cojson-core-wasm 0.19.21 → 0.20.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/edge-lite.js +5 -1
- package/index.d.ts +1 -0
- package/index.js +26 -1
- package/package.json +1 -1
- package/public/cojson_core_wasm.d.ts +168 -149
- package/public/cojson_core_wasm.js +430 -409
- package/public/cojson_core_wasm.wasm +0 -0
- package/public/cojson_core_wasm.wasm.js +1 -1
package/edge-lite.js
CHANGED
|
@@ -1,9 +1,13 @@
|
|
|
1
1
|
export * from "./public/cojson_core_wasm.js";
|
|
2
2
|
|
|
3
|
-
import __wbg_init from "./public/cojson_core_wasm.js";
|
|
3
|
+
import __wbg_init, { initSync } from "./public/cojson_core_wasm.js";
|
|
4
4
|
// ?module is to support the vercel edge runtime
|
|
5
5
|
import wasm from "./public/cojson_core_wasm.wasm?module";
|
|
6
6
|
|
|
7
7
|
export async function initialize() {
|
|
8
8
|
return await __wbg_init({ module_or_path: wasm });
|
|
9
9
|
}
|
|
10
|
+
|
|
11
|
+
export function initializeSync() {
|
|
12
|
+
return initSync({ module: wasm });
|
|
13
|
+
}
|
package/index.d.ts
CHANGED
package/index.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
export * from "./public/cojson_core_wasm.js";
|
|
2
2
|
|
|
3
|
-
import __wbg_init from "./public/cojson_core_wasm.js";
|
|
3
|
+
import __wbg_init, { initSync } from "./public/cojson_core_wasm.js";
|
|
4
4
|
import { data } from "./public/cojson_core_wasm.wasm.js";
|
|
5
5
|
|
|
6
6
|
export async function initialize() {
|
|
@@ -10,3 +10,28 @@ export async function initialize() {
|
|
|
10
10
|
|
|
11
11
|
return await __wbg_init({ module_or_path: arrayBuffer });
|
|
12
12
|
}
|
|
13
|
+
|
|
14
|
+
function base64ToArrayBuffer(base64) {
|
|
15
|
+
// Node.js environment
|
|
16
|
+
if (typeof Buffer !== "undefined") {
|
|
17
|
+
return Buffer.from(base64, "base64").buffer;
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
// Browser / edge-like environment
|
|
21
|
+
if (typeof globalThis !== "undefined" && typeof globalThis.atob === "function") {
|
|
22
|
+
const binary = globalThis.atob(base64);
|
|
23
|
+
const bytes = new Uint8Array(binary.length);
|
|
24
|
+
for (let i = 0; i < binary.length; i++) bytes[i] = binary.charCodeAt(i);
|
|
25
|
+
return bytes.buffer;
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
throw new Error("Unable to decode base64 WASM payload: no atob() or Buffer available.");
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
export function initializeSync() {
|
|
32
|
+
// `data` is a data URL produced by bundlers (e.g. `data:application/wasm;base64,...`).
|
|
33
|
+
// wasm-bindgen's `initSync` accepts raw bytes (BufferSource) or a WebAssembly.Module.
|
|
34
|
+
const base64 = data.split(",")[1];
|
|
35
|
+
const bytes = base64ToArrayBuffer(base64);
|
|
36
|
+
return initSync({ module: bytes });
|
|
37
|
+
}
|
package/package.json
CHANGED
|
@@ -1,84 +1,83 @@
|
|
|
1
1
|
/* tslint:disable */
|
|
2
2
|
/* eslint-disable */
|
|
3
3
|
/**
|
|
4
|
-
* WASM-exposed function
|
|
5
|
-
* - `
|
|
6
|
-
*
|
|
7
|
-
* - `plaintext`: Raw bytes to encrypt
|
|
8
|
-
* Returns the encrypted bytes or throws a JsError if encryption fails.
|
|
9
|
-
* Note: This function does not provide authentication. Use encrypt_xsalsa20_poly1305 for authenticated encryption.
|
|
4
|
+
* WASM-exposed function to derive the public key from an Ed25519 signing key.
|
|
5
|
+
* - `signing_key`: 32 bytes of signing key material
|
|
6
|
+
* Returns 32 bytes of public key material or throws JsError if key is invalid.
|
|
10
7
|
*/
|
|
11
|
-
export function
|
|
8
|
+
export function ed25519SigningKeyToPublic(signing_key: Uint8Array): Uint8Array;
|
|
12
9
|
/**
|
|
13
|
-
* WASM-exposed function
|
|
14
|
-
* - `
|
|
15
|
-
*
|
|
16
|
-
* - `ciphertext`: Encrypted bytes to decrypt
|
|
17
|
-
* Returns the decrypted bytes or throws a JsError if decryption fails.
|
|
18
|
-
* Note: This function does not provide authentication. Use decrypt_xsalsa20_poly1305 for authenticated decryption.
|
|
10
|
+
* WASM-exposed function to validate and copy Ed25519 signing key bytes.
|
|
11
|
+
* - `bytes`: 32 bytes of signing key material to validate
|
|
12
|
+
* Returns the same 32 bytes if valid or throws JsError if invalid.
|
|
19
13
|
*/
|
|
20
|
-
export function
|
|
14
|
+
export function ed25519SigningKeyFromBytes(bytes: Uint8Array): Uint8Array;
|
|
21
15
|
/**
|
|
22
|
-
*
|
|
23
|
-
*
|
|
24
|
-
*
|
|
16
|
+
* WASM-exposed function to sign a message using Ed25519.
|
|
17
|
+
* - `signing_key`: 32 bytes of signing key material
|
|
18
|
+
* - `message`: Raw bytes to sign
|
|
19
|
+
* Returns 64 bytes of signature material or throws JsError if signing fails.
|
|
25
20
|
*/
|
|
26
|
-
export function
|
|
21
|
+
export function ed25519Sign(signing_key: Uint8Array, message: Uint8Array): Uint8Array;
|
|
27
22
|
/**
|
|
28
|
-
*
|
|
29
|
-
*
|
|
30
|
-
* Returns 32 bytes of public key material or throws JsError if key is invalid.
|
|
23
|
+
* Generate a new Ed25519 signing key using secure random number generation.
|
|
24
|
+
* Returns 32 bytes of raw key material suitable for use with other Ed25519 functions.
|
|
31
25
|
*/
|
|
32
|
-
export function
|
|
26
|
+
export function newEd25519SigningKey(): Uint8Array;
|
|
33
27
|
/**
|
|
34
|
-
* WASM-exposed function to
|
|
35
|
-
* - `
|
|
36
|
-
*
|
|
37
|
-
* Returns 32 bytes of shared secret material or throws JsError if key exchange fails.
|
|
28
|
+
* WASM-exposed function to validate and copy Ed25519 signature bytes.
|
|
29
|
+
* - `bytes`: 64 bytes of signature material to validate
|
|
30
|
+
* Returns the same 64 bytes if valid or throws JsError if invalid.
|
|
38
31
|
*/
|
|
39
|
-
export function
|
|
32
|
+
export function ed25519SignatureFromBytes(bytes: Uint8Array): Uint8Array;
|
|
40
33
|
/**
|
|
41
|
-
* WASM-exposed function to derive
|
|
42
|
-
* - `
|
|
43
|
-
* Returns
|
|
34
|
+
* WASM-exposed function to derive an Ed25519 verifying key from a signing key.
|
|
35
|
+
* - `signing_key`: 32 bytes of signing key material
|
|
36
|
+
* Returns 32 bytes of verifying key material or throws JsError if key is invalid.
|
|
44
37
|
*/
|
|
45
|
-
export function
|
|
38
|
+
export function ed25519VerifyingKey(signing_key: Uint8Array): Uint8Array;
|
|
46
39
|
/**
|
|
47
|
-
* WASM-exposed function to
|
|
48
|
-
* - `
|
|
49
|
-
* - `
|
|
50
|
-
*
|
|
51
|
-
* Returns the encrypted bytes or throws a JsError if encryption fails.
|
|
40
|
+
* WASM-exposed function to sign a message with an Ed25519 signing key.
|
|
41
|
+
* - `signing_key`: 32 bytes of signing key material
|
|
42
|
+
* - `message`: Raw bytes to sign
|
|
43
|
+
* Returns 64 bytes of signature material or throws JsError if signing fails.
|
|
52
44
|
*/
|
|
53
|
-
export function
|
|
45
|
+
export function ed25519SigningKeySign(signing_key: Uint8Array, message: Uint8Array): Uint8Array;
|
|
54
46
|
/**
|
|
55
|
-
* WASM-exposed function to
|
|
56
|
-
* - `
|
|
57
|
-
*
|
|
58
|
-
* - `nonce_material`: Raw bytes used to generate the nonce (must match encryption)
|
|
59
|
-
* Returns the decrypted bytes or throws a JsError if decryption fails.
|
|
47
|
+
* WASM-exposed function to validate and copy Ed25519 verifying key bytes.
|
|
48
|
+
* - `bytes`: 32 bytes of verifying key material to validate
|
|
49
|
+
* Returns the same 32 bytes if valid or throws JsError if invalid.
|
|
60
50
|
*/
|
|
61
|
-
export function
|
|
51
|
+
export function ed25519VerifyingKeyFromBytes(bytes: Uint8Array): Uint8Array;
|
|
62
52
|
/**
|
|
63
|
-
* WASM-exposed function
|
|
64
|
-
*
|
|
65
|
-
* - `message`: Raw bytes
|
|
66
|
-
* - `
|
|
67
|
-
*
|
|
68
|
-
* - `nonce_material`: Raw bytes used to generate the nonce
|
|
69
|
-
* Returns sealed bytes or throws JsError if sealing fails.
|
|
53
|
+
* WASM-exposed function to verify an Ed25519 signature.
|
|
54
|
+
* - `verifying_key`: 32 bytes of verifying key material
|
|
55
|
+
* - `message`: Raw bytes that were signed
|
|
56
|
+
* - `signature`: 64 bytes of signature material
|
|
57
|
+
* Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
|
|
70
58
|
*/
|
|
71
|
-
export function
|
|
59
|
+
export function ed25519Verify(verifying_key: Uint8Array, message: Uint8Array, signature: Uint8Array): boolean;
|
|
72
60
|
/**
|
|
73
|
-
* WASM-exposed function
|
|
74
|
-
*
|
|
75
|
-
* -
|
|
76
|
-
* - `recipient_secret`: Base58-encoded recipient's private key with "sealerSecret_z" prefix
|
|
77
|
-
* - `sender_id`: Base58-encoded sender's public key with "sealer_z" prefix
|
|
78
|
-
* - `nonce_material`: Raw bytes used to generate the nonce (must match sealing)
|
|
79
|
-
* Returns unsealed bytes or throws JsError if unsealing fails.
|
|
61
|
+
* WASM-exposed function to derive a signer ID from a signing key.
|
|
62
|
+
* - `secret`: Raw Ed25519 signing key bytes
|
|
63
|
+
* Returns base58-encoded verifying key with "signer_z" prefix or throws JsError if derivation fails.
|
|
80
64
|
*/
|
|
81
|
-
export function
|
|
65
|
+
export function getSignerId(secret: Uint8Array): string;
|
|
66
|
+
/**
|
|
67
|
+
* WASM-exposed function to sign a message using Ed25519.
|
|
68
|
+
* - `message`: Raw bytes to sign
|
|
69
|
+
* - `secret`: Raw Ed25519 signing key bytes
|
|
70
|
+
* Returns base58-encoded signature with "signature_z" prefix or throws JsError if signing fails.
|
|
71
|
+
*/
|
|
72
|
+
export function sign(message: Uint8Array, secret: Uint8Array): string;
|
|
73
|
+
/**
|
|
74
|
+
* WASM-exposed function to verify an Ed25519 signature.
|
|
75
|
+
* - `signature`: Raw signature bytes
|
|
76
|
+
* - `message`: Raw bytes that were signed
|
|
77
|
+
* - `id`: Raw Ed25519 verifying key bytes
|
|
78
|
+
* Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
|
|
79
|
+
*/
|
|
80
|
+
export function verify(signature: Uint8Array, message: Uint8Array, id: Uint8Array): boolean;
|
|
82
81
|
/**
|
|
83
82
|
* Generate a 24-byte nonce from input material using BLAKE3.
|
|
84
83
|
* - `nonce_material`: Raw bytes to derive the nonce from
|
|
@@ -102,99 +101,117 @@ export function blake3HashOnce(data: Uint8Array): Uint8Array;
|
|
|
102
101
|
*/
|
|
103
102
|
export function blake3HashOnceWithContext(data: Uint8Array, context: Uint8Array): Uint8Array;
|
|
104
103
|
/**
|
|
105
|
-
* WASM-exposed function
|
|
106
|
-
* - `
|
|
107
|
-
* - `
|
|
108
|
-
*
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
/**
|
|
112
|
-
* WASM-exposed function to verify an Ed25519 signature.
|
|
113
|
-
* - `signature`: Raw signature bytes
|
|
114
|
-
* - `message`: Raw bytes that were signed
|
|
115
|
-
* - `id`: Raw Ed25519 verifying key bytes
|
|
116
|
-
* Returns true if signature is valid, false otherwise, or throws JsError if verification fails.
|
|
117
|
-
*/
|
|
118
|
-
export function verify(signature: Uint8Array, message: Uint8Array, id: Uint8Array): boolean;
|
|
119
|
-
/**
|
|
120
|
-
* WASM-exposed function to derive a signer ID from a signing key.
|
|
121
|
-
* - `secret`: Raw Ed25519 signing key bytes
|
|
122
|
-
* Returns base58-encoded verifying key with "signer_z" prefix or throws JsError if derivation fails.
|
|
104
|
+
* WASM-exposed function for XSalsa20 decryption without authentication.
|
|
105
|
+
* - `key`: 32-byte key for decryption (must match encryption key)
|
|
106
|
+
* - `nonce_material`: Raw bytes used to generate a 24-byte nonce (must match encryption)
|
|
107
|
+
* - `ciphertext`: Encrypted bytes to decrypt
|
|
108
|
+
* Returns the decrypted bytes or throws a JsError if decryption fails.
|
|
109
|
+
* Note: This function does not provide authentication. Use decrypt_xsalsa20_poly1305 for authenticated decryption.
|
|
123
110
|
*/
|
|
124
|
-
export function
|
|
111
|
+
export function decryptXsalsa20(key: Uint8Array, nonce_material: Uint8Array, ciphertext: Uint8Array): Uint8Array;
|
|
125
112
|
/**
|
|
126
|
-
*
|
|
127
|
-
*
|
|
113
|
+
* WASM-exposed function for XSalsa20 encryption without authentication.
|
|
114
|
+
* - `key`: 32-byte key for encryption
|
|
115
|
+
* - `nonce_material`: Raw bytes used to generate a 24-byte nonce via BLAKE3
|
|
116
|
+
* - `plaintext`: Raw bytes to encrypt
|
|
117
|
+
* Returns the encrypted bytes or throws a JsError if encryption fails.
|
|
118
|
+
* Note: This function does not provide authentication. Use encrypt_xsalsa20_poly1305 for authenticated encryption.
|
|
128
119
|
*/
|
|
129
|
-
export function
|
|
120
|
+
export function encryptXsalsa20(key: Uint8Array, nonce_material: Uint8Array, plaintext: Uint8Array): Uint8Array;
|
|
130
121
|
/**
|
|
131
|
-
* WASM-exposed function
|
|
132
|
-
*
|
|
133
|
-
*
|
|
122
|
+
* WASM-exposed function for unsealing a message using X25519 + XSalsa20-Poly1305.
|
|
123
|
+
* Provides authenticated decryption with perfect forward secrecy.
|
|
124
|
+
* - `sealed_message`: The sealed bytes to decrypt
|
|
125
|
+
* - `recipient_secret`: Base58-encoded recipient's private key with "sealerSecret_z" prefix
|
|
126
|
+
* - `sender_id`: Base58-encoded sender's public key with "sealer_z" prefix
|
|
127
|
+
* - `nonce_material`: Raw bytes used to generate the nonce (must match sealing)
|
|
128
|
+
* Returns unsealed bytes or throws JsError if unsealing fails.
|
|
134
129
|
*/
|
|
135
|
-
export function
|
|
130
|
+
export function unseal(sealed_message: Uint8Array, recipient_secret: string, sender_id: string, nonce_material: Uint8Array): Uint8Array;
|
|
136
131
|
/**
|
|
137
|
-
* WASM-exposed function
|
|
138
|
-
*
|
|
139
|
-
* - `message`: Raw bytes to
|
|
140
|
-
*
|
|
132
|
+
* WASM-exposed function for sealing a message using X25519 + XSalsa20-Poly1305.
|
|
133
|
+
* Provides authenticated encryption with perfect forward secrecy.
|
|
134
|
+
* - `message`: Raw bytes to seal
|
|
135
|
+
* - `sender_secret`: Base58-encoded sender's private key with "sealerSecret_z" prefix
|
|
136
|
+
* - `recipient_id`: Base58-encoded recipient's public key with "sealer_z" prefix
|
|
137
|
+
* - `nonce_material`: Raw bytes used to generate the nonce
|
|
138
|
+
* Returns sealed bytes or throws JsError if sealing fails.
|
|
141
139
|
*/
|
|
142
|
-
export function
|
|
140
|
+
export function seal(message: Uint8Array, sender_secret: string, recipient_id: string, nonce_material: Uint8Array): Uint8Array;
|
|
143
141
|
/**
|
|
144
|
-
* WASM-exposed function to
|
|
145
|
-
* - `
|
|
146
|
-
* - `
|
|
147
|
-
* - `
|
|
148
|
-
* Returns
|
|
142
|
+
* WASM-exposed function to encrypt bytes with a key secret and nonce material.
|
|
143
|
+
* - `value`: The raw bytes to encrypt
|
|
144
|
+
* - `key_secret`: A base58-encoded key secret with "keySecret_z" prefix
|
|
145
|
+
* - `nonce_material`: Raw bytes used to generate the nonce
|
|
146
|
+
* Returns the encrypted bytes or throws a JsError if encryption fails.
|
|
149
147
|
*/
|
|
150
|
-
export function
|
|
148
|
+
export function encrypt(value: Uint8Array, key_secret: string, nonce_material: Uint8Array): Uint8Array;
|
|
151
149
|
/**
|
|
152
|
-
* WASM-exposed function to
|
|
153
|
-
* - `
|
|
154
|
-
*
|
|
150
|
+
* WASM-exposed function to decrypt bytes with a key secret and nonce material.
|
|
151
|
+
* - `ciphertext`: The encrypted bytes to decrypt
|
|
152
|
+
* - `key_secret`: A base58-encoded key secret with "keySecret_z" prefix
|
|
153
|
+
* - `nonce_material`: Raw bytes used to generate the nonce (must match encryption)
|
|
154
|
+
* Returns the decrypted bytes or throws a JsError if decryption fails.
|
|
155
155
|
*/
|
|
156
|
-
export function
|
|
156
|
+
export function decrypt(ciphertext: Uint8Array, key_secret: string, nonce_material: Uint8Array): Uint8Array;
|
|
157
157
|
/**
|
|
158
|
-
* WASM-exposed function to derive
|
|
159
|
-
* - `
|
|
158
|
+
* WASM-exposed function to derive an X25519 public key from a private key.
|
|
159
|
+
* - `private_key`: 32 bytes of private key material
|
|
160
160
|
* Returns 32 bytes of public key material or throws JsError if key is invalid.
|
|
161
161
|
*/
|
|
162
|
-
export function
|
|
162
|
+
export function x25519PublicKey(private_key: Uint8Array): Uint8Array;
|
|
163
163
|
/**
|
|
164
|
-
* WASM-exposed function to
|
|
165
|
-
* - `
|
|
166
|
-
* - `
|
|
167
|
-
* Returns
|
|
164
|
+
* WASM-exposed function to perform X25519 Diffie-Hellman key exchange.
|
|
165
|
+
* - `private_key`: 32 bytes of private key material
|
|
166
|
+
* - `public_key`: 32 bytes of public key material
|
|
167
|
+
* Returns 32 bytes of shared secret material or throws JsError if key exchange fails.
|
|
168
168
|
*/
|
|
169
|
-
export function
|
|
169
|
+
export function x25519DiffieHellman(private_key: Uint8Array, public_key: Uint8Array): Uint8Array;
|
|
170
170
|
/**
|
|
171
|
-
* WASM-exposed function to
|
|
172
|
-
* - `
|
|
173
|
-
* Returns
|
|
171
|
+
* WASM-exposed function to derive a sealer ID from a sealer secret.
|
|
172
|
+
* - `secret`: Raw bytes of the sealer secret
|
|
173
|
+
* Returns a base58-encoded sealer ID with "sealer_z" prefix or throws JsError if derivation fails.
|
|
174
174
|
*/
|
|
175
|
-
export function
|
|
175
|
+
export function getSealerId(secret: Uint8Array): string;
|
|
176
176
|
/**
|
|
177
|
-
*
|
|
178
|
-
*
|
|
179
|
-
*
|
|
177
|
+
* Generate a new X25519 private key using secure random number generation.
|
|
178
|
+
* Returns 32 bytes of raw key material suitable for use with other X25519 functions.
|
|
179
|
+
* This key can be reused for multiple Diffie-Hellman exchanges.
|
|
180
180
|
*/
|
|
181
|
-
export function
|
|
181
|
+
export function newX25519PrivateKey(): Uint8Array;
|
|
182
182
|
export class Blake3Hasher {
|
|
183
183
|
free(): void;
|
|
184
184
|
constructor();
|
|
185
|
+
clone(): Blake3Hasher;
|
|
185
186
|
update(data: Uint8Array): void;
|
|
186
187
|
finalize(): Uint8Array;
|
|
187
|
-
clone(): Blake3Hasher;
|
|
188
188
|
}
|
|
189
189
|
export class SessionLog {
|
|
190
190
|
free(): void;
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
191
|
+
/**
|
|
192
|
+
* Commit pending transactions to the main state.
|
|
193
|
+
* If skip_validate is false, validates the signature first.
|
|
194
|
+
* If skip_validate is true, commits without validation.
|
|
195
|
+
*/
|
|
196
|
+
commitTransactions(new_signature_str: string, skip_validate: boolean): void;
|
|
194
197
|
addNewPrivateTransaction(changes_json: string, signer_secret: string, encryption_key: string, key_id: string, made_at: number, meta?: string | null): string;
|
|
195
198
|
addNewTrustingTransaction(changes_json: string, signer_secret: string, made_at: number, meta?: string | null): string;
|
|
196
|
-
|
|
199
|
+
/**
|
|
200
|
+
* Add an existing private transaction to the staging area.
|
|
201
|
+
* The transaction is NOT committed until commitTransactions() succeeds.
|
|
202
|
+
* Note: made_at uses f64 because JavaScript's number type is f64.
|
|
203
|
+
*/
|
|
204
|
+
addExistingPrivateTransaction(encrypted_changes: string, key_used: string, made_at: number, meta?: string | null): void;
|
|
205
|
+
/**
|
|
206
|
+
* Add an existing trusting transaction to the staging area.
|
|
207
|
+
* The transaction is NOT committed until commitTransactions() succeeds.
|
|
208
|
+
* Note: made_at uses f64 because JavaScript's number type is f64.
|
|
209
|
+
*/
|
|
210
|
+
addExistingTrustingTransaction(changes: string, made_at: number, meta?: string | null): void;
|
|
197
211
|
decryptNextTransactionMetaJson(tx_index: number, encryption_key: string): string | undefined;
|
|
212
|
+
decryptNextTransactionChangesJson(tx_index: number, encryption_key: string): string;
|
|
213
|
+
constructor(co_id: string, session_id: string, signer_id?: string | null);
|
|
214
|
+
clone(): SessionLog;
|
|
198
215
|
}
|
|
199
216
|
|
|
200
217
|
export type InitInput = RequestInfo | URL | Response | BufferSource | WebAssembly.Module;
|
|
@@ -202,43 +219,45 @@ export type InitInput = RequestInfo | URL | Response | BufferSource | WebAssembl
|
|
|
202
219
|
export interface InitOutput {
|
|
203
220
|
readonly memory: WebAssembly.Memory;
|
|
204
221
|
readonly __wbg_sessionlog_free: (a: number, b: number) => void;
|
|
205
|
-
readonly
|
|
206
|
-
readonly
|
|
207
|
-
readonly sessionlog_tryAdd: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number];
|
|
222
|
+
readonly sessionlog_addExistingPrivateTransaction: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number];
|
|
223
|
+
readonly sessionlog_addExistingTrustingTransaction: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number];
|
|
208
224
|
readonly sessionlog_addNewPrivateTransaction: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number, i: number, j: number, k: number, l: number) => [number, number, number, number];
|
|
209
225
|
readonly sessionlog_addNewTrustingTransaction: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
|
|
226
|
+
readonly sessionlog_clone: (a: number) => number;
|
|
227
|
+
readonly sessionlog_commitTransactions: (a: number, b: number, c: number, d: number) => [number, number];
|
|
210
228
|
readonly sessionlog_decryptNextTransactionChangesJson: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
211
229
|
readonly sessionlog_decryptNextTransactionMetaJson: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
212
|
-
readonly
|
|
213
|
-
readonly decryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
214
|
-
readonly newX25519PrivateKey: () => [number, number];
|
|
215
|
-
readonly x25519PublicKey: (a: number, b: number) => [number, number, number, number];
|
|
216
|
-
readonly x25519DiffieHellman: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
217
|
-
readonly getSealerId: (a: number, b: number) => [number, number, number, number];
|
|
218
|
-
readonly encrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
219
|
-
readonly decrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
220
|
-
readonly seal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
|
|
221
|
-
readonly unseal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
|
|
222
|
-
readonly generateNonce: (a: number, b: number) => [number, number];
|
|
223
|
-
readonly blake3HashOnce: (a: number, b: number) => [number, number];
|
|
224
|
-
readonly blake3HashOnceWithContext: (a: number, b: number, c: number, d: number) => [number, number];
|
|
225
|
-
readonly __wbg_blake3hasher_free: (a: number, b: number) => void;
|
|
226
|
-
readonly blake3hasher_new: () => number;
|
|
227
|
-
readonly blake3hasher_update: (a: number, b: number, c: number) => void;
|
|
228
|
-
readonly blake3hasher_finalize: (a: number) => [number, number];
|
|
229
|
-
readonly blake3hasher_clone: (a: number) => number;
|
|
230
|
-
readonly sign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
231
|
-
readonly verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
|
|
232
|
-
readonly getSignerId: (a: number, b: number) => [number, number, number, number];
|
|
233
|
-
readonly newEd25519SigningKey: () => [number, number];
|
|
234
|
-
readonly ed25519VerifyingKey: (a: number, b: number) => [number, number, number, number];
|
|
230
|
+
readonly sessionlog_new: (a: number, b: number, c: number, d: number, e: number, f: number) => number;
|
|
235
231
|
readonly ed25519Sign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
236
|
-
readonly
|
|
232
|
+
readonly ed25519SignatureFromBytes: (a: number, b: number) => [number, number, number, number];
|
|
237
233
|
readonly ed25519SigningKeyFromBytes: (a: number, b: number) => [number, number, number, number];
|
|
238
234
|
readonly ed25519SigningKeyToPublic: (a: number, b: number) => [number, number, number, number];
|
|
235
|
+
readonly ed25519Verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
|
|
236
|
+
readonly ed25519VerifyingKey: (a: number, b: number) => [number, number, number, number];
|
|
239
237
|
readonly ed25519VerifyingKeyFromBytes: (a: number, b: number) => [number, number, number, number];
|
|
240
|
-
readonly
|
|
238
|
+
readonly newEd25519SigningKey: () => [number, number];
|
|
241
239
|
readonly ed25519SigningKeySign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
240
|
+
readonly getSignerId: (a: number, b: number) => [number, number, number, number];
|
|
241
|
+
readonly sign: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
242
|
+
readonly verify: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number];
|
|
243
|
+
readonly __wbg_blake3hasher_free: (a: number, b: number) => void;
|
|
244
|
+
readonly blake3HashOnce: (a: number, b: number) => [number, number];
|
|
245
|
+
readonly blake3HashOnceWithContext: (a: number, b: number, c: number, d: number) => [number, number];
|
|
246
|
+
readonly blake3hasher_clone: (a: number) => number;
|
|
247
|
+
readonly blake3hasher_finalize: (a: number) => [number, number];
|
|
248
|
+
readonly blake3hasher_new: () => number;
|
|
249
|
+
readonly blake3hasher_update: (a: number, b: number, c: number) => void;
|
|
250
|
+
readonly decryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
251
|
+
readonly encryptXsalsa20: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
252
|
+
readonly generateNonce: (a: number, b: number) => [number, number];
|
|
253
|
+
readonly decrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
254
|
+
readonly encrypt: (a: number, b: number, c: number, d: number, e: number, f: number) => [number, number, number, number];
|
|
255
|
+
readonly seal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
|
|
256
|
+
readonly unseal: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => [number, number, number, number];
|
|
257
|
+
readonly getSealerId: (a: number, b: number) => [number, number, number, number];
|
|
258
|
+
readonly newX25519PrivateKey: () => [number, number];
|
|
259
|
+
readonly x25519DiffieHellman: (a: number, b: number, c: number, d: number) => [number, number, number, number];
|
|
260
|
+
readonly x25519PublicKey: (a: number, b: number) => [number, number, number, number];
|
|
242
261
|
readonly __wbindgen_malloc: (a: number, b: number) => number;
|
|
243
262
|
readonly __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
|
|
244
263
|
readonly __wbindgen_exn_store: (a: number) => void;
|