-encoded key secret with "keySecret_z" prefix
50
- * - `nonce_material`: Raw bytes used to generate the nonce
51
- * Returns the encrypted bytes or throws a JsError if encryption fails.
40
+ * WASM-exposed function to sign a message with an Ed25519 signing key.
41
+ * - `signing_key`: 32 bytes of signing key material
42
+ * - `message`: Raw bytes to sign
43
+ * Returns 64 bytes of signature material or throws JsError if signing fails.
52
44
  */
53
- export function encrypt(value: Uint8Array, key_secret: string, nonce_material: Uint8Array): Uint8Array;
45
+ export function ed25519SigningKeySign(signing_key: Uint8Array, message: Uint8Array): Uint8Array;
54
46
  /**
55
- * WASM-exposed function to decrypt bytes with a key secret and nonce material.
56
- * - `ciphertext`: The encrypted bytes to decrypt
57
- * - `key_secret`: A base58-encoded key secret with "keySecret_z" prefix
58
- * - `nonce_material`: Raw bytes used to generate the nonce (must match encryption)
59
- * Returns the decrypted bytes or throws a JsError if decryption fails.
47
+ * WASM-exposed function to validate and copy Ed25519 verifying key bytes.
48
+ * - `bytes`: 32 bytes of verifying key material to validate
49
+ * Returns the same 32 bytes if valid or throws JsError if invalid.
60
50
  */
61
- export function decrypt(ciphertext: Uint8Array, key_secret: string, nonce_material: Uint8Array): Uint8Array;
51
+ export function ed25519VerifyingKeyFromBytes(bytes: Uint8Array): Uint8Array;
62
52
  /**
63
- * WASM-exposed function for sealing a message using X25519 + XSalsa20-Poly1305.
64
- * Provides authenticated encryption with perfect forward secrecy.
65
- * - `message`: Raw bytes to seal
66
- * - `sender_secret`: Base58-encoded sender's private key with "sealerSecret_z" prefix
67
- * - `recipient_id`: Base58-encoded recipient's public key with "sealer_z" prefix
68
- * - `nonce_material`: Raw bytes used to generate the nonce
69
- * Returns sealed bytes or throws JsError if sealing fails.
53
+ * WASM-exposed function to verify an Ed25519 signature.
54
+ * - `verifying_key`: 32 bytes of verifying key material
55
+ * - `message`: Raw bytes that were signed
56
+ * - `signature`: 64 bytes of signature material
57
+ * Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
70
58
  */
71
- export function seal(message: Uint8Array, sender_secret: string, recipient_id: string, nonce_material: Uint8Array): Uint8Array;
59
+ export function ed25519Verify(verifying_key: Uint8Array, message: Uint8Array, signature: Uint8Array): boolean;
72
60
  /**
73
- * WASM-exposed function for unsealing a message using X25519 + XSalsa20-Poly1305.
74
- * Provides authenticated decryption with perfect forward secrecy.
75
- * - `sealed_message`: The sealed bytes to decrypt
76
- * - `recipient_secret`: Base58-encoded recipient's private key with "sealerSecret_z" prefix
77
- * - `sender_id`: Base58-encoded sender's public key with "sealer_z" prefix
78
- * - `nonce_material`: Raw bytes used to generate the nonce (must match sealing)
79
- * Returns unsealed bytes or throws JsError if unsealing fails.
61
+ * WASM-exposed function to derive a signer ID from a signing key.
62
+ * - `secret`: Raw Ed25519 signing key bytes
63
+ * Returns base58-encoded verifying key with "signer_z" prefix or throws JsError if derivation fails.
80
64
  */
81
- export function unseal(sealed_message: Uint8Array, recipient_secret: string, sender_id: string, nonce_material: Uint8Array): Uint8Array;
65
+ export function getSignerId(secret: Uint8Array): string;
66
+ /**
67
+ * WASM-exposed function to sign a message using Ed25519.
68
+ * - `message`: Raw bytes to sign
69
+ * - `secret`: Raw Ed25519 signing key bytes
70
+ * Returns base58-encoded signature with "signature_z" prefix or throws JsError if signing fails.
71
+ */
72
+ export function sign(message: Uint8Array, secret: Uint8Array): string;
73
+ /**
74
+ * WASM-exposed function to verify an Ed25519 signature.
75
+ * - `signature`: Raw signature bytes
76
+ * - `message`: Raw bytes that were signed
77
+ * - `id`: Raw Ed25519 verifying key bytes
78
+ * Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
79
+ */
80
+ export function verify(signature: Uint8Array, message: Uint8Array, id: Uint8Array): boolean;
82
81
  /**
83
82
  * Generate a 24-byte nonce from input material using BLAKE3.
84
83
  * - `nonce_material`: Raw bytes to derive the nonce from
@@ -102,99 +101,117 @@ export function blake3HashOnce(data: Uint8Array): Uint8Array;
102
101
  */
103
102
  export function blake3HashOnceWithContext(data: Uint8Array, context: Uint8Array): Uint8Array;
104
103
  /**
105
- * WASM-exposed function to sign a message using Ed25519.
106
- * - `message`: Raw bytes to sign
107
- * - `secret`: Raw Ed25519 signing key bytes
108
- * Returns base58-encoded signature with "signature_z" prefix or throws JsError if signing fails.
109
- */
110
- export function sign(message: Uint8Array, secret: Uint8Array): string;
111
- /**
112
- * WASM-exposed function to verify an Ed25519 signature.
113
- * - `signature`: Raw signature bytes
114
- * - `message`: Raw bytes that were signed
115
- * - `id`: Raw Ed25519 verifying key bytes
116
- * Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
117
- */
118
- export function verify(signature: Uint8Array, message: Uint8Array, id: Uint8Array): boolean;
119
- /**
120
- * WASM-exposed function to derive a signer ID from a signing key.
121
- * - `secret`: Raw Ed25519 signing key bytes
122
- * Returns base58-encoded verifying key with "signer_z" prefix or throws JsError if derivation fails.
104
+ * WASM-exposed function for XSalsa20 decryption without authentication.
105
+ * - `key`: 32-byte key for decryption (must match encryption key)
106
+ * - `nonce_material`: Raw bytes used to generate a 24-byte nonce (must match encryption)
107
+ * - `ciphertext`: Encrypted bytes to decrypt
108
+ * Returns the decrypted bytes or throws a JsError if decryption fails.
109
+ * Note: This function does not provide authentication. Use decrypt_xsalsa20_poly1305 for authenticated decryption.
123
110
  */
124
- export function getSignerId(secret: Uint8Array): string;
111
+ export function decryptXsalsa20(key: Uint8Array, nonce_material: Uint8Array, ciphertext: Uint8Array): Uint8Array;
125
112
  /**
126
- * Generate a new Ed25519 signing key using secure random number generation.
127
- * Returns 32 bytes of raw key material suitable for use with other Ed25519 functions.
113
+ * WASM-exposed function for XSalsa20 encryption without authentication.
114
+ * - `key`: 32-byte key for encryption
115
+ * - `nonce_material`: Raw bytes used to generate a 24-byte nonce via BLAKE3
116
+ * - `plaintext`: Raw bytes to encrypt
117
+ * Returns the encrypted bytes or throws a JsError if encryption fails.
118
+ * Note: This function does not provide authentication. Use encrypt_xsalsa20_poly1305 for authenticated encryption.
128
119
  */
129
- export function newEd25519SigningKey(): Uint8Array;
120
+ export function encryptXsalsa20(key: Uint8Array, nonce_material: Uint8Array, plaintext: Uint8Array): Uint8Array;
130
121
  /**
131
- * WASM-exposed function to derive an Ed25519 verifying key from a signing key.
132
- * - `signing_key`: 32 bytes of signing key material
133
- * Returns 32 bytes of verifying key material or throws JsError if key is invalid.
122
+ * WASM-exposed function for unsealing a message using X25519 + XSalsa20-Poly1305.
123
+ * Provides authenticated decryption with perfect forward secrecy.
124
+ * - `sealed_message`: The sealed bytes to decrypt
125
+ * - `recipient_secret`: Base58-encoded recipient's private key with "sealerSecret_z" prefix
126
+ * - `sender_id`: Base58-encoded sender's public key with "sealer_z" prefix
127
+ * - `nonce_material`: Raw bytes used to generate the nonce (must match sealing)
128
+ * Returns unsealed bytes or throws JsError if unsealing fails.
134
129
  */
135
- export function ed25519VerifyingKey(signing_key: Uint8Array): Uint8Array;
130
+ export function unseal(sealed_message: Uint8Array, recipient_secret: string, sender_id: string, nonce_material: Uint8Array): Uint8Array;
136
131
  /**
137
- * WASM-exposed function to sign a message using Ed25519.
138
- * - `signing_key`: 32 bytes of signing key material
139
- * - `message`: Raw bytes to sign
140
- * Returns 64 bytes of signature material or throws JsError if signing fails.
132
+ * WASM-exposed function for sealing a message using X25519 + XSalsa20-Poly1305.
133
+ * Provides authenticated encryption with perfect forward secrecy.
134
+ * - `message`: Raw bytes to seal
135
+ * - `sender_secret`: Base58-encoded sender's private key with "sealerSecret_z" prefix
136
+ * - `recipient_id`: Base58-encoded recipient's public key with "sealer_z" prefix
137
+ * - `nonce_material`: Raw bytes used to generate the nonce
138
+ * Returns sealed bytes or throws JsError if sealing fails.
141
139
  */
142
- export function ed25519Sign(signing_key: Uint8Array, message: Uint8Array): Uint8Array;
140
+ export function seal(message: Uint8Array, sender_secret: string, recipient_id: string, nonce_material: Uint8Array): Uint8Array;
143
141
  /**
144
- * WASM-exposed function to verify an Ed25519 signature.
145
- * - `verifying_key`: 32 bytes of verifying key material
146
- * - `message`: Raw bytes that were signed
147
- * - `signature`: 64 bytes of signature material
148
- * Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
142
+ * WASM-exposed function to encrypt bytes with a key secret and nonce material.
143
+ * - `value`: The raw bytes to encrypt
144
+ * - `key_secret`: A base58-encoded key secret with "keySecret_z" prefix
145
+ * - `nonce_material`: Raw bytes used to generate the nonce
146
+ * Returns the encrypted bytes or throws a JsError if encryption fails.
149
147
  */
150
- export function ed25519Verify(verifying_key: Uint8Array, message: Uint8Array, signature: Uint8Array): boolean;
148
+ export function encrypt(value: Uint8Array, key_secret: string, nonce_material: Uint8Array): Uint8Array;
151
149
  /**
152
- * WASM-exposed function to validate and copy Ed25519 signing key bytes.
153
- * - `bytes`: 32 bytes of signing key material to validate
154
- * Returns the same 32 bytes if valid or throws JsError if invalid.
150
+ * WASM-exposed function to decrypt bytes with a key secret and nonce material.
151
+ * - `ciphertext`: The encrypted bytes to decrypt
152
+ * - `key_secret`: A base58-encoded key secret with "keySecret_z" prefix
153
+ * - `nonce_material`: Raw bytes used to generate the nonce (must match encryption)
154
+ * Returns the decrypted bytes or throws a JsError if decryption fails.
155
155
  */
156
- export function ed25519SigningKeyFromBytes(bytes: Uint8Array): Uint8Array;
156
+ export function decrypt(ciphertext: Uint8Array, key_secret: string, nonce_material: Uint8Array): Uint8Array;
157
157
  /**
158
- * WASM-exposed function to derive the public key from an Ed25519 signing key.
159
- * - `signing_key`: 32 bytes of signing key material
158
+ * WASM-exposed function to derive an X25519 public key from a private key.
159
+ * - `private_key`: 32 bytes of private key material
160
160
  * Returns 32 bytes of public key material or throws JsError if key is invalid.
161
161
  */
162
- export function ed25519SigningKeyToPublic(signing_key: Uint8Array): Uint8Array;
162
+ export function x25519PublicKey(private_key: Uint8Array): Uint8Array;
163
163
  /**
164
- * WASM-exposed function to sign a message with an Ed25519 signing key.
165
- * - `signing_key`: 32 bytes of signing key material
166
- * - `message`: Raw bytes to sign
167
- * Returns 64 bytes of signature material or throws JsError if signing fails.
164
+ * WASM-exposed function to perform X25519 Diffie-Hellman key exchange.
165
+ * - `private_key`: 32 bytes of private key material
166
+ * - `public_key`: 32 bytes of public key material
167
+ * Returns 32 bytes of shared secret material or throws JsError if key exchange fails.
168
168
  */
169
- export function ed25519SigningKeySign(signing_key: Uint8Array, message: Uint8Array): Uint8Array;
169
+ export function x25519DiffieHellman(private_key: Uint8Array, public_key: Uint8Array): Uint8Array;
170
170
  /**
171
- * WASM-exposed function to validate and copy Ed25519 verifying key bytes.
172
- * - `bytes`: 32 bytes of verifying key material to validate
173
- * Returns the same 32 bytes if valid or throws JsError if invalid.
171
+ * WASM-exposed function to derive a sealer ID from a sealer secret.
172
+ * - `secret`: Raw bytes of the sealer secret
173
+ * Returns a base58-encoded sealer ID with "sealer_z" prefix or throws JsError if derivation fails.
174
174
  */
175
- export function ed25519VerifyingKeyFromBytes(bytes: Uint8Array): Uint8Array;
175
+ export function getSealerId(secret: Uint8Array): string;
176
176
  /**
177
- * WASM-exposed function to validate and copy Ed25519 signature bytes.
178
- * - `bytes`: 64 bytes of signature material to validate
179
- * Returns the same 64 bytes if valid or throws JsError if invalid.
177
+ * Generate a new X25519 private key using secure random number generation.
178
+ * Returns 32 bytes of raw key material suitable for use with other X25519 functions.
179
+ * This key can be reused for multiple Diffie-Hellman exchanges.
180
180
  */
181
- export function ed25519SignatureFromBytes(bytes: Uint8Array): Uint8Array;
181
+ export function newX25519PrivateKey(): Uint8Array;
182
182
  export class Blake3Hasher {
183
183
  free(): void;
184
184
  constructor();
185
+ clone(): Blake3Hasher;
185
186
  update(data: Uint8Array): void;
186
187
  finalize(): Uint8Array;
187
- clone(): Blake3Hasher;
188
188
  }
189
189
  export class SessionLog {
190
190
  free(): void;
191
- constructor(co_id: string, session_id: string, signer_id?: string | null);
192
- clone(): SessionLog;
193
- tryAdd(transactions_json: string[], new_signature_str: string, skip_verify: boolean): void;
191
+ /**
192
+ * Commit pending transactions to the main state.
193
+ * If skip_validate is false, validates the signature first.
194
+ * If skip_validate is true, commits without validation.
195
+ */
196
+ commitTransactions(new_signature_str: string, skip_validate: boolean): void;
194
197
  addNewPrivateTransaction(changes_json: string, signer_secret: string, encryption_key: string, key_id: string, made_at: number, meta?: string | null): string;
195
198
  addNewTrustingTransaction(changes_json: string, signer_secret: string, made_at: number, meta?: string | null): string;
196
- decryptNextTransactionChangesJson(tx_index: number, encryption_key: string): string;
199
+ /**
200
+ * Add an existing private transaction to the staging area.
201
+ * The transaction is NOT committed until commitTransactions() succeeds.
202
+ * Note: made_at uses f64 because JavaScript's number type is f64.
203
+ */
204
+ addExistingPrivateTransaction(encrypted_changes: string, key_used: string, made_at: number, meta?: string | null): void;
205
+ /**
206
+ * Add an existing trusting transaction to the staging area.
207
+ * The transaction is NOT committed until commitTransactions() succeeds.
208
+ * Note: made_at uses f64 because JavaScript's number type is f64.
209
+ */
210
+ addExistingTrustingTransaction(changes: string, made_at: number, meta?: string | null): void;
197
211
  decryptNextTransactionMetaJson(tx_index: number, encryption_key: string): string | undefined;
212
+ decryptNextTransactionChangesJson(tx_index: number, encryption_key: string): string;
213
+ constructor(co_id: string, session_id: string, signer_id?: string | null);
214
+ clone(): SessionLog;
198
215
  }
199
216
 
200
217
  export type InitInput = RequestInfo | URL | Response | BufferSource | WebAssembly.Module;
@@ -202,43 +219,45 @@ export type InitInput = RequestInfo | URL | Response | BufferSource | WebAssembl
202
219
  export interface InitOutput {
203
220
  readonly memory: WebAssembly.Memory;
204
221
  readonly __wbg_sessionlog_free: (a: number, b: number) => void;
205
- readonly sessionlog_new: (a: number, b: number, c: number, d: number, e: number, f: number) => number;
206
- readonly sessionlog_clone: (a: number) => number;
207
- readonly sessionlog_tryAdd: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number];
222
+ readonly sessionlog_addExistingPrivateTransaction: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number];
223
+ readonly sessionlog_addExistingTrustingTransaction: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number];
208
224
  readonly sessionlog_addNewPrivateTransaction: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number, i: number, j: number, k: number, l: number) => [number, number, number, number];
209
225
  readonly sessionlog_addNewTrustingTransaction: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
226
+ readonly sessionlog_clone: (a: number) => number;
227
+ readonly sessionlog_commitTransactions: (a: number, b: number, c: number, d: number) => [number, number];
210
228
  readonly sessionlog_decryptNextTransactionChangesJson: (a: number, b: number, c: number, d: number) => [number, number, number, number];
211
229
  readonly sessionlog_decryptNextTransactionMetaJson: (a: number, b: number, c: number, d: number) => [number, number, number, number];
212
- readonly encryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
213
- readonly decryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
214
- readonly newX25519PrivateKey: () => [number, number];
215
- readonly x25519PublicKey: (a: number, b: number) => [number, number, number, number];
216
- readonly x25519DiffieHellman: (a: number, b: number, c: number, d: number) => [number, number, number, number];
217
- readonly getSealerId: (a: number, b: number) => [number, number, number, number];
218
- readonly encrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
219
- readonly decrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
220
- readonly seal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
221
- readonly unseal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
222
- readonly generateNonce: (a: number, b: number) => [number, number];
223
- readonly blake3HashOnce: (a: number, b: number) => [number, number];
224
- readonly blake3HashOnceWithContext: (a: number, b: number, c: number, d: number) => [number, number];
225
- readonly __wbg_blake3hasher_free: (a: number, b: number) => void;
226
- readonly blake3hasher_new: () => number;
227
- readonly blake3hasher_update: (a: number, b: number, c: number) => void;
228
- readonly blake3hasher_finalize: (a: number) => [number, number];
229
- readonly blake3hasher_clone: (a: number) => number;
230
- readonly sign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
231
- readonly verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
232
- readonly getSignerId: (a: number, b: number) => [number, number, number, number];
233
- readonly newEd25519SigningKey: () => [number, number];
234
- readonly ed25519VerifyingKey: (a: number, b: number) => [number, number, number, number];
230
+ readonly sessionlog_new: (a: number, b: number, c: number, d: number, e: number, f: number) => number;
235
231
  readonly ed25519Sign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
236
- readonly ed25519Verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
232
+ readonly ed25519SignatureFromBytes: (a: number, b: number) => [number, number, number, number];
237
233
  readonly ed25519SigningKeyFromBytes: (a: number, b: number) => [number, number, number, number];
238
234
  readonly ed25519SigningKeyToPublic: (a: number, b: number) => [number, number, number, number];
235
+ readonly ed25519Verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
236
+ readonly ed25519VerifyingKey: (a: number, b: number) => [number, number, number, number];
239
237
  readonly ed25519VerifyingKeyFromBytes: (a: number, b: number) => [number, number, number, number];
240
- readonly ed25519SignatureFromBytes: (a: number, b: number) => [number, number, number, number];
238
+ readonly newEd25519SigningKey: () => [number, number];
241
239
  readonly ed25519SigningKeySign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
240
+ readonly getSignerId: (a: number, b: number) => [number, number, number, number];
241
+ readonly sign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
242
+ readonly verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
243
+ readonly __wbg_blake3hasher_free: (a: number, b: number) => void;
244
+ readonly blake3HashOnce: (a: number, b: number) => [number, number];
245
+ readonly blake3HashOnceWithContext: (a: number, b: number, c: number, d: number) => [number, number];
246
+ readonly blake3hasher_clone: (a: number) => number;
247
+ readonly blake3hasher_finalize: (a: number) => [number, number];
248
+ readonly blake3hasher_new: () => number;
249
+ readonly blake3hasher_update: (a: number, b: number, c: number) => void;
250
+ readonly decryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
251
+ readonly encryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
252
+ readonly generateNonce: (a: number, b: number) => [number, number];
253
+ readonly decrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
254
+ readonly encrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
255
+ readonly seal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
256
+ readonly unseal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
257
+ readonly getSealerId: (a: number, b: number) => [number, number, number, number];
258
+ readonly newX25519PrivateKey: () => [number, number];
259
+ readonly x25519DiffieHellman: (a: number, b: number, c: number, d: number) => [number, number, number, number];
260
+ readonly x25519PublicKey: (a: number, b: number) => [number, number, number, number];
242
261
  readonly __wbindgen_malloc: (a: number, b: number) => number;
243
262
  readonly __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
244
263
  readonly __wbindgen_exn_store: (a: number) => void;