postchain-client 1.5.2 → 1.5.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/built/cjs/index.js +50 -44
  2. package/built/cjs/index.js.map +1 -1
  3. package/built/esm/index.js +292 -287
  4. package/built/esm/index.js.map +1 -1
  5. package/built/index.d.ts +1 -0
  6. package/built/src/blockchainClient/blockchainClient.js +7 -5
  7. package/built/src/blockchainClient/blockchainClient.js.map +1 -1
  8. package/built/src/blockchainClient/types.d.ts +1 -1
  9. package/built/src/blockchainClient/utils.d.ts +4 -9
  10. package/built/src/blockchainClient/utils.js +6 -5
  11. package/built/src/blockchainClient/utils.js.map +1 -1
  12. package/built/src/encryption/encryption.d.ts +1 -0
  13. package/built/src/encryption/encryption.js +1 -0
  14. package/built/src/encryption/encryption.js.map +1 -1
  15. package/built/src/formatter.d.ts +1 -0
  16. package/built/src/formatter.js +1 -0
  17. package/built/src/formatter.js.map +1 -1
  18. package/built/src/gtx/gtxclient.js +1 -0
  19. package/built/src/gtx/gtxclient.js.map +1 -1
  20. package/built/src/gtx/serialization.d.ts +1 -0
  21. package/built/src/gtx/serialization.js +1 -0
  22. package/built/src/gtx/serialization.js.map +1 -1
  23. package/built/src/merkle/binarytreefactory.js +1 -0
  24. package/built/src/merkle/binarytreefactory.js.map +1 -1
  25. package/built/src/merkle/merkleHelper.d.ts +1 -0
  26. package/built/src/merkle/merkleHelper.js +1 -0
  27. package/built/src/merkle/merkleHelper.js.map +1 -1
  28. package/built/src/merkle/merklehashcalculator.d.ts +2 -0
  29. package/built/src/merkle/merklehashcalculator.js +1 -0
  30. package/built/src/merkle/merklehashcalculator.js.map +1 -1
  31. package/built/src/merkle/proof/merkleprooftreefactory.js +1 -0
  32. package/built/src/merkle/proof/merkleprooftreefactory.js.map +1 -1
  33. package/built/src/restclient/httpUtil.d.ts +1 -0
  34. package/built/src/restclient/httpUtil.js +1 -0
  35. package/built/src/restclient/httpUtil.js.map +1 -1
  36. package/built/src/restclient/restclient.js +1 -0
  37. package/built/src/restclient/restclient.js.map +1 -1
  38. package/built/umd/index.js +292 -287
  39. package/built/umd/index.js.map +1 -1
  40. package/package.json +4 -2
@@ -1,8 +1,8 @@
1
1
  (function (global, factory) {
2
2
  typeof exports === 'object' && typeof module !== 'undefined' ? factory(exports, require('buffer'), require('events'), require('string_decoder')) :
3
3
  typeof define === 'function' && define.amd ? define(['exports', 'buffer', 'events', 'string_decoder'], factory) :
4
- (global = typeof globalThis !== 'undefined' ? globalThis : global || self, factory(global["Postchain client"] = {}, global.require$$0$4, global.require$$0$5, global.require$$2$2));
5
- })(this, (function (exports, require$$0$4, require$$0$5, require$$2$2) { 'use strict';
4
+ (global = typeof globalThis !== 'undefined' ? globalThis : global || self, factory(global["Postchain client"] = {}, global.require$$0$3, global.require$$0$4, global.require$$2$1));
5
+ })(this, (function (exports, require$$0$3, require$$0$4, require$$2$1) { 'use strict';
6
6
 
7
7
  var commonjsGlobal = typeof globalThis !== 'undefined' ? globalThis : typeof window !== 'undefined' ? window : typeof global !== 'undefined' ? global : typeof self !== 'undefined' ? self : {};
8
8
 
@@ -67,7 +67,7 @@
67
67
  default: _nodeResolve_empty
68
68
  });
69
69
 
70
- var require$$0$3 = /*@__PURE__*/getAugmentedNamespace(_nodeResolve_empty$1);
70
+ var require$$0$2 = /*@__PURE__*/getAugmentedNamespace(_nodeResolve_empty$1);
71
71
 
72
72
  (function (module) {
73
73
  (function (module, exports) {
@@ -124,7 +124,7 @@
124
124
  if (typeof window !== 'undefined' && typeof window.Buffer !== 'undefined') {
125
125
  Buffer = window.Buffer;
126
126
  } else {
127
- Buffer = require$$0$3.Buffer;
127
+ Buffer = require$$0$2.Buffer;
128
128
  }
129
129
  } catch (e) {
130
130
  }
@@ -3542,7 +3542,7 @@
3542
3542
  }
3543
3543
 
3544
3544
  function pgBytes(buffer) {
3545
- if (!require$$0$4.Buffer.isBuffer(buffer)) {
3545
+ if (!require$$0$3.Buffer.isBuffer(buffer)) {
3546
3546
  throw new PgBytesInputException(buffer);
3547
3547
  }
3548
3548
  return "\\x" + buffer.toString("hex");
@@ -3553,7 +3553,7 @@
3553
3553
  * @returns {Buffer}
3554
3554
  */
3555
3555
  function toBuffer$3(key) {
3556
- return require$$0$4.Buffer.from(key, "hex");
3556
+ return require$$0$3.Buffer.from(key, "hex");
3557
3557
  }
3558
3558
  /**
3559
3559
  * Converts Buffer to hex string
@@ -3582,7 +3582,7 @@
3582
3582
  }
3583
3583
  }
3584
3584
  function ensureBuffer(value) {
3585
- if (value instanceof require$$0$4.Buffer) {
3585
+ if (value instanceof require$$0$3.Buffer) {
3586
3586
  return value;
3587
3587
  }
3588
3588
  else {
@@ -3594,7 +3594,7 @@
3594
3594
  if (value == null) {
3595
3595
  return true;
3596
3596
  }
3597
- if (require$$0$4.Buffer.isBuffer(value)) {
3597
+ if (require$$0$3.Buffer.isBuffer(value)) {
3598
3598
  return true;
3599
3599
  }
3600
3600
  if (typeof value === "string") {
@@ -3662,7 +3662,7 @@
3662
3662
  });
3663
3663
  const result = [];
3664
3664
  signersAsString.forEach((item) => {
3665
- result.push(require$$0$4.Buffer.from(item, "hex"));
3665
+ result.push(require$$0$3.Buffer.from(item, "hex"));
3666
3666
  });
3667
3667
  return result;
3668
3668
  }
@@ -3735,7 +3735,7 @@
3735
3735
  if (value == null) {
3736
3736
  return { type: "null", value: null };
3737
3737
  }
3738
- if (require$$0$4.Buffer.isBuffer(value)) {
3738
+ if (require$$0$3.Buffer.isBuffer(value)) {
3739
3739
  return { type: "byteArray", value: value };
3740
3740
  }
3741
3741
  if (typeof value === "boolean") {
@@ -3785,7 +3785,7 @@
3785
3785
  parseValue: parseValue
3786
3786
  });
3787
3787
 
3788
- var require$$0$2 = /*@__PURE__*/getAugmentedNamespace(serialization$1);
3788
+ var require$$1$2 = /*@__PURE__*/getAugmentedNamespace(serialization$1);
3789
3789
 
3790
3790
  var require$$0$1 = /*@__PURE__*/getAugmentedNamespace(formatter);
3791
3791
 
@@ -4257,7 +4257,7 @@
4257
4257
 
4258
4258
  (function (module, exports) {
4259
4259
  /* eslint-disable node/no-deprecated-api */
4260
- var buffer = require$$0$4;
4260
+ var buffer = require$$0$3;
4261
4261
  var Buffer = buffer.Buffer;
4262
4262
 
4263
4263
  // alternative to using Object.keys for old browsers
@@ -4334,7 +4334,7 @@
4334
4334
  throw new Error('Secure random number generation is not supported by this browser.\nUse Chrome, Firefox or Internet Explorer 11')
4335
4335
  }
4336
4336
 
4337
- var Buffer$D = safeBufferExports.Buffer;
4337
+ var Buffer$G = safeBufferExports.Buffer;
4338
4338
  var crypto$1 = commonjsGlobal.crypto || commonjsGlobal.msCrypto;
4339
4339
 
4340
4340
  if (crypto$1 && crypto$1.getRandomValues) {
@@ -4347,7 +4347,7 @@
4347
4347
  // phantomjs needs to throw
4348
4348
  if (size > MAX_UINT32) throw new RangeError('requested too many random bytes')
4349
4349
 
4350
- var bytes = Buffer$D.allocUnsafe(size);
4350
+ var bytes = Buffer$G.allocUnsafe(size);
4351
4351
 
4352
4352
  if (size > 0) { // getRandomValues fails on IE if size == 0
4353
4353
  if (size > MAX_BYTES) { // this is the max bytes crypto.getRandomValues
@@ -4411,7 +4411,7 @@
4411
4411
  set exports(v){ readableBrowserExports = v; },
4412
4412
  };
4413
4413
 
4414
- var streamBrowser = require$$0$5.EventEmitter;
4414
+ var streamBrowser = require$$0$4.EventEmitter;
4415
4415
 
4416
4416
  var buffer_list;
4417
4417
  var hasRequiredBuffer_list;
@@ -4428,9 +4428,9 @@
4428
4428
  function _createClass(Constructor, protoProps, staticProps) { if (protoProps) _defineProperties(Constructor.prototype, protoProps); if (staticProps) _defineProperties(Constructor, staticProps); Object.defineProperty(Constructor, "prototype", { writable: false }); return Constructor; }
4429
4429
  function _toPropertyKey(arg) { var key = _toPrimitive(arg, "string"); return typeof key === "symbol" ? key : String(key); }
4430
4430
  function _toPrimitive(input, hint) { if (typeof input !== "object" || input === null) return input; var prim = input[Symbol.toPrimitive]; if (prim !== undefined) { var res = prim.call(input, hint || "default"); if (typeof res !== "object") return res; throw new TypeError("@@toPrimitive must return a primitive value."); } return (hint === "string" ? String : Number)(input); }
4431
- var _require = require$$0$4,
4431
+ var _require = require$$0$3,
4432
4432
  Buffer = _require.Buffer;
4433
- var _require2 = require$$0$3,
4433
+ var _require2 = require$$0$2,
4434
4434
  inspect = _require2.inspect;
4435
4435
  var custom = inspect && inspect.custom || 'inspect';
4436
4436
  function copyBuffer(src, target, offset) {
@@ -4960,7 +4960,7 @@
4960
4960
  var Stream = streamBrowser;
4961
4961
  /*</replacement>*/
4962
4962
 
4963
- var Buffer = require$$0$4.Buffer;
4963
+ var Buffer = require$$0$3.Buffer;
4964
4964
  var OurUint8Array = (typeof commonjsGlobal !== 'undefined' ? commonjsGlobal : typeof window !== 'undefined' ? window : typeof self !== 'undefined' ? self : {}).Uint8Array || function () {};
4965
4965
  function _uint8ArrayToBuffer(chunk) {
4966
4966
  return Buffer.from(chunk);
@@ -6228,7 +6228,7 @@
6228
6228
  Readable.ReadableState = ReadableState;
6229
6229
 
6230
6230
  /*<replacement>*/
6231
- require$$0$5.EventEmitter;
6231
+ require$$0$4.EventEmitter;
6232
6232
  var EElistenerCount = function EElistenerCount(emitter, type) {
6233
6233
  return emitter.listeners(type).length;
6234
6234
  };
@@ -6238,7 +6238,7 @@
6238
6238
  var Stream = streamBrowser;
6239
6239
  /*</replacement>*/
6240
6240
 
6241
- var Buffer = require$$0$4.Buffer;
6241
+ var Buffer = require$$0$3.Buffer;
6242
6242
  var OurUint8Array = (typeof commonjsGlobal !== 'undefined' ? commonjsGlobal : typeof window !== 'undefined' ? window : typeof self !== 'undefined' ? self : {}).Uint8Array || function () {};
6243
6243
  function _uint8ArrayToBuffer(chunk) {
6244
6244
  return Buffer.from(chunk);
@@ -6248,7 +6248,7 @@
6248
6248
  }
6249
6249
 
6250
6250
  /*<replacement>*/
6251
- var debugUtil = require$$0$3;
6251
+ var debugUtil = require$$0$2;
6252
6252
  var debug;
6253
6253
  if (debugUtil && debugUtil.debuglog) {
6254
6254
  debug = debugUtil.debuglog('stream');
@@ -7457,12 +7457,12 @@
7457
7457
  exports.pipeline = pipeline_1;
7458
7458
  } (readableBrowser, readableBrowserExports));
7459
7459
 
7460
- var Buffer$C = safeBufferExports.Buffer;
7460
+ var Buffer$F = safeBufferExports.Buffer;
7461
7461
  var Transform$5 = readableBrowserExports.Transform;
7462
7462
  var inherits$v = inherits_browserExports;
7463
7463
 
7464
7464
  function throwIfNotStringOrBuffer (val, prefix) {
7465
- if (!Buffer$C.isBuffer(val) && typeof val !== 'string') {
7465
+ if (!Buffer$F.isBuffer(val) && typeof val !== 'string') {
7466
7466
  throw new TypeError(prefix + ' must be a string or a buffer')
7467
7467
  }
7468
7468
  }
@@ -7470,7 +7470,7 @@
7470
7470
  function HashBase$2 (blockSize) {
7471
7471
  Transform$5.call(this);
7472
7472
 
7473
- this._block = Buffer$C.allocUnsafe(blockSize);
7473
+ this._block = Buffer$F.allocUnsafe(blockSize);
7474
7474
  this._blockSize = blockSize;
7475
7475
  this._blockOffset = 0;
7476
7476
  this._length = [0, 0, 0, 0];
@@ -7505,7 +7505,7 @@
7505
7505
  HashBase$2.prototype.update = function (data, encoding) {
7506
7506
  throwIfNotStringOrBuffer(data, 'Data');
7507
7507
  if (this._finalized) throw new Error('Digest already called')
7508
- if (!Buffer$C.isBuffer(data)) data = Buffer$C.from(data, encoding);
7508
+ if (!Buffer$F.isBuffer(data)) data = Buffer$F.from(data, encoding);
7509
7509
 
7510
7510
  // consume data
7511
7511
  var block = this._block;
@@ -7554,7 +7554,7 @@
7554
7554
 
7555
7555
  var inherits$u = inherits_browserExports;
7556
7556
  var HashBase$1 = hashBase;
7557
- var Buffer$B = safeBufferExports.Buffer;
7557
+ var Buffer$E = safeBufferExports.Buffer;
7558
7558
 
7559
7559
  var ARRAY16$1 = new Array(16);
7560
7560
 
@@ -7668,7 +7668,7 @@
7668
7668
  this._update();
7669
7669
 
7670
7670
  // produce result
7671
- var buffer = Buffer$B.allocUnsafe(16);
7671
+ var buffer = Buffer$E.allocUnsafe(16);
7672
7672
  buffer.writeInt32LE(this._a, 0);
7673
7673
  buffer.writeInt32LE(this._b, 4);
7674
7674
  buffer.writeInt32LE(this._c, 8);
@@ -7698,7 +7698,7 @@
7698
7698
 
7699
7699
  var md5_js = MD5$3;
7700
7700
 
7701
- var Buffer$A = require$$0$4.Buffer;
7701
+ var Buffer$D = require$$0$3.Buffer;
7702
7702
  var inherits$t = inherits_browserExports;
7703
7703
  var HashBase = hashBase;
7704
7704
 
@@ -7826,7 +7826,7 @@
7826
7826
  this._update();
7827
7827
 
7828
7828
  // produce result
7829
- var buffer = Buffer$A.alloc ? Buffer$A.alloc(20) : new Buffer$A(20);
7829
+ var buffer = Buffer$D.alloc ? Buffer$D.alloc(20) : new Buffer$D(20);
7830
7830
  buffer.writeInt32LE(this._a, 0);
7831
7831
  buffer.writeInt32LE(this._b, 4);
7832
7832
  buffer.writeInt32LE(this._c, 8);
@@ -7867,11 +7867,11 @@
7867
7867
  set exports(v){ sha_jsExports = v; },
7868
7868
  };
7869
7869
 
7870
- var Buffer$z = safeBufferExports.Buffer;
7870
+ var Buffer$C = safeBufferExports.Buffer;
7871
7871
 
7872
7872
  // prototype class for hash functions
7873
7873
  function Hash$7 (blockSize, finalSize) {
7874
- this._block = Buffer$z.alloc(blockSize);
7874
+ this._block = Buffer$C.alloc(blockSize);
7875
7875
  this._finalSize = finalSize;
7876
7876
  this._blockSize = blockSize;
7877
7877
  this._len = 0;
@@ -7880,7 +7880,7 @@
7880
7880
  Hash$7.prototype.update = function (data, enc) {
7881
7881
  if (typeof data === 'string') {
7882
7882
  enc = enc || 'utf8';
7883
- data = Buffer$z.from(data, enc);
7883
+ data = Buffer$C.from(data, enc);
7884
7884
  }
7885
7885
 
7886
7886
  var block = this._block;
@@ -7959,7 +7959,7 @@
7959
7959
 
7960
7960
  var inherits$s = inherits_browserExports;
7961
7961
  var Hash$6 = hash$3;
7962
- var Buffer$y = safeBufferExports.Buffer;
7962
+ var Buffer$B = safeBufferExports.Buffer;
7963
7963
 
7964
7964
  var K$4 = [
7965
7965
  0x5a827999, 0x6ed9eba1, 0x8f1bbcdc | 0, 0xca62c1d6 | 0
@@ -8031,7 +8031,7 @@
8031
8031
  };
8032
8032
 
8033
8033
  Sha.prototype._hash = function () {
8034
- var H = Buffer$y.allocUnsafe(20);
8034
+ var H = Buffer$B.allocUnsafe(20);
8035
8035
 
8036
8036
  H.writeInt32BE(this._a | 0, 0);
8037
8037
  H.writeInt32BE(this._b | 0, 4);
@@ -8055,7 +8055,7 @@
8055
8055
 
8056
8056
  var inherits$r = inherits_browserExports;
8057
8057
  var Hash$5 = hash$3;
8058
- var Buffer$x = safeBufferExports.Buffer;
8058
+ var Buffer$A = safeBufferExports.Buffer;
8059
8059
 
8060
8060
  var K$3 = [
8061
8061
  0x5a827999, 0x6ed9eba1, 0x8f1bbcdc | 0, 0xca62c1d6 | 0
@@ -8131,7 +8131,7 @@
8131
8131
  };
8132
8132
 
8133
8133
  Sha1.prototype._hash = function () {
8134
- var H = Buffer$x.allocUnsafe(20);
8134
+ var H = Buffer$A.allocUnsafe(20);
8135
8135
 
8136
8136
  H.writeInt32BE(this._a | 0, 0);
8137
8137
  H.writeInt32BE(this._b | 0, 4);
@@ -8154,7 +8154,7 @@
8154
8154
 
8155
8155
  var inherits$q = inherits_browserExports;
8156
8156
  var Hash$4 = hash$3;
8157
- var Buffer$w = safeBufferExports.Buffer;
8157
+ var Buffer$z = safeBufferExports.Buffer;
8158
8158
 
8159
8159
  var K$2 = [
8160
8160
  0x428A2F98, 0x71374491, 0xB5C0FBCF, 0xE9B5DBA5,
@@ -8264,7 +8264,7 @@
8264
8264
  };
8265
8265
 
8266
8266
  Sha256$1.prototype._hash = function () {
8267
- var H = Buffer$w.allocUnsafe(32);
8267
+ var H = Buffer$z.allocUnsafe(32);
8268
8268
 
8269
8269
  H.writeInt32BE(this._a, 0);
8270
8270
  H.writeInt32BE(this._b, 4);
@@ -8291,7 +8291,7 @@
8291
8291
  var inherits$p = inherits_browserExports;
8292
8292
  var Sha256 = sha256$2;
8293
8293
  var Hash$3 = hash$3;
8294
- var Buffer$v = safeBufferExports.Buffer;
8294
+ var Buffer$y = safeBufferExports.Buffer;
8295
8295
 
8296
8296
  var W$2 = new Array(64);
8297
8297
 
@@ -8319,7 +8319,7 @@
8319
8319
  };
8320
8320
 
8321
8321
  Sha224.prototype._hash = function () {
8322
- var H = Buffer$v.allocUnsafe(28);
8322
+ var H = Buffer$y.allocUnsafe(28);
8323
8323
 
8324
8324
  H.writeInt32BE(this._a, 0);
8325
8325
  H.writeInt32BE(this._b, 4);
@@ -8336,7 +8336,7 @@
8336
8336
 
8337
8337
  var inherits$o = inherits_browserExports;
8338
8338
  var Hash$2 = hash$3;
8339
- var Buffer$u = safeBufferExports.Buffer;
8339
+ var Buffer$x = safeBufferExports.Buffer;
8340
8340
 
8341
8341
  var K$1 = [
8342
8342
  0x428a2f98, 0xd728ae22, 0x71374491, 0x23ef65cd,
@@ -8574,7 +8574,7 @@
8574
8574
  };
8575
8575
 
8576
8576
  Sha512.prototype._hash = function () {
8577
- var H = Buffer$u.allocUnsafe(64);
8577
+ var H = Buffer$x.allocUnsafe(64);
8578
8578
 
8579
8579
  function writeInt64BE (h, l, offset) {
8580
8580
  H.writeInt32BE(h, offset);
@@ -8598,7 +8598,7 @@
8598
8598
  var inherits$n = inherits_browserExports;
8599
8599
  var SHA512$2 = sha512$1;
8600
8600
  var Hash$1 = hash$3;
8601
- var Buffer$t = safeBufferExports.Buffer;
8601
+ var Buffer$w = safeBufferExports.Buffer;
8602
8602
 
8603
8603
  var W = new Array(160);
8604
8604
 
@@ -8634,7 +8634,7 @@
8634
8634
  };
8635
8635
 
8636
8636
  Sha384.prototype._hash = function () {
8637
- var H = Buffer$t.allocUnsafe(48);
8637
+ var H = Buffer$w.allocUnsafe(48);
8638
8638
 
8639
8639
  function writeInt64BE (h, l, offset) {
8640
8640
  H.writeInt32BE(h, offset);
@@ -8692,7 +8692,7 @@
8692
8692
 
8693
8693
  var streamBrowserify = Stream;
8694
8694
 
8695
- var EE = require$$0$5.EventEmitter;
8695
+ var EE = require$$0$4.EventEmitter;
8696
8696
  var inherits$m = inherits_browserExports;
8697
8697
 
8698
8698
  inherits$m(Stream, EE);
@@ -8799,9 +8799,9 @@
8799
8799
  return dest;
8800
8800
  };
8801
8801
 
8802
- var Buffer$s = safeBufferExports.Buffer;
8802
+ var Buffer$v = safeBufferExports.Buffer;
8803
8803
  var Transform$4 = streamBrowserify.Transform;
8804
- var StringDecoder = require$$2$2.StringDecoder;
8804
+ var StringDecoder = require$$2$1.StringDecoder;
8805
8805
  var inherits$l = inherits_browserExports;
8806
8806
 
8807
8807
  function CipherBase$1 (hashMode) {
@@ -8823,7 +8823,7 @@
8823
8823
 
8824
8824
  CipherBase$1.prototype.update = function (data, inputEnc, outputEnc) {
8825
8825
  if (typeof data === 'string') {
8826
- data = Buffer$s.from(data, inputEnc);
8826
+ data = Buffer$v.from(data, inputEnc);
8827
8827
  }
8828
8828
 
8829
8829
  var outData = this._update(data);
@@ -8874,7 +8874,7 @@
8874
8874
  done(err);
8875
8875
  };
8876
8876
  CipherBase$1.prototype._finalOrDigest = function (outputEnc) {
8877
- var outData = this.__final() || Buffer$s.alloc(0);
8877
+ var outData = this.__final() || Buffer$v.alloc(0);
8878
8878
  if (outputEnc) {
8879
8879
  outData = this._toString(outData, outputEnc, true);
8880
8880
  }
@@ -8930,17 +8930,17 @@
8930
8930
  };
8931
8931
 
8932
8932
  var inherits$j = inherits_browserExports;
8933
- var Buffer$r = safeBufferExports.Buffer;
8933
+ var Buffer$u = safeBufferExports.Buffer;
8934
8934
 
8935
8935
  var Base$4 = cipherBase;
8936
8936
 
8937
- var ZEROS$2 = Buffer$r.alloc(128);
8937
+ var ZEROS$2 = Buffer$u.alloc(128);
8938
8938
  var blocksize = 64;
8939
8939
 
8940
8940
  function Hmac$3 (alg, key) {
8941
8941
  Base$4.call(this, 'digest');
8942
8942
  if (typeof key === 'string') {
8943
- key = Buffer$r.from(key);
8943
+ key = Buffer$u.from(key);
8944
8944
  }
8945
8945
 
8946
8946
  this._alg = alg;
@@ -8949,11 +8949,11 @@
8949
8949
  if (key.length > blocksize) {
8950
8950
  key = alg(key);
8951
8951
  } else if (key.length < blocksize) {
8952
- key = Buffer$r.concat([key, ZEROS$2], blocksize);
8952
+ key = Buffer$u.concat([key, ZEROS$2], blocksize);
8953
8953
  }
8954
8954
 
8955
- var ipad = this._ipad = Buffer$r.allocUnsafe(blocksize);
8956
- var opad = this._opad = Buffer$r.allocUnsafe(blocksize);
8955
+ var ipad = this._ipad = Buffer$u.allocUnsafe(blocksize);
8956
+ var opad = this._opad = Buffer$u.allocUnsafe(blocksize);
8957
8957
 
8958
8958
  for (var i = 0; i < blocksize; i++) {
8959
8959
  ipad[i] = key[i] ^ 0x36;
@@ -8970,8 +8970,8 @@
8970
8970
  };
8971
8971
 
8972
8972
  Hmac$3.prototype._final = function () {
8973
- var h = this._alg(Buffer$r.concat(this._hash));
8974
- return this._alg(Buffer$r.concat([this._opad, h]))
8973
+ var h = this._alg(Buffer$u.concat(this._hash));
8974
+ return this._alg(Buffer$u.concat([this._opad, h]))
8975
8975
  };
8976
8976
  var legacy = Hmac$3;
8977
8977
 
@@ -8984,18 +8984,18 @@
8984
8984
  var inherits$i = inherits_browserExports;
8985
8985
  var Legacy = legacy;
8986
8986
  var Base$3 = cipherBase;
8987
- var Buffer$q = safeBufferExports.Buffer;
8987
+ var Buffer$t = safeBufferExports.Buffer;
8988
8988
  var md5$1 = md5$2;
8989
8989
  var RIPEMD160$2 = ripemd160;
8990
8990
 
8991
8991
  var sha$2 = sha_jsExports;
8992
8992
 
8993
- var ZEROS$1 = Buffer$q.alloc(128);
8993
+ var ZEROS$1 = Buffer$t.alloc(128);
8994
8994
 
8995
8995
  function Hmac$2 (alg, key) {
8996
8996
  Base$3.call(this, 'digest');
8997
8997
  if (typeof key === 'string') {
8998
- key = Buffer$q.from(key);
8998
+ key = Buffer$t.from(key);
8999
8999
  }
9000
9000
 
9001
9001
  var blocksize = (alg === 'sha512' || alg === 'sha384') ? 128 : 64;
@@ -9006,11 +9006,11 @@
9006
9006
  var hash = alg === 'rmd160' ? new RIPEMD160$2() : sha$2(alg);
9007
9007
  key = hash.update(key).digest();
9008
9008
  } else if (key.length < blocksize) {
9009
- key = Buffer$q.concat([key, ZEROS$1], blocksize);
9009
+ key = Buffer$t.concat([key, ZEROS$1], blocksize);
9010
9010
  }
9011
9011
 
9012
- var ipad = this._ipad = Buffer$q.allocUnsafe(blocksize);
9013
- var opad = this._opad = Buffer$q.allocUnsafe(blocksize);
9012
+ var ipad = this._ipad = Buffer$t.allocUnsafe(blocksize);
9013
+ var opad = this._opad = Buffer$t.allocUnsafe(blocksize);
9014
9014
 
9015
9015
  for (var i = 0; i < blocksize; i++) {
9016
9016
  ipad[i] = key[i] ^ 0x36;
@@ -9252,15 +9252,15 @@
9252
9252
  }
9253
9253
  var defaultEncoding_1 = defaultEncoding$2;
9254
9254
 
9255
- var Buffer$p = safeBufferExports.Buffer;
9255
+ var Buffer$s = safeBufferExports.Buffer;
9256
9256
 
9257
9257
  var toBuffer$2 = function (thing, encoding, name) {
9258
- if (Buffer$p.isBuffer(thing)) {
9258
+ if (Buffer$s.isBuffer(thing)) {
9259
9259
  return thing
9260
9260
  } else if (typeof thing === 'string') {
9261
- return Buffer$p.from(thing, encoding)
9261
+ return Buffer$s.from(thing, encoding)
9262
9262
  } else if (ArrayBuffer.isView(thing)) {
9263
- return Buffer$p.from(thing.buffer)
9263
+ return Buffer$s.from(thing.buffer)
9264
9264
  } else {
9265
9265
  throw new TypeError(name + ' must be a string, a Buffer, a typed array or a DataView')
9266
9266
  }
@@ -9269,13 +9269,13 @@
9269
9269
  var md5 = md5$2;
9270
9270
  var RIPEMD160$1 = ripemd160;
9271
9271
  var sha$1 = sha_jsExports;
9272
- var Buffer$o = safeBufferExports.Buffer;
9272
+ var Buffer$r = safeBufferExports.Buffer;
9273
9273
 
9274
9274
  var checkParameters$1 = precondition;
9275
9275
  var defaultEncoding$1 = defaultEncoding_1;
9276
9276
  var toBuffer$1 = toBuffer$2;
9277
9277
 
9278
- var ZEROS = Buffer$o.alloc(128);
9278
+ var ZEROS = Buffer$r.alloc(128);
9279
9279
  var sizes = {
9280
9280
  md5: 16,
9281
9281
  sha1: 20,
@@ -9294,17 +9294,17 @@
9294
9294
  if (key.length > blocksize) {
9295
9295
  key = hash(key);
9296
9296
  } else if (key.length < blocksize) {
9297
- key = Buffer$o.concat([key, ZEROS], blocksize);
9297
+ key = Buffer$r.concat([key, ZEROS], blocksize);
9298
9298
  }
9299
9299
 
9300
- var ipad = Buffer$o.allocUnsafe(blocksize + sizes[alg]);
9301
- var opad = Buffer$o.allocUnsafe(blocksize + sizes[alg]);
9300
+ var ipad = Buffer$r.allocUnsafe(blocksize + sizes[alg]);
9301
+ var opad = Buffer$r.allocUnsafe(blocksize + sizes[alg]);
9302
9302
  for (var i = 0; i < blocksize; i++) {
9303
9303
  ipad[i] = key[i] ^ 0x36;
9304
9304
  opad[i] = key[i] ^ 0x5C;
9305
9305
  }
9306
9306
 
9307
- var ipad1 = Buffer$o.allocUnsafe(blocksize + saltLen + 4);
9307
+ var ipad1 = Buffer$r.allocUnsafe(blocksize + saltLen + 4);
9308
9308
  ipad.copy(ipad1, 0, 0, blocksize);
9309
9309
  this.ipad1 = ipad1;
9310
9310
  this.ipad2 = ipad;
@@ -9344,8 +9344,8 @@
9344
9344
 
9345
9345
  var hmac = new Hmac$1(digest, password, salt.length);
9346
9346
 
9347
- var DK = Buffer$o.allocUnsafe(keylen);
9348
- var block1 = Buffer$o.allocUnsafe(salt.length + 4);
9347
+ var DK = Buffer$r.allocUnsafe(keylen);
9348
+ var block1 = Buffer$r.allocUnsafe(salt.length + 4);
9349
9349
  salt.copy(block1, 0, 0, salt.length);
9350
9350
 
9351
9351
  var destPos = 0;
@@ -9372,7 +9372,7 @@
9372
9372
 
9373
9373
  var syncBrowser = pbkdf2;
9374
9374
 
9375
- var Buffer$n = safeBufferExports.Buffer;
9375
+ var Buffer$q = safeBufferExports.Buffer;
9376
9376
 
9377
9377
  var checkParameters = precondition;
9378
9378
  var defaultEncoding = defaultEncoding_1;
@@ -9403,7 +9403,7 @@
9403
9403
  if (checks[algo] !== undefined) {
9404
9404
  return checks[algo]
9405
9405
  }
9406
- ZERO_BUF = ZERO_BUF || Buffer$n.alloc(8);
9406
+ ZERO_BUF = ZERO_BUF || Buffer$q.alloc(8);
9407
9407
  var prom = browserPbkdf2(ZERO_BUF, ZERO_BUF, 10, 128, algo)
9408
9408
  .then(function () {
9409
9409
  return true
@@ -9442,7 +9442,7 @@
9442
9442
  }
9443
9443
  }, key, length << 3)
9444
9444
  }).then(function (res) {
9445
- return Buffer$n.from(res)
9445
+ return Buffer$q.from(res)
9446
9446
  })
9447
9447
  }
9448
9448
 
@@ -10176,7 +10176,7 @@
10176
10176
  var CipherBase = cipherBase;
10177
10177
  var des = des$2;
10178
10178
  var inherits$e = inherits_browserExports;
10179
- var Buffer$m = safeBufferExports.Buffer;
10179
+ var Buffer$p = safeBufferExports.Buffer;
10180
10180
 
10181
10181
  var modes$3 = {
10182
10182
  'des-ede3-cbc': des.CBC.instantiate(des.EDE),
@@ -10201,15 +10201,15 @@
10201
10201
  type = 'encrypt';
10202
10202
  }
10203
10203
  var key = opts.key;
10204
- if (!Buffer$m.isBuffer(key)) {
10205
- key = Buffer$m.from(key);
10204
+ if (!Buffer$p.isBuffer(key)) {
10205
+ key = Buffer$p.from(key);
10206
10206
  }
10207
10207
  if (modeName === 'des-ede' || modeName === 'des-ede-cbc') {
10208
- key = Buffer$m.concat([key, key.slice(0, 8)]);
10208
+ key = Buffer$p.concat([key, key.slice(0, 8)]);
10209
10209
  }
10210
10210
  var iv = opts.iv;
10211
- if (!Buffer$m.isBuffer(iv)) {
10212
- iv = Buffer$m.from(iv);
10211
+ if (!Buffer$p.isBuffer(iv)) {
10212
+ iv = Buffer$p.from(iv);
10213
10213
  }
10214
10214
  this._des = mode.create({
10215
10215
  key: key,
@@ -10218,10 +10218,10 @@
10218
10218
  });
10219
10219
  }
10220
10220
  DES$1.prototype._update = function (data) {
10221
- return Buffer$m.from(this._des.update(data))
10221
+ return Buffer$p.from(this._des.update(data))
10222
10222
  };
10223
10223
  DES$1.prototype._final = function () {
10224
- return Buffer$m.from(this._des.final())
10224
+ return Buffer$p.from(this._des.final())
10225
10225
  };
10226
10226
 
10227
10227
  var browser$5 = {};
@@ -10242,7 +10242,7 @@
10242
10242
 
10243
10243
  var bufferXor = function xor (a, b) {
10244
10244
  var length = Math.min(a.length, b.length);
10245
- var buffer = new require$$0$4.Buffer(length);
10245
+ var buffer = new require$$0$3.Buffer(length);
10246
10246
 
10247
10247
  for (var i = 0; i < length; ++i) {
10248
10248
  buffer[i] = a[i] ^ b[i];
@@ -10271,33 +10271,33 @@
10271
10271
 
10272
10272
  var cfb = {};
10273
10273
 
10274
- var Buffer$l = safeBufferExports.Buffer;
10274
+ var Buffer$o = safeBufferExports.Buffer;
10275
10275
  var xor$6 = bufferXor;
10276
10276
 
10277
10277
  function encryptStart (self, data, decrypt) {
10278
10278
  var len = data.length;
10279
10279
  var out = xor$6(data, self._cache);
10280
10280
  self._cache = self._cache.slice(len);
10281
- self._prev = Buffer$l.concat([self._prev, decrypt ? data : out]);
10281
+ self._prev = Buffer$o.concat([self._prev, decrypt ? data : out]);
10282
10282
  return out
10283
10283
  }
10284
10284
 
10285
10285
  cfb.encrypt = function (self, data, decrypt) {
10286
- var out = Buffer$l.allocUnsafe(0);
10286
+ var out = Buffer$o.allocUnsafe(0);
10287
10287
  var len;
10288
10288
 
10289
10289
  while (data.length) {
10290
10290
  if (self._cache.length === 0) {
10291
10291
  self._cache = self._cipher.encryptBlock(self._prev);
10292
- self._prev = Buffer$l.allocUnsafe(0);
10292
+ self._prev = Buffer$o.allocUnsafe(0);
10293
10293
  }
10294
10294
 
10295
10295
  if (self._cache.length <= data.length) {
10296
10296
  len = self._cache.length;
10297
- out = Buffer$l.concat([out, encryptStart(self, data.slice(0, len), decrypt)]);
10297
+ out = Buffer$o.concat([out, encryptStart(self, data.slice(0, len), decrypt)]);
10298
10298
  data = data.slice(len);
10299
10299
  } else {
10300
- out = Buffer$l.concat([out, encryptStart(self, data, decrypt)]);
10300
+ out = Buffer$o.concat([out, encryptStart(self, data, decrypt)]);
10301
10301
  break
10302
10302
  }
10303
10303
  }
@@ -10307,15 +10307,15 @@
10307
10307
 
10308
10308
  var cfb8 = {};
10309
10309
 
10310
- var Buffer$k = safeBufferExports.Buffer;
10310
+ var Buffer$n = safeBufferExports.Buffer;
10311
10311
 
10312
10312
  function encryptByte$1 (self, byteParam, decrypt) {
10313
10313
  var pad = self._cipher.encryptBlock(self._prev);
10314
10314
  var out = pad[0] ^ byteParam;
10315
10315
 
10316
- self._prev = Buffer$k.concat([
10316
+ self._prev = Buffer$n.concat([
10317
10317
  self._prev.slice(1),
10318
- Buffer$k.from([decrypt ? byteParam : out])
10318
+ Buffer$n.from([decrypt ? byteParam : out])
10319
10319
  ]);
10320
10320
 
10321
10321
  return out
@@ -10323,7 +10323,7 @@
10323
10323
 
10324
10324
  cfb8.encrypt = function (self, chunk, decrypt) {
10325
10325
  var len = chunk.length;
10326
- var out = Buffer$k.allocUnsafe(len);
10326
+ var out = Buffer$n.allocUnsafe(len);
10327
10327
  var i = -1;
10328
10328
 
10329
10329
  while (++i < len) {
@@ -10335,7 +10335,7 @@
10335
10335
 
10336
10336
  var cfb1 = {};
10337
10337
 
10338
- var Buffer$j = safeBufferExports.Buffer;
10338
+ var Buffer$m = safeBufferExports.Buffer;
10339
10339
 
10340
10340
  function encryptByte (self, byteParam, decrypt) {
10341
10341
  var pad;
@@ -10356,8 +10356,8 @@
10356
10356
  function shiftIn (buffer, value) {
10357
10357
  var len = buffer.length;
10358
10358
  var i = -1;
10359
- var out = Buffer$j.allocUnsafe(buffer.length);
10360
- buffer = Buffer$j.concat([buffer, Buffer$j.from([value])]);
10359
+ var out = Buffer$m.allocUnsafe(buffer.length);
10360
+ buffer = Buffer$m.concat([buffer, Buffer$m.from([value])]);
10361
10361
 
10362
10362
  while (++i < len) {
10363
10363
  out[i] = buffer[i] << 1 | buffer[i + 1] >> (7);
@@ -10368,7 +10368,7 @@
10368
10368
 
10369
10369
  cfb1.encrypt = function (self, chunk, decrypt) {
10370
10370
  var len = chunk.length;
10371
- var out = Buffer$j.allocUnsafe(len);
10371
+ var out = Buffer$m.allocUnsafe(len);
10372
10372
  var i = -1;
10373
10373
 
10374
10374
  while (++i < len) {
@@ -10389,7 +10389,7 @@
10389
10389
 
10390
10390
  ofb.encrypt = function (self, chunk) {
10391
10391
  while (self._cache.length < chunk.length) {
10392
- self._cache = require$$0$4.Buffer.concat([self._cache, getBlock$1(self)]);
10392
+ self._cache = require$$0$3.Buffer.concat([self._cache, getBlock$1(self)]);
10393
10393
  }
10394
10394
 
10395
10395
  var pad = self._cache.slice(0, chunk.length);
@@ -10416,7 +10416,7 @@
10416
10416
  var incr32_1 = incr32$2;
10417
10417
 
10418
10418
  var xor$4 = bufferXor;
10419
- var Buffer$i = safeBufferExports.Buffer;
10419
+ var Buffer$l = safeBufferExports.Buffer;
10420
10420
  var incr32$1 = incr32_1;
10421
10421
 
10422
10422
  function getBlock (self) {
@@ -10429,9 +10429,9 @@
10429
10429
  ctr.encrypt = function (self, chunk) {
10430
10430
  var chunkNum = Math.ceil(chunk.length / blockSize);
10431
10431
  var start = self._cache.length;
10432
- self._cache = Buffer$i.concat([
10432
+ self._cache = Buffer$l.concat([
10433
10433
  self._cache,
10434
- Buffer$i.allocUnsafe(chunkNum * blockSize)
10434
+ Buffer$l.allocUnsafe(chunkNum * blockSize)
10435
10435
  ]);
10436
10436
  for (var i = 0; i < chunkNum; i++) {
10437
10437
  var out = getBlock(self);
@@ -10467,7 +10467,7 @@
10467
10467
  mode: "CBC",
10468
10468
  type: "block"
10469
10469
  };
10470
- var require$$2$1 = {
10470
+ var require$$2 = {
10471
10471
  "aes-128-ecb": {
10472
10472
  cipher: "AES",
10473
10473
  key: 128,
@@ -10652,7 +10652,7 @@
10652
10652
  GCM: ctr
10653
10653
  };
10654
10654
 
10655
- var modes$2 = require$$2$1;
10655
+ var modes$2 = require$$2;
10656
10656
 
10657
10657
  for (var key$3 in modes$2) {
10658
10658
  modes$2[key$3].module = modeModules[modes$2[key$3].mode];
@@ -10667,10 +10667,10 @@
10667
10667
  // which is in turn based on the one from crypto-js
10668
10668
  // https://code.google.com/p/crypto-js/
10669
10669
 
10670
- var Buffer$h = safeBufferExports.Buffer;
10670
+ var Buffer$k = safeBufferExports.Buffer;
10671
10671
 
10672
10672
  function asUInt32Array (buf) {
10673
- if (!Buffer$h.isBuffer(buf)) buf = Buffer$h.from(buf);
10673
+ if (!Buffer$k.isBuffer(buf)) buf = Buffer$k.from(buf);
10674
10674
 
10675
10675
  var len = (buf.length / 4) | 0;
10676
10676
  var out = new Array(len);
@@ -10858,7 +10858,7 @@
10858
10858
 
10859
10859
  AES.prototype.encryptBlock = function (M) {
10860
10860
  var out = this.encryptBlockRaw(M);
10861
- var buf = Buffer$h.allocUnsafe(16);
10861
+ var buf = Buffer$k.allocUnsafe(16);
10862
10862
  buf.writeUInt32BE(out[0], 0);
10863
10863
  buf.writeUInt32BE(out[1], 4);
10864
10864
  buf.writeUInt32BE(out[2], 8);
@@ -10875,7 +10875,7 @@
10875
10875
  M[3] = m1;
10876
10876
 
10877
10877
  var out = cryptBlock(M, this._invKeySchedule, G.INV_SUB_MIX, G.INV_SBOX, this._nRounds);
10878
- var buf = Buffer$h.allocUnsafe(16);
10878
+ var buf = Buffer$k.allocUnsafe(16);
10879
10879
  buf.writeUInt32BE(out[0], 0);
10880
10880
  buf.writeUInt32BE(out[3], 4);
10881
10881
  buf.writeUInt32BE(out[2], 8);
@@ -10891,8 +10891,8 @@
10891
10891
 
10892
10892
  aes$5.AES = AES;
10893
10893
 
10894
- var Buffer$g = safeBufferExports.Buffer;
10895
- var ZEROES = Buffer$g.alloc(16, 0);
10894
+ var Buffer$j = safeBufferExports.Buffer;
10895
+ var ZEROES = Buffer$j.alloc(16, 0);
10896
10896
 
10897
10897
  function toArray$1 (buf) {
10898
10898
  return [
@@ -10904,7 +10904,7 @@
10904
10904
  }
10905
10905
 
10906
10906
  function fromArray (out) {
10907
- var buf = Buffer$g.allocUnsafe(16);
10907
+ var buf = Buffer$j.allocUnsafe(16);
10908
10908
  buf.writeUInt32BE(out[0] >>> 0, 0);
10909
10909
  buf.writeUInt32BE(out[1] >>> 0, 4);
10910
10910
  buf.writeUInt32BE(out[2] >>> 0, 8);
@@ -10914,8 +10914,8 @@
10914
10914
 
10915
10915
  function GHASH$1 (key) {
10916
10916
  this.h = key;
10917
- this.state = Buffer$g.alloc(16, 0);
10918
- this.cache = Buffer$g.allocUnsafe(0);
10917
+ this.state = Buffer$j.alloc(16, 0);
10918
+ this.cache = Buffer$j.allocUnsafe(0);
10919
10919
  }
10920
10920
 
10921
10921
  // from http://bitwiseshiftleft.github.io/sjcl/doc/symbols/src/core_gcm.js.html
@@ -10961,7 +10961,7 @@
10961
10961
  };
10962
10962
 
10963
10963
  GHASH$1.prototype.update = function (buf) {
10964
- this.cache = Buffer$g.concat([this.cache, buf]);
10964
+ this.cache = Buffer$j.concat([this.cache, buf]);
10965
10965
  var chunk;
10966
10966
  while (this.cache.length >= 16) {
10967
10967
  chunk = this.cache.slice(0, 16);
@@ -10972,7 +10972,7 @@
10972
10972
 
10973
10973
  GHASH$1.prototype.final = function (abl, bl) {
10974
10974
  if (this.cache.length) {
10975
- this.ghash(Buffer$g.concat([this.cache, ZEROES], 16));
10975
+ this.ghash(Buffer$j.concat([this.cache, ZEROES], 16));
10976
10976
  }
10977
10977
 
10978
10978
  this.ghash(fromArray([0, abl, 0, bl]));
@@ -10982,7 +10982,7 @@
10982
10982
  var ghash = GHASH$1;
10983
10983
 
10984
10984
  var aes$4 = aes$5;
10985
- var Buffer$f = safeBufferExports.Buffer;
10985
+ var Buffer$i = safeBufferExports.Buffer;
10986
10986
  var Transform$3 = cipherBase;
10987
10987
  var inherits$d = inherits_browserExports;
10988
10988
  var GHASH = ghash;
@@ -11003,8 +11003,8 @@
11003
11003
 
11004
11004
  function calcIv (self, iv, ck) {
11005
11005
  if (iv.length === 12) {
11006
- self._finID = Buffer$f.concat([iv, Buffer$f.from([0, 0, 0, 1])]);
11007
- return Buffer$f.concat([iv, Buffer$f.from([0, 0, 0, 2])])
11006
+ self._finID = Buffer$i.concat([iv, Buffer$i.from([0, 0, 0, 1])]);
11007
+ return Buffer$i.concat([iv, Buffer$i.from([0, 0, 0, 2])])
11008
11008
  }
11009
11009
  var ghash = new GHASH(ck);
11010
11010
  var len = iv.length;
@@ -11012,31 +11012,31 @@
11012
11012
  ghash.update(iv);
11013
11013
  if (toPad) {
11014
11014
  toPad = 16 - toPad;
11015
- ghash.update(Buffer$f.alloc(toPad, 0));
11015
+ ghash.update(Buffer$i.alloc(toPad, 0));
11016
11016
  }
11017
- ghash.update(Buffer$f.alloc(8, 0));
11017
+ ghash.update(Buffer$i.alloc(8, 0));
11018
11018
  var ivBits = len * 8;
11019
- var tail = Buffer$f.alloc(8);
11019
+ var tail = Buffer$i.alloc(8);
11020
11020
  tail.writeUIntBE(ivBits, 0, 8);
11021
11021
  ghash.update(tail);
11022
11022
  self._finID = ghash.state;
11023
- var out = Buffer$f.from(self._finID);
11023
+ var out = Buffer$i.from(self._finID);
11024
11024
  incr32(out);
11025
11025
  return out
11026
11026
  }
11027
11027
  function StreamCipher$3 (mode, key, iv, decrypt) {
11028
11028
  Transform$3.call(this);
11029
11029
 
11030
- var h = Buffer$f.alloc(4, 0);
11030
+ var h = Buffer$i.alloc(4, 0);
11031
11031
 
11032
11032
  this._cipher = new aes$4.AES(key);
11033
11033
  var ck = this._cipher.encryptBlock(h);
11034
11034
  this._ghash = new GHASH(ck);
11035
11035
  iv = calcIv(this, iv, ck);
11036
11036
 
11037
- this._prev = Buffer$f.from(iv);
11038
- this._cache = Buffer$f.allocUnsafe(0);
11039
- this._secCache = Buffer$f.allocUnsafe(0);
11037
+ this._prev = Buffer$i.from(iv);
11038
+ this._cache = Buffer$i.allocUnsafe(0);
11039
+ this._secCache = Buffer$i.allocUnsafe(0);
11040
11040
  this._decrypt = decrypt;
11041
11041
  this._alen = 0;
11042
11042
  this._len = 0;
@@ -11052,7 +11052,7 @@
11052
11052
  if (!this._called && this._alen) {
11053
11053
  var rump = 16 - (this._alen % 16);
11054
11054
  if (rump < 16) {
11055
- rump = Buffer$f.alloc(rump, 0);
11055
+ rump = Buffer$i.alloc(rump, 0);
11056
11056
  this._ghash.update(rump);
11057
11057
  }
11058
11058
  }
@@ -11079,7 +11079,7 @@
11079
11079
  };
11080
11080
 
11081
11081
  StreamCipher$3.prototype.getAuthTag = function getAuthTag () {
11082
- if (this._decrypt || !Buffer$f.isBuffer(this._authTag)) throw new Error('Attempting to get auth tag in unsupported state')
11082
+ if (this._decrypt || !Buffer$i.isBuffer(this._authTag)) throw new Error('Attempting to get auth tag in unsupported state')
11083
11083
 
11084
11084
  return this._authTag
11085
11085
  };
@@ -11100,7 +11100,7 @@
11100
11100
  var authCipher = StreamCipher$3;
11101
11101
 
11102
11102
  var aes$3 = aes$5;
11103
- var Buffer$e = safeBufferExports.Buffer;
11103
+ var Buffer$h = safeBufferExports.Buffer;
11104
11104
  var Transform$2 = cipherBase;
11105
11105
  var inherits$c = inherits_browserExports;
11106
11106
 
@@ -11108,9 +11108,9 @@
11108
11108
  Transform$2.call(this);
11109
11109
 
11110
11110
  this._cipher = new aes$3.AES(key);
11111
- this._prev = Buffer$e.from(iv);
11112
- this._cache = Buffer$e.allocUnsafe(0);
11113
- this._secCache = Buffer$e.allocUnsafe(0);
11111
+ this._prev = Buffer$h.from(iv);
11112
+ this._cache = Buffer$h.allocUnsafe(0);
11113
+ this._secCache = Buffer$h.allocUnsafe(0);
11114
11114
  this._decrypt = decrypt;
11115
11115
  this._mode = mode;
11116
11116
  }
@@ -11127,21 +11127,21 @@
11127
11127
 
11128
11128
  var streamCipher = StreamCipher$2;
11129
11129
 
11130
- var Buffer$d = safeBufferExports.Buffer;
11130
+ var Buffer$g = safeBufferExports.Buffer;
11131
11131
  var MD5 = md5_js;
11132
11132
 
11133
11133
  /* eslint-disable camelcase */
11134
11134
  function EVP_BytesToKey (password, salt, keyBits, ivLen) {
11135
- if (!Buffer$d.isBuffer(password)) password = Buffer$d.from(password, 'binary');
11135
+ if (!Buffer$g.isBuffer(password)) password = Buffer$g.from(password, 'binary');
11136
11136
  if (salt) {
11137
- if (!Buffer$d.isBuffer(salt)) salt = Buffer$d.from(salt, 'binary');
11137
+ if (!Buffer$g.isBuffer(salt)) salt = Buffer$g.from(salt, 'binary');
11138
11138
  if (salt.length !== 8) throw new RangeError('salt should be Buffer with 8 byte length')
11139
11139
  }
11140
11140
 
11141
11141
  var keyLen = keyBits / 8;
11142
- var key = Buffer$d.alloc(keyLen);
11143
- var iv = Buffer$d.alloc(ivLen || 0);
11144
- var tmp = Buffer$d.alloc(0);
11142
+ var key = Buffer$g.alloc(keyLen);
11143
+ var iv = Buffer$g.alloc(ivLen || 0);
11144
+ var tmp = Buffer$g.alloc(0);
11145
11145
 
11146
11146
  while (keyLen > 0 || ivLen > 0) {
11147
11147
  var hash = new MD5();
@@ -11175,7 +11175,7 @@
11175
11175
 
11176
11176
  var MODES$1 = modes_1;
11177
11177
  var AuthCipher$1 = authCipher;
11178
- var Buffer$c = safeBufferExports.Buffer;
11178
+ var Buffer$f = safeBufferExports.Buffer;
11179
11179
  var StreamCipher$1 = streamCipher;
11180
11180
  var Transform$1 = cipherBase;
11181
11181
  var aes$2 = aes$5;
@@ -11187,7 +11187,7 @@
11187
11187
 
11188
11188
  this._cache = new Splitter$1();
11189
11189
  this._cipher = new aes$2.AES(key);
11190
- this._prev = Buffer$c.from(iv);
11190
+ this._prev = Buffer$f.from(iv);
11191
11191
  this._mode = mode;
11192
11192
  this._autopadding = true;
11193
11193
  }
@@ -11205,10 +11205,10 @@
11205
11205
  out.push(thing);
11206
11206
  }
11207
11207
 
11208
- return Buffer$c.concat(out)
11208
+ return Buffer$f.concat(out)
11209
11209
  };
11210
11210
 
11211
- var PADDING = Buffer$c.alloc(16, 0x10);
11211
+ var PADDING = Buffer$f.alloc(16, 0x10);
11212
11212
 
11213
11213
  Cipher.prototype._final = function () {
11214
11214
  var chunk = this._cache.flush();
@@ -11230,11 +11230,11 @@
11230
11230
  };
11231
11231
 
11232
11232
  function Splitter$1 () {
11233
- this.cache = Buffer$c.allocUnsafe(0);
11233
+ this.cache = Buffer$f.allocUnsafe(0);
11234
11234
  }
11235
11235
 
11236
11236
  Splitter$1.prototype.add = function (data) {
11237
- this.cache = Buffer$c.concat([this.cache, data]);
11237
+ this.cache = Buffer$f.concat([this.cache, data]);
11238
11238
  };
11239
11239
 
11240
11240
  Splitter$1.prototype.get = function () {
@@ -11248,24 +11248,24 @@
11248
11248
 
11249
11249
  Splitter$1.prototype.flush = function () {
11250
11250
  var len = 16 - this.cache.length;
11251
- var padBuff = Buffer$c.allocUnsafe(len);
11251
+ var padBuff = Buffer$f.allocUnsafe(len);
11252
11252
 
11253
11253
  var i = -1;
11254
11254
  while (++i < len) {
11255
11255
  padBuff.writeUInt8(len, i);
11256
11256
  }
11257
11257
 
11258
- return Buffer$c.concat([this.cache, padBuff])
11258
+ return Buffer$f.concat([this.cache, padBuff])
11259
11259
  };
11260
11260
 
11261
11261
  function createCipheriv$1 (suite, password, iv) {
11262
11262
  var config = MODES$1[suite.toLowerCase()];
11263
11263
  if (!config) throw new TypeError('invalid suite type')
11264
11264
 
11265
- if (typeof password === 'string') password = Buffer$c.from(password);
11265
+ if (typeof password === 'string') password = Buffer$f.from(password);
11266
11266
  if (password.length !== config.key / 8) throw new TypeError('invalid key length ' + password.length)
11267
11267
 
11268
- if (typeof iv === 'string') iv = Buffer$c.from(iv);
11268
+ if (typeof iv === 'string') iv = Buffer$f.from(iv);
11269
11269
  if (config.mode !== 'GCM' && iv.length !== config.iv) throw new TypeError('invalid iv length ' + iv.length)
11270
11270
 
11271
11271
  if (config.type === 'stream') {
@@ -11291,7 +11291,7 @@
11291
11291
  var decrypter = {};
11292
11292
 
11293
11293
  var AuthCipher = authCipher;
11294
- var Buffer$b = safeBufferExports.Buffer;
11294
+ var Buffer$e = safeBufferExports.Buffer;
11295
11295
  var MODES = modes_1;
11296
11296
  var StreamCipher = streamCipher;
11297
11297
  var Transform = cipherBase;
@@ -11305,7 +11305,7 @@
11305
11305
  this._cache = new Splitter();
11306
11306
  this._last = void 0;
11307
11307
  this._cipher = new aes$1.AES(key);
11308
- this._prev = Buffer$b.from(iv);
11308
+ this._prev = Buffer$e.from(iv);
11309
11309
  this._mode = mode;
11310
11310
  this._autopadding = true;
11311
11311
  }
@@ -11321,7 +11321,7 @@
11321
11321
  thing = this._mode.decrypt(this, chunk);
11322
11322
  out.push(thing);
11323
11323
  }
11324
- return Buffer$b.concat(out)
11324
+ return Buffer$e.concat(out)
11325
11325
  };
11326
11326
 
11327
11327
  Decipher.prototype._final = function () {
@@ -11339,11 +11339,11 @@
11339
11339
  };
11340
11340
 
11341
11341
  function Splitter () {
11342
- this.cache = Buffer$b.allocUnsafe(0);
11342
+ this.cache = Buffer$e.allocUnsafe(0);
11343
11343
  }
11344
11344
 
11345
11345
  Splitter.prototype.add = function (data) {
11346
- this.cache = Buffer$b.concat([this.cache, data]);
11346
+ this.cache = Buffer$e.concat([this.cache, data]);
11347
11347
  };
11348
11348
 
11349
11349
  Splitter.prototype.get = function (autoPadding) {
@@ -11389,10 +11389,10 @@
11389
11389
  var config = MODES[suite.toLowerCase()];
11390
11390
  if (!config) throw new TypeError('invalid suite type')
11391
11391
 
11392
- if (typeof iv === 'string') iv = Buffer$b.from(iv);
11392
+ if (typeof iv === 'string') iv = Buffer$e.from(iv);
11393
11393
  if (config.mode !== 'GCM' && iv.length !== config.iv) throw new TypeError('invalid iv length ' + iv.length)
11394
11394
 
11395
- if (typeof password === 'string') password = Buffer$b.from(password);
11395
+ if (typeof password === 'string') password = Buffer$e.from(password);
11396
11396
  if (password.length !== config.key / 8) throw new TypeError('invalid key length ' + password.length)
11397
11397
 
11398
11398
  if (config.type === 'stream') {
@@ -11417,7 +11417,7 @@
11417
11417
 
11418
11418
  var ciphers$2 = encrypter;
11419
11419
  var deciphers = decrypter;
11420
- var modes$1 = require$$2$1;
11420
+ var modes$1 = require$$2;
11421
11421
 
11422
11422
  function getCiphers$1 () {
11423
11423
  return Object.keys(modes$1)
@@ -11908,8 +11908,8 @@
11908
11908
 
11909
11909
  function setPublicKey(pub, enc) {
11910
11910
  enc = enc || 'utf8';
11911
- if (!require$$0$4.Buffer.isBuffer(pub)) {
11912
- pub = new require$$0$4.Buffer(pub, enc);
11911
+ if (!require$$0$3.Buffer.isBuffer(pub)) {
11912
+ pub = new require$$0$3.Buffer(pub, enc);
11913
11913
  }
11914
11914
  this._pub = new BN(pub);
11915
11915
  return this;
@@ -11917,8 +11917,8 @@
11917
11917
 
11918
11918
  function setPrivateKey(priv, enc) {
11919
11919
  enc = enc || 'utf8';
11920
- if (!require$$0$4.Buffer.isBuffer(priv)) {
11921
- priv = new require$$0$4.Buffer(priv, enc);
11920
+ if (!require$$0$3.Buffer.isBuffer(priv)) {
11921
+ priv = new require$$0$3.Buffer(priv, enc);
11922
11922
  }
11923
11923
  this._priv = new BN(priv);
11924
11924
  return this;
@@ -12014,12 +12014,12 @@
12014
12014
  other = new BN(other);
12015
12015
  other = other.toRed(this._prime);
12016
12016
  var secret = other.redPow(this._priv).fromRed();
12017
- var out = new require$$0$4.Buffer(secret.toArray());
12017
+ var out = new require$$0$3.Buffer(secret.toArray());
12018
12018
  var prime = this.getPrime();
12019
12019
  if (out.length < prime.length) {
12020
- var front = new require$$0$4.Buffer(prime.length - out.length);
12020
+ var front = new require$$0$3.Buffer(prime.length - out.length);
12021
12021
  front.fill(0);
12022
- out = require$$0$4.Buffer.concat([front, out]);
12022
+ out = require$$0$3.Buffer.concat([front, out]);
12023
12023
  }
12024
12024
  return out;
12025
12025
  };
@@ -12042,8 +12042,8 @@
12042
12042
 
12043
12043
  DH.prototype.setGenerator = function (gen, enc) {
12044
12044
  enc = enc || 'utf8';
12045
- if (!require$$0$4.Buffer.isBuffer(gen)) {
12046
- gen = new require$$0$4.Buffer(gen, enc);
12045
+ if (!require$$0$3.Buffer.isBuffer(gen)) {
12046
+ gen = new require$$0$3.Buffer(gen, enc);
12047
12047
  }
12048
12048
  this.__gen = gen;
12049
12049
  this._gen = new BN(gen);
@@ -12051,7 +12051,7 @@
12051
12051
  };
12052
12052
 
12053
12053
  function formatReturnValue(bn, enc) {
12054
- var buf = new require$$0$4.Buffer(bn.toArray());
12054
+ var buf = new require$$0$3.Buffer(bn.toArray());
12055
12055
  if (!enc) {
12056
12056
  return buf;
12057
12057
  } else {
@@ -12072,8 +12072,8 @@
12072
12072
  var DH = requireDh();
12073
12073
 
12074
12074
  function getDiffieHellman (mod) {
12075
- var prime = new require$$0$4.Buffer(primes[mod].prime, 'hex');
12076
- var gen = new require$$0$4.Buffer(primes[mod].gen, 'hex');
12075
+ var prime = new require$$0$3.Buffer(primes[mod].prime, 'hex');
12076
+ var gen = new require$$0$3.Buffer(primes[mod].gen, 'hex');
12077
12077
 
12078
12078
  return new DH(prime, gen)
12079
12079
  }
@@ -12083,24 +12083,24 @@
12083
12083
  };
12084
12084
 
12085
12085
  function createDiffieHellman (prime, enc, generator, genc) {
12086
- if (require$$0$4.Buffer.isBuffer(enc) || ENCODINGS[enc] === undefined) {
12086
+ if (require$$0$3.Buffer.isBuffer(enc) || ENCODINGS[enc] === undefined) {
12087
12087
  return createDiffieHellman(prime, 'binary', enc, generator)
12088
12088
  }
12089
12089
 
12090
12090
  enc = enc || 'binary';
12091
12091
  genc = genc || 'binary';
12092
- generator = generator || new require$$0$4.Buffer([2]);
12092
+ generator = generator || new require$$0$3.Buffer([2]);
12093
12093
 
12094
- if (!require$$0$4.Buffer.isBuffer(generator)) {
12095
- generator = new require$$0$4.Buffer(generator, genc);
12094
+ if (!require$$0$3.Buffer.isBuffer(generator)) {
12095
+ generator = new require$$0$3.Buffer(generator, genc);
12096
12096
  }
12097
12097
 
12098
12098
  if (typeof prime === 'number') {
12099
12099
  return new DH(generatePrime(prime, generator), generator, true)
12100
12100
  }
12101
12101
 
12102
- if (!require$$0$4.Buffer.isBuffer(prime)) {
12103
- prime = new require$$0$4.Buffer(prime, enc);
12102
+ if (!require$$0$3.Buffer.isBuffer(prime)) {
12103
+ prime = new require$$0$3.Buffer(prime, enc);
12104
12104
  }
12105
12105
 
12106
12106
  return new DH(prime, generator, true)
@@ -12178,7 +12178,7 @@
12178
12178
  if (typeof window !== 'undefined' && typeof window.Buffer !== 'undefined') {
12179
12179
  Buffer = window.Buffer;
12180
12180
  } else {
12181
- Buffer = require$$0$3.Buffer;
12181
+ Buffer = require$$0$2.Buffer;
12182
12182
  }
12183
12183
  } catch (e) {
12184
12184
  }
@@ -15504,7 +15504,7 @@
15504
15504
  var m1 = c1.redPow(priv.exponent1).fromRed();
15505
15505
  var m2 = c2.redPow(priv.exponent2).fromRed();
15506
15506
  var h = m1.isub(m2).imul(qinv).umod(p).imul(q);
15507
- return m2.iadd(h).imul(blinds.unblinder).umod(priv.modulus).toArrayLike(require$$0$4.Buffer, 'be', len)
15507
+ return m2.iadd(h).imul(blinds.unblinder).umod(priv.modulus).toArrayLike(require$$0$3.Buffer, 'be', len)
15508
15508
  }
15509
15509
  crt$2.getr = getr;
15510
15510
 
@@ -20922,7 +20922,7 @@
20922
20922
  if (typeof window !== 'undefined' && typeof window.Buffer !== 'undefined') {
20923
20923
  Buffer = window.Buffer;
20924
20924
  } else {
20925
- Buffer = require$$0$3.Buffer;
20925
+ Buffer = require$$0$2.Buffer;
20926
20926
  }
20927
20927
  } catch (e) {
20928
20928
  }
@@ -24228,8 +24228,8 @@
24228
24228
 
24229
24229
  /* eslint-disable node/no-deprecated-api */
24230
24230
 
24231
- var buffer$1 = require$$0$4;
24232
- var Buffer$a = buffer$1.Buffer;
24231
+ var buffer$1 = require$$0$3;
24232
+ var Buffer$d = buffer$1.Buffer;
24233
24233
 
24234
24234
  var safer = {};
24235
24235
 
@@ -24242,13 +24242,13 @@
24242
24242
  }
24243
24243
 
24244
24244
  var Safer = safer.Buffer = {};
24245
- for (key in Buffer$a) {
24246
- if (!Buffer$a.hasOwnProperty(key)) continue
24245
+ for (key in Buffer$d) {
24246
+ if (!Buffer$d.hasOwnProperty(key)) continue
24247
24247
  if (key === 'allocUnsafe' || key === 'allocUnsafeSlow') continue
24248
- Safer[key] = Buffer$a[key];
24248
+ Safer[key] = Buffer$d[key];
24249
24249
  }
24250
24250
 
24251
- safer.Buffer.prototype = Buffer$a.prototype;
24251
+ safer.Buffer.prototype = Buffer$d.prototype;
24252
24252
 
24253
24253
  if (!Safer.from || Safer.from === Uint8Array.from) {
24254
24254
  Safer.from = function (value, encodingOrOffset, length) {
@@ -24258,7 +24258,7 @@
24258
24258
  if (value && typeof value.length === 'undefined') {
24259
24259
  throw new TypeError('The first argument must be one of type string, Buffer, ArrayBuffer, Array, or Array-like Object. Received type ' + typeof value)
24260
24260
  }
24261
- return Buffer$a(value, encodingOrOffset, length)
24261
+ return Buffer$d(value, encodingOrOffset, length)
24262
24262
  };
24263
24263
  }
24264
24264
 
@@ -24270,7 +24270,7 @@
24270
24270
  if (size < 0 || size >= 2 * (1 << 30)) {
24271
24271
  throw new RangeError('The value "' + size + '" is invalid for option "size"')
24272
24272
  }
24273
- var buf = Buffer$a(size);
24273
+ var buf = Buffer$d(size);
24274
24274
  if (!fill || fill.length === 0) {
24275
24275
  buf.fill(0);
24276
24276
  } else if (typeof encoding === 'string') {
@@ -24430,11 +24430,11 @@
24430
24430
 
24431
24431
  const inherits$4 = inherits_browserExports;
24432
24432
  const Reporter$1 = reporter.Reporter;
24433
- const Buffer$9 = safer_1.Buffer;
24433
+ const Buffer$c = safer_1.Buffer;
24434
24434
 
24435
24435
  function DecoderBuffer$2(base, options) {
24436
24436
  Reporter$1.call(this, options);
24437
- if (!Buffer$9.isBuffer(base)) {
24437
+ if (!Buffer$c.isBuffer(base)) {
24438
24438
  this.error('Input not Buffer');
24439
24439
  return;
24440
24440
  }
@@ -24453,7 +24453,7 @@
24453
24453
 
24454
24454
  // Or accept compatible API
24455
24455
  const isCompatible = typeof data === 'object' &&
24456
- Buffer$9.isBuffer(data.base) &&
24456
+ Buffer$c.isBuffer(data.base) &&
24457
24457
  data.constructor.name === 'DecoderBuffer' &&
24458
24458
  typeof data.offset === 'number' &&
24459
24459
  typeof data.length === 'number' &&
@@ -24529,8 +24529,8 @@
24529
24529
  this.length = 1;
24530
24530
  } else if (typeof value === 'string') {
24531
24531
  this.value = value;
24532
- this.length = Buffer$9.byteLength(value);
24533
- } else if (Buffer$9.isBuffer(value)) {
24532
+ this.length = Buffer$c.byteLength(value);
24533
+ } else if (Buffer$c.isBuffer(value)) {
24534
24534
  this.value = value;
24535
24535
  this.length = value.length;
24536
24536
  } else {
@@ -24555,7 +24555,7 @@
24555
24555
 
24556
24556
  EncoderBuffer$1.prototype.join = function join(out, offset) {
24557
24557
  if (!out)
24558
- out = Buffer$9.alloc(this.length);
24558
+ out = Buffer$c.alloc(this.length);
24559
24559
  if (!offset)
24560
24560
  offset = 0;
24561
24561
 
@@ -24572,7 +24572,7 @@
24572
24572
  out[offset] = this.value;
24573
24573
  else if (typeof this.value === 'string')
24574
24574
  out.write(this.value, offset);
24575
- else if (Buffer$9.isBuffer(this.value))
24575
+ else if (Buffer$c.isBuffer(this.value))
24576
24576
  this.value.copy(out, offset);
24577
24577
  offset += this.length;
24578
24578
  }
@@ -25278,7 +25278,7 @@
25278
25278
  } (der$2));
25279
25279
 
25280
25280
  const inherits$3 = inherits_browserExports;
25281
- const Buffer$8 = safer_1.Buffer;
25281
+ const Buffer$b = safer_1.Buffer;
25282
25282
  const Node$3 = node;
25283
25283
 
25284
25284
  // Import DER constants
@@ -25314,7 +25314,7 @@
25314
25314
 
25315
25315
  // Short form
25316
25316
  if (content.length < 0x80) {
25317
- const header = Buffer$8.alloc(2);
25317
+ const header = Buffer$b.alloc(2);
25318
25318
  header[0] = encodedTag;
25319
25319
  header[1] = content.length;
25320
25320
  return this._createEncoderBuffer([ header, content ]);
@@ -25326,7 +25326,7 @@
25326
25326
  for (let i = content.length; i >= 0x100; i >>= 8)
25327
25327
  lenOctets++;
25328
25328
 
25329
- const header = Buffer$8.alloc(1 + 1 + lenOctets);
25329
+ const header = Buffer$b.alloc(1 + 1 + lenOctets);
25330
25330
  header[0] = encodedTag;
25331
25331
  header[1] = 0x80 | lenOctets;
25332
25332
 
@@ -25340,7 +25340,7 @@
25340
25340
  if (tag === 'bitstr') {
25341
25341
  return this._createEncoderBuffer([ str.unused | 0, str.data ]);
25342
25342
  } else if (tag === 'bmpstr') {
25343
- const buf = Buffer$8.alloc(str.length * 2);
25343
+ const buf = Buffer$b.alloc(str.length * 2);
25344
25344
  for (let i = 0; i < str.length; i++) {
25345
25345
  buf.writeUInt16BE(str.charCodeAt(i), i * 2);
25346
25346
  }
@@ -25405,7 +25405,7 @@
25405
25405
  size++;
25406
25406
  }
25407
25407
 
25408
- const objid = Buffer$8.alloc(size);
25408
+ const objid = Buffer$b.alloc(size);
25409
25409
  let offset = objid.length - 1;
25410
25410
  for (let i = id.length - 1; i >= 0; i--) {
25411
25411
  let ident = id[i];
@@ -25471,20 +25471,20 @@
25471
25471
  }
25472
25472
 
25473
25473
  // Bignum, assume big endian
25474
- if (typeof num !== 'number' && !Buffer$8.isBuffer(num)) {
25474
+ if (typeof num !== 'number' && !Buffer$b.isBuffer(num)) {
25475
25475
  const numArray = num.toArray();
25476
25476
  if (!num.sign && numArray[0] & 0x80) {
25477
25477
  numArray.unshift(0);
25478
25478
  }
25479
- num = Buffer$8.from(numArray);
25479
+ num = Buffer$b.from(numArray);
25480
25480
  }
25481
25481
 
25482
- if (Buffer$8.isBuffer(num)) {
25482
+ if (Buffer$b.isBuffer(num)) {
25483
25483
  let size = num.length;
25484
25484
  if (num.length === 0)
25485
25485
  size++;
25486
25486
 
25487
- const out = Buffer$8.alloc(size);
25487
+ const out = Buffer$b.alloc(size);
25488
25488
  num.copy(out);
25489
25489
  if (num.length === 0)
25490
25490
  out[0] = 0;
@@ -25510,7 +25510,7 @@
25510
25510
  out.unshift(0);
25511
25511
  }
25512
25512
 
25513
- return this._createEncoderBuffer(Buffer$8.from(out));
25513
+ return this._createEncoderBuffer(Buffer$b.from(out));
25514
25514
  };
25515
25515
 
25516
25516
  DERNode$1.prototype._encodeBool = function encodeBool(value) {
@@ -25938,7 +25938,7 @@
25938
25938
  }
25939
25939
 
25940
25940
  const inherits = inherits_browserExports;
25941
- const Buffer$7 = safer_1.Buffer;
25941
+ const Buffer$a = safer_1.Buffer;
25942
25942
 
25943
25943
  const DERDecoder = der_1;
25944
25944
 
@@ -25983,7 +25983,7 @@
25983
25983
  // Remove excessive symbols
25984
25984
  base64.replace(/[^a-z0-9+/=]+/gi, '');
25985
25985
 
25986
- const input = Buffer$7.from(base64, 'base64');
25986
+ const input = Buffer$a.from(base64, 'base64');
25987
25987
  return DERDecoder.prototype.decode.call(this, input, options);
25988
25988
  };
25989
25989
 
@@ -26329,24 +26329,24 @@
26329
26329
  var fullRegex = /^-----BEGIN ((?:.*? KEY)|CERTIFICATE)-----([0-9A-z\n\r+/=]+)-----END \1-----$/m;
26330
26330
  var evp = evp_bytestokey;
26331
26331
  var ciphers$1 = browser$5;
26332
- var Buffer$6 = safeBufferExports.Buffer;
26332
+ var Buffer$9 = safeBufferExports.Buffer;
26333
26333
  var fixProc$1 = function (okey, password) {
26334
26334
  var key = okey.toString();
26335
26335
  var match = key.match(findProc);
26336
26336
  var decrypted;
26337
26337
  if (!match) {
26338
26338
  var match2 = key.match(fullRegex);
26339
- decrypted = Buffer$6.from(match2[2].replace(/[\r\n]/g, ''), 'base64');
26339
+ decrypted = Buffer$9.from(match2[2].replace(/[\r\n]/g, ''), 'base64');
26340
26340
  } else {
26341
26341
  var suite = 'aes' + match[1];
26342
- var iv = Buffer$6.from(match[2], 'hex');
26343
- var cipherText = Buffer$6.from(match[3].replace(/[\r\n]/g, ''), 'base64');
26342
+ var iv = Buffer$9.from(match[2], 'hex');
26343
+ var cipherText = Buffer$9.from(match[3].replace(/[\r\n]/g, ''), 'base64');
26344
26344
  var cipherKey = evp(password, iv.slice(0, 8), parseInt(match[1], 10)).key;
26345
26345
  var out = [];
26346
26346
  var cipher = ciphers$1.createDecipheriv(suite, cipherKey, iv);
26347
26347
  out.push(cipher.update(cipherText));
26348
26348
  out.push(cipher.final());
26349
- decrypted = Buffer$6.concat(out);
26349
+ decrypted = Buffer$9.concat(out);
26350
26350
  }
26351
26351
  var tag = key.match(startRegex)[1];
26352
26352
  return {
@@ -26360,17 +26360,17 @@
26360
26360
  var fixProc = fixProc$1;
26361
26361
  var ciphers = browser$5;
26362
26362
  var compat = browser$7;
26363
- var Buffer$5 = safeBufferExports.Buffer;
26363
+ var Buffer$8 = safeBufferExports.Buffer;
26364
26364
  var parseAsn1 = parseKeys$2;
26365
26365
 
26366
26366
  function parseKeys$2 (buffer) {
26367
26367
  var password;
26368
- if (typeof buffer === 'object' && !Buffer$5.isBuffer(buffer)) {
26368
+ if (typeof buffer === 'object' && !Buffer$8.isBuffer(buffer)) {
26369
26369
  password = buffer.passphrase;
26370
26370
  buffer = buffer.key;
26371
26371
  }
26372
26372
  if (typeof buffer === 'string') {
26373
- buffer = Buffer$5.from(buffer);
26373
+ buffer = Buffer$8.from(buffer);
26374
26374
  }
26375
26375
 
26376
26376
  var stripped = fixProc(buffer, password);
@@ -26460,7 +26460,7 @@
26460
26460
  var out = [];
26461
26461
  out.push(cipher.update(cipherText));
26462
26462
  out.push(cipher.final());
26463
- return Buffer$5.concat(out)
26463
+ return Buffer$8.concat(out)
26464
26464
  }
26465
26465
 
26466
26466
  var require$$4 = {
@@ -26885,8 +26885,8 @@
26885
26885
 
26886
26886
  ECDH.prototype.computeSecret = function (other, inenc, enc) {
26887
26887
  inenc = inenc || 'utf8';
26888
- if (!require$$0$4.Buffer.isBuffer(other)) {
26889
- other = new require$$0$4.Buffer(other, inenc);
26888
+ if (!require$$0$3.Buffer.isBuffer(other)) {
26889
+ other = new require$$0$3.Buffer(other, inenc);
26890
26890
  }
26891
26891
  var otherPub = this.curve.keyFromPublic(other).getPublic();
26892
26892
  var out = otherPub.mul(this.keys.getPrivate()).getX();
@@ -26911,8 +26911,8 @@
26911
26911
 
26912
26912
  ECDH.prototype.setPublicKey = function (pub, enc) {
26913
26913
  enc = enc || 'utf8';
26914
- if (!require$$0$4.Buffer.isBuffer(pub)) {
26915
- pub = new require$$0$4.Buffer(pub, enc);
26914
+ if (!require$$0$3.Buffer.isBuffer(pub)) {
26915
+ pub = new require$$0$3.Buffer(pub, enc);
26916
26916
  }
26917
26917
  this.keys._importPublic(pub);
26918
26918
  return this
@@ -26920,8 +26920,8 @@
26920
26920
 
26921
26921
  ECDH.prototype.setPrivateKey = function (priv, enc) {
26922
26922
  enc = enc || 'utf8';
26923
- if (!require$$0$4.Buffer.isBuffer(priv)) {
26924
- priv = new require$$0$4.Buffer(priv, enc);
26923
+ if (!require$$0$3.Buffer.isBuffer(priv)) {
26924
+ priv = new require$$0$3.Buffer(priv, enc);
26925
26925
  }
26926
26926
 
26927
26927
  var _priv = new BN(priv);
@@ -26935,11 +26935,11 @@
26935
26935
  if (!Array.isArray(bn)) {
26936
26936
  bn = bn.toArray();
26937
26937
  }
26938
- var buf = new require$$0$4.Buffer(bn);
26938
+ var buf = new require$$0$3.Buffer(bn);
26939
26939
  if (len && buf.length < len) {
26940
- var zeros = new require$$0$4.Buffer(len - buf.length);
26940
+ var zeros = new require$$0$3.Buffer(len - buf.length);
26941
26941
  zeros.fill(0);
26942
- buf = require$$0$4.Buffer.concat([zeros, buf]);
26942
+ buf = require$$0$3.Buffer.concat([zeros, buf]);
26943
26943
  }
26944
26944
  if (!enc) {
26945
26945
  return buf
@@ -26953,21 +26953,21 @@
26953
26953
  var browser$1 = {};
26954
26954
 
26955
26955
  var createHash$2 = browser$9;
26956
- var Buffer$4 = safeBufferExports.Buffer;
26956
+ var Buffer$7 = safeBufferExports.Buffer;
26957
26957
 
26958
26958
  var mgf$2 = function (seed, len) {
26959
- var t = Buffer$4.alloc(0);
26959
+ var t = Buffer$7.alloc(0);
26960
26960
  var i = 0;
26961
26961
  var c;
26962
26962
  while (t.length < len) {
26963
26963
  c = i2ops(i++);
26964
- t = Buffer$4.concat([t, createHash$2('sha1').update(seed).update(c).digest()]);
26964
+ t = Buffer$7.concat([t, createHash$2('sha1').update(seed).update(c).digest()]);
26965
26965
  }
26966
26966
  return t.slice(0, len)
26967
26967
  };
26968
26968
 
26969
26969
  function i2ops (c) {
26970
- var out = Buffer$4.allocUnsafe(4);
26970
+ var out = Buffer$7.allocUnsafe(4);
26971
26971
  out.writeUInt32BE(c, 0);
26972
26972
  return out
26973
26973
  }
@@ -26982,10 +26982,10 @@
26982
26982
  };
26983
26983
 
26984
26984
  var BN$3 = bnExports$2;
26985
- var Buffer$3 = safeBufferExports.Buffer;
26985
+ var Buffer$6 = safeBufferExports.Buffer;
26986
26986
 
26987
26987
  function withPublic$2 (paddedMsg, key) {
26988
- return Buffer$3.from(paddedMsg
26988
+ return Buffer$6.from(paddedMsg
26989
26989
  .toRed(BN$3.mont(key.modulus))
26990
26990
  .redPow(new BN$3(key.publicExponent))
26991
26991
  .fromRed()
@@ -27002,7 +27002,7 @@
27002
27002
  var BN$2 = bnExports$2;
27003
27003
  var withPublic$1 = withPublic_1;
27004
27004
  var crt$1 = browserifyRsa;
27005
- var Buffer$2 = safeBufferExports.Buffer;
27005
+ var Buffer$5 = safeBufferExports.Buffer;
27006
27006
 
27007
27007
  var publicEncrypt = function publicEncrypt (publicKey, msg, reverse) {
27008
27008
  var padding;
@@ -27037,18 +27037,18 @@
27037
27037
  function oaep$1 (key, msg) {
27038
27038
  var k = key.modulus.byteLength();
27039
27039
  var mLen = msg.length;
27040
- var iHash = createHash$1('sha1').update(Buffer$2.alloc(0)).digest();
27040
+ var iHash = createHash$1('sha1').update(Buffer$5.alloc(0)).digest();
27041
27041
  var hLen = iHash.length;
27042
27042
  var hLen2 = 2 * hLen;
27043
27043
  if (mLen > k - hLen2 - 2) {
27044
27044
  throw new Error('message too long')
27045
27045
  }
27046
- var ps = Buffer$2.alloc(k - mLen - hLen2 - 2);
27046
+ var ps = Buffer$5.alloc(k - mLen - hLen2 - 2);
27047
27047
  var dblen = k - hLen - 1;
27048
27048
  var seed = randomBytes$1(hLen);
27049
- var maskedDb = xor$1(Buffer$2.concat([iHash, ps, Buffer$2.alloc(1, 1), msg], dblen), mgf$1(seed, dblen));
27049
+ var maskedDb = xor$1(Buffer$5.concat([iHash, ps, Buffer$5.alloc(1, 1), msg], dblen), mgf$1(seed, dblen));
27050
27050
  var maskedSeed = xor$1(seed, mgf$1(maskedDb, hLen));
27051
- return new BN$2(Buffer$2.concat([Buffer$2.alloc(1), maskedSeed, maskedDb], k))
27051
+ return new BN$2(Buffer$5.concat([Buffer$5.alloc(1), maskedSeed, maskedDb], k))
27052
27052
  }
27053
27053
  function pkcs1$1 (key, msg, reverse) {
27054
27054
  var mLen = msg.length;
@@ -27058,14 +27058,14 @@
27058
27058
  }
27059
27059
  var ps;
27060
27060
  if (reverse) {
27061
- ps = Buffer$2.alloc(k - mLen - 3, 0xff);
27061
+ ps = Buffer$5.alloc(k - mLen - 3, 0xff);
27062
27062
  } else {
27063
27063
  ps = nonZero(k - mLen - 3);
27064
27064
  }
27065
- return new BN$2(Buffer$2.concat([Buffer$2.from([0, reverse ? 1 : 2]), ps, Buffer$2.alloc(1), msg], k))
27065
+ return new BN$2(Buffer$5.concat([Buffer$5.from([0, reverse ? 1 : 2]), ps, Buffer$5.alloc(1), msg], k))
27066
27066
  }
27067
27067
  function nonZero (len) {
27068
- var out = Buffer$2.allocUnsafe(len);
27068
+ var out = Buffer$5.allocUnsafe(len);
27069
27069
  var i = 0;
27070
27070
  var cache = randomBytes$1(len * 2);
27071
27071
  var cur = 0;
@@ -27090,7 +27090,7 @@
27090
27090
  var crt = browserifyRsa;
27091
27091
  var createHash = browser$9;
27092
27092
  var withPublic = withPublic_1;
27093
- var Buffer$1 = safeBufferExports.Buffer;
27093
+ var Buffer$4 = safeBufferExports.Buffer;
27094
27094
 
27095
27095
  var privateDecrypt = function privateDecrypt (privateKey, enc, reverse) {
27096
27096
  var padding;
@@ -27113,8 +27113,8 @@
27113
27113
  } else {
27114
27114
  msg = crt(enc, key);
27115
27115
  }
27116
- var zBuffer = Buffer$1.alloc(k - msg.length);
27117
- msg = Buffer$1.concat([zBuffer, msg], k);
27116
+ var zBuffer = Buffer$4.alloc(k - msg.length);
27117
+ msg = Buffer$4.concat([zBuffer, msg], k);
27118
27118
  if (padding === 4) {
27119
27119
  return oaep(key, msg)
27120
27120
  } else if (padding === 1) {
@@ -27128,7 +27128,7 @@
27128
27128
 
27129
27129
  function oaep (key, msg) {
27130
27130
  var k = key.modulus.byteLength();
27131
- var iHash = createHash('sha1').update(Buffer$1.alloc(0)).digest();
27131
+ var iHash = createHash('sha1').update(Buffer$4.alloc(0)).digest();
27132
27132
  var hLen = iHash.length;
27133
27133
  if (msg[0] !== 0) {
27134
27134
  throw new Error('decryption error')
@@ -27174,8 +27174,8 @@
27174
27174
  return msg.slice(i)
27175
27175
  }
27176
27176
  function compare (a, b) {
27177
- a = Buffer$1.from(a);
27178
- b = Buffer$1.from(b);
27177
+ a = Buffer$4.from(a);
27178
+ b = Buffer$4.from(b);
27179
27179
  var dif = 0;
27180
27180
  var len = a.length;
27181
27181
  if (a.length !== b.length) {
@@ -27209,7 +27209,7 @@
27209
27209
  }
27210
27210
  var safeBuffer = safeBufferExports;
27211
27211
  var randombytes = browserExports;
27212
- var Buffer = safeBuffer.Buffer;
27212
+ var Buffer$3 = safeBuffer.Buffer;
27213
27213
  var kBufferMaxLength = safeBuffer.kMaxLength;
27214
27214
  var crypto = commonjsGlobal.crypto || commonjsGlobal.msCrypto;
27215
27215
  var kMaxUint32 = Math.pow(2, 32) - 1;
@@ -27248,7 +27248,7 @@
27248
27248
  browser.randomFillSync = oldBrowser;
27249
27249
  }
27250
27250
  function randomFill (buf, offset, size, cb) {
27251
- if (!Buffer.isBuffer(buf) && !(buf instanceof commonjsGlobal.Uint8Array)) {
27251
+ if (!Buffer$3.isBuffer(buf) && !(buf instanceof commonjsGlobal.Uint8Array)) {
27252
27252
  throw new TypeError('"buf" argument must be a Buffer or Uint8Array')
27253
27253
  }
27254
27254
 
@@ -27298,7 +27298,7 @@
27298
27298
  if (typeof offset === 'undefined') {
27299
27299
  offset = 0;
27300
27300
  }
27301
- if (!Buffer.isBuffer(buf) && !(buf instanceof commonjsGlobal.Uint8Array)) {
27301
+ if (!Buffer$3.isBuffer(buf) && !(buf instanceof commonjsGlobal.Uint8Array)) {
27302
27302
  throw new TypeError('"buf" argument must be a Buffer or Uint8Array')
27303
27303
  }
27304
27304
 
@@ -28172,7 +28172,7 @@
28172
28172
 
28173
28173
  function createPublicKey(privKey) {
28174
28174
  validatePrivKeyFormat(privKey);
28175
- return require$$0$4.Buffer.from(elliptic.publicKeyCreate(privKey, true).buffer);
28175
+ return require$$0$3.Buffer.from(elliptic.publicKeyCreate(privKey, true).buffer);
28176
28176
  }
28177
28177
  function randomBytes(size) {
28178
28178
  return cryptoBrowserifyExports.randomBytes(size);
@@ -28182,7 +28182,7 @@
28182
28182
  }
28183
28183
  const hash256 = sha256;
28184
28184
  function hashConcat(items) {
28185
- return hash256(require$$0$4.Buffer.concat(items));
28185
+ return hash256(require$$0$3.Buffer.concat(items));
28186
28186
  }
28187
28187
  /**
28188
28188
  * @param content the content that the signature signs. It will be digested before validating.
@@ -28223,7 +28223,7 @@
28223
28223
  * @return the signature
28224
28224
  */
28225
28225
  function signDigest(digestBuffer, privKey) {
28226
- return require$$0$4.Buffer.from(elliptic.ecdsaSign(digestBuffer, privKey).signature);
28226
+ return require$$0$3.Buffer.from(elliptic.ecdsaSign(digestBuffer, privKey).signature);
28227
28227
  }
28228
28228
  /**
28229
28229
  * Creates a key pair (which usually represents one user)
@@ -28240,7 +28240,7 @@
28240
28240
  do {
28241
28241
  privKey = randomBytes(32);
28242
28242
  } while (!elliptic.privateKeyVerify(privKey));
28243
- pubKey = require$$0$4.Buffer.from(elliptic.publicKeyCreate(privKey).buffer);
28243
+ pubKey = require$$0$3.Buffer.from(elliptic.publicKeyCreate(privKey).buffer);
28244
28244
  }
28245
28245
  return { pubKey, privKey };
28246
28246
  }
@@ -28258,14 +28258,14 @@
28258
28258
  */
28259
28259
  function verifyKeyPair(privKey) {
28260
28260
  validatePrivKeyFormat(privKey);
28261
- const pubKey = require$$0$4.Buffer.from(elliptic.publicKeyCreate(privKey).buffer);
28261
+ const pubKey = require$$0$3.Buffer.from(elliptic.publicKeyCreate(privKey).buffer);
28262
28262
  return { pubKey, privKey };
28263
28263
  }
28264
28264
  function validatePrivKeyFormat(privKey) {
28265
28265
  if (!privKey) {
28266
28266
  throw new MissingPrivKeyArgumentException();
28267
28267
  }
28268
- if (!require$$0$4.Buffer.isBuffer(privKey) || privKey.length !== 32) {
28268
+ if (!require$$0$3.Buffer.isBuffer(privKey) || privKey.length !== 32) {
28269
28269
  throw new PrivKeyFormatException(privKey);
28270
28270
  }
28271
28271
  }
@@ -28286,11 +28286,12 @@
28286
28286
  verifyKeyPair: verifyKeyPair
28287
28287
  });
28288
28288
 
28289
- var require$$2 = /*@__PURE__*/getAugmentedNamespace(encryption$1);
28289
+ var require$$3 = /*@__PURE__*/getAugmentedNamespace(encryption$1);
28290
28290
 
28291
- var serialization = require$$0$2;
28291
+ const { Buffer: Buffer$2 } = require$$0$3;
28292
+ var serialization = require$$1$2;
28292
28293
  var HASH_PREFIX_LEAF = binarytree.HASH_PREFIX_LEAF;
28293
- var encryption = require$$2;
28294
+ var encryption = require$$3;
28294
28295
  function CryptoSystem() { }
28295
28296
  CryptoSystem.prototype.digest = function (buffer) {
28296
28297
  return encryption.hash256(buffer);
@@ -28335,15 +28336,15 @@
28335
28336
  * @param {Buffer} hashRight
28336
28337
  */
28337
28338
  MerkleHashCalculator.prototype.calculateNodeHashInternal = function (prefix, hashLeft, hashRight, hashFunc) {
28338
- var buf = require$$0$4.Buffer.alloc(1);
28339
+ var buf = Buffer$2.alloc(1);
28339
28340
  buf.writeInt8(prefix);
28340
- var bufferSum = require$$0$4.Buffer.concat([buf, hashLeft, hashRight]);
28341
+ var bufferSum = Buffer$2.concat([buf, hashLeft, hashRight]);
28341
28342
  return hashFunc(bufferSum, this.cryptoSystem);
28342
28343
  };
28343
28344
  MerkleHashCalculator.prototype.calculateHashOfValueInternal = function (valuetoHash, serializeFun, hashFunc) {
28344
- var buf = require$$0$4.Buffer.alloc(1);
28345
+ var buf = Buffer$2.alloc(1);
28345
28346
  buf.writeInt8(HASH_PREFIX_LEAF);
28346
- var bufferSum = require$$0$4.Buffer.concat([buf, serializeFun(valuetoHash)]);
28347
+ var bufferSum = Buffer$2.concat([buf, serializeFun(valuetoHash)]);
28347
28348
  return hashFunc(bufferSum, this.cryptoSystem);
28348
28349
  };
28349
28350
  MerkleHashCalculator.prototype.isContainerProofValueLeaf = function (value) {
@@ -28360,6 +28361,7 @@
28360
28361
  var merklehashcalculator = { MerkleHashCalculator, CryptoSystem };
28361
28362
 
28362
28363
  var util = require$$0$1;
28364
+ const { Buffer: Buffer$1 } = require$$0$3;
28363
28365
  var PathSet = path.PathSet;
28364
28366
  var PathLeafElement$1 = path.PathLeafElement;
28365
28367
  var EmptyLeaf$1 = binarytree.EmptyLeaf;
@@ -28410,7 +28412,7 @@
28410
28412
  if (leaf == null) {
28411
28413
  return this.handlePrimitiveLeaf(leaf, paths);
28412
28414
  }
28413
- if (require$$0$4.Buffer.isBuffer(leaf)) {
28415
+ if (Buffer$1.isBuffer(leaf)) {
28414
28416
  return this.handlePrimitiveLeaf(leaf, paths);
28415
28417
  }
28416
28418
  if (typeof leaf === 'string') {
@@ -28711,6 +28713,7 @@
28711
28713
  var merkleprooftree = { ProofNode: ProofNode$1, ProofNodeSimple: ProofNodeSimple$1, ProofHashedLeaf: ProofHashedLeaf$2, ProofValueLeaf: ProofValueLeaf$2,
28712
28714
  ProofNodeArrayHead: ProofNodeArrayHead$1, ProofNodeDictHead: ProofNodeDictHead$1, MerkleProofElement, MerkleProofTree: MerkleProofTree$1 };
28713
28715
 
28716
+ const { Buffer } = require$$0$3;
28714
28717
  var Node = binarytree.Node;
28715
28718
  var Leaf = binarytree.Leaf;
28716
28719
  var EmptyLeaf = binarytree.EmptyLeaf;
@@ -28724,7 +28727,7 @@
28724
28727
  var ArrayHeadNode = binarytree.ArrayHeadNode;
28725
28728
  var DictHeadNode = binarytree.DictHeadNode;
28726
28729
  var ProofNodeSimple = merkleprooftree.ProofNodeSimple;
28727
- const EMPTY_HASH = new require$$0$4.Buffer.alloc(32);
28730
+ const EMPTY_HASH = new Buffer.alloc(32);
28728
28731
  /**
28729
28732
  *
28730
28733
  */
@@ -29052,7 +29055,7 @@
29052
29055
  }
29053
29056
  function sign(gtx, privOrSigProv, pubKey) {
29054
29057
  return __awaiter$8(this, void 0, void 0, function* () {
29055
- if (privOrSigProv instanceof require$$0$4.Buffer) {
29058
+ if (privOrSigProv instanceof require$$0$3.Buffer) {
29056
29059
  const digestToSign = getDigestToSign(gtx);
29057
29060
  const signature = signDigest(digestToSign, privOrSigProv);
29058
29061
  return addSignature(pubKey || makeKeyPair(privOrSigProv).pubKey, signature, gtx);
@@ -29241,10 +29244,10 @@
29241
29244
  gtx: gtx$1,
29242
29245
  sign: function (privOrSigProv, pubKey) {
29243
29246
  return __awaiter$7(this, void 0, void 0, function* () {
29244
- debug(`signing transaction with ${privOrSigProv instanceof require$$0$4.Buffer
29247
+ debug(`signing transaction with ${privOrSigProv instanceof require$$0$3.Buffer
29245
29248
  ? "privkey: " + privOrSigProv.toString("hex")
29246
29249
  : "signature provider [pubkey: " + privOrSigProv.pubKey + "]"}`);
29247
- if (privOrSigProv instanceof require$$0$4.Buffer) {
29250
+ if (privOrSigProv instanceof require$$0$3.Buffer) {
29248
29251
  yield sign(this.gtx, privOrSigProv, pubKey);
29249
29252
  }
29250
29253
  else {
@@ -29289,7 +29292,7 @@
29289
29292
  const client = {
29290
29293
  newTransaction: function (signers) {
29291
29294
  signers = removeDuplicateSigners(signers);
29292
- const newGtx = emptyGtx(require$$0$4.Buffer.from(blockchainRID, "hex"));
29295
+ const newGtx = emptyGtx(require$$0$3.Buffer.from(blockchainRID, "hex"));
29293
29296
  signers.forEach((signer) => addSignerToGtx(signer, newGtx));
29294
29297
  const req = transaction(newGtx);
29295
29298
  addFunctions(req);
@@ -29436,7 +29439,7 @@
29436
29439
  return __awaiter$6(this, void 0, void 0, function* () {
29437
29440
  debug("POST URL " + new URL(path, endpoint).href);
29438
29441
  debug("POST body " + JSON.stringify(requestBody));
29439
- if (require$$0$4.Buffer.isBuffer(requestBody)) {
29442
+ if (require$$0$3.Buffer.isBuffer(requestBody)) {
29440
29443
  try {
29441
29444
  const requestOptions = {
29442
29445
  method: "post",
@@ -29446,7 +29449,7 @@
29446
29449
  return {
29447
29450
  error: null,
29448
29451
  statusCode: response.status,
29449
- rspBody: decodeValue(require$$0$4.Buffer.from(yield response.arrayBuffer())),
29452
+ rspBody: decodeValue(require$$0$3.Buffer.from(yield response.arrayBuffer())),
29450
29453
  };
29451
29454
  }
29452
29455
  catch (error) {
@@ -29580,7 +29583,7 @@
29580
29583
  },
29581
29584
  postTransaction: function (serializedTransaction, callback) {
29582
29585
  return __awaiter$4(this, void 0, void 0, function* () {
29583
- if (!require$$0$4.Buffer.isBuffer(serializedTransaction)) {
29586
+ if (!require$$0$3.Buffer.isBuffer(serializedTransaction)) {
29584
29587
  throw new SerializedTransactionFormatException();
29585
29588
  }
29586
29589
  const transactionObject = {
@@ -29757,13 +29760,13 @@
29757
29760
  handlePostResponse: handlePostResponse
29758
29761
  });
29759
29762
 
29760
- var internalNodePrefix = require$$0$4.Buffer.alloc(1, 0);
29761
- var leafPrefix = require$$0$4.Buffer.alloc(1, 1);
29762
- var nonExistingNodeHash = require$$0$4.Buffer.alloc(32);
29763
+ var internalNodePrefix = require$$0$3.Buffer.alloc(1, 0);
29764
+ var leafPrefix = require$$0$3.Buffer.alloc(1, 1);
29765
+ var nonExistingNodeHash = require$$0$3.Buffer.alloc(32);
29763
29766
  function calculateRoot(hashes, depth, leafDepth) {
29764
29767
  var numTransactions = hashes.length;
29765
29768
  if (numTransactions === 0) {
29766
- return require$$0$4.Buffer.alloc(32);
29769
+ return require$$0$3.Buffer.alloc(32);
29767
29770
  }
29768
29771
  if (depth === undefined) {
29769
29772
  depth = 0;
@@ -29848,7 +29851,7 @@
29848
29851
  let currentHash = target;
29849
29852
  for (let i = 0; i < path.length; i++) {
29850
29853
  const item = path[i];
29851
- const prefix = (i === 0) ? require$$0$4.Buffer.from([1]) : require$$0$4.Buffer.from([0]);
29854
+ const prefix = (i === 0) ? require$$0$3.Buffer.from([1]) : require$$0$3.Buffer.from([0]);
29852
29855
  if (item.side === 0) {
29853
29856
  currentHash = hashConcat([prefix, item.hash, prefix, currentHash]);
29854
29857
  }
@@ -47182,8 +47185,8 @@
47182
47185
  return {
47183
47186
  endpointPool: nodeUrlPool,
47184
47187
  blockchainRID: settings.blockchainRID
47185
- ? toBuffer$3(settings.blockchainRID)
47186
- : toBuffer$3(yield getBrid(nodeUrlPool[0], settings.blockchainIID)),
47188
+ ? settings.blockchainRID
47189
+ : yield getBrid(nodeUrlPool[0], settings.blockchainIID),
47187
47190
  pollingInterval: settings.pollingInterval || 500,
47188
47191
  attemptsPerEndpoint: ((_a = settings.failOverConfig) === null || _a === void 0 ? void 0 : _a.attemptsPerEndpoint) || 3,
47189
47192
  attemptInterval: ((_b = settings.failOverConfig) === null || _b === void 0 ? void 0 : _b.attemptInterval) || 500,
@@ -47234,18 +47237,18 @@
47234
47237
  }
47235
47238
  function getSerializedGTX(gtx$1) {
47236
47239
  const gtxBytes = serialize(gtx$1);
47237
- if (!require$$0$4.Buffer.isBuffer(gtxBytes)) {
47240
+ if (!require$$0$3.Buffer.isBuffer(gtxBytes)) {
47238
47241
  throw new SerializedTransactionFormatException();
47239
47242
  }
47240
47243
  return gtxBytes;
47241
47244
  }
47242
47245
  function getGTXFromBufferOrTransactionOrOperation(transaction, blockchainRID) {
47243
- if (require$$0$4.Buffer.isBuffer(transaction)) {
47246
+ if (require$$0$3.Buffer.isBuffer(transaction)) {
47244
47247
  return deserialize(transaction);
47245
47248
  }
47246
47249
  else if ("operations" in transaction) {
47247
47250
  return {
47248
- blockchainRID,
47251
+ blockchainRID: toBuffer$3(blockchainRID),
47249
47252
  operations: convertToRellOperation(transaction.operations),
47250
47253
  signers: transaction.signers,
47251
47254
  signatures: [],
@@ -47253,7 +47256,7 @@
47253
47256
  }
47254
47257
  else if ("name" in transaction) {
47255
47258
  return {
47256
- blockchainRID,
47259
+ blockchainRID: toBuffer$3(blockchainRID),
47257
47260
  operations: convertToRellOperation([transaction]),
47258
47261
  signers: [],
47259
47262
  signatures: [],
@@ -47310,7 +47313,7 @@
47310
47313
  */
47311
47314
  class Web3EventEmitter {
47312
47315
  constructor() {
47313
- this._emitter = new require$$0$5.EventEmitter();
47316
+ this._emitter = new require$$0$4.EventEmitter();
47314
47317
  }
47315
47318
  on(eventName, fn) {
47316
47319
  // eslint-disable-next-line @typescript-eslint/no-misused-promises
@@ -47418,7 +47421,6 @@
47418
47421
  };
47419
47422
  function createClient(settings) {
47420
47423
  return __awaiter(this, void 0, void 0, function* () {
47421
- const blockchainRID = settings.blockchainRID;
47422
47424
  return {
47423
47425
  config: yield getConfig(settings),
47424
47426
  query(nameOrQueryObject, args, callback) {
@@ -47432,7 +47434,7 @@
47432
47434
  _name = nameOrQueryObject === null || nameOrQueryObject === void 0 ? void 0 : nameOrQueryObject.name;
47433
47435
  _args = nameOrQueryObject === null || nameOrQueryObject === void 0 ? void 0 : nameOrQueryObject.args;
47434
47436
  }
47435
- const { error, statusCode, rspBody } = yield requestWithRetry(Method.POST, `query_gtv/${blockchainRID}`, this.config, encodeValue(toQueryObjectGTV(_name, _args)));
47437
+ const { error, statusCode, rspBody } = yield requestWithRetry(Method.POST, `query_gtv/${this.config.blockchainRID}`, this.config, encodeValue(toQueryObjectGTV(_name, _args)));
47436
47438
  return new Promise((resolve, reject) => {
47437
47439
  handlePostResponse(error, statusCode, rspBody, callbackPromiseBuilder(reject, resolve, callback));
47438
47440
  });
@@ -47473,7 +47475,7 @@
47473
47475
  const transactionObject = {
47474
47476
  tx: gtxBytes.toString("hex"),
47475
47477
  };
47476
- const { error: error$1, statusCode, rspBody } = yield requestWithRetry(Method.POST, "tx/" + blockchainRID, this.config, transactionObject);
47478
+ const { error: error$1, statusCode, rspBody } = yield requestWithRetry(Method.POST, "tx/" + this.config.blockchainRID, this.config, transactionObject);
47477
47479
  const transactionRID = getDigestToSign(gtx$1);
47478
47480
  try {
47479
47481
  yield handlePostResponsePromisified(error$1, statusCode, rspBody);
@@ -47583,7 +47585,10 @@
47583
47585
  }
47584
47586
  throw new UnvalidTxRidException(transactionRID);
47585
47587
  }
47586
- const { error, statusCode, rspBody } = yield requestWithRetry(Method.GET, "tx/" + blockchainRID + "/" + transactionRID.toString("hex"), this.config);
47588
+ const { error, statusCode, rspBody } = yield requestWithRetry(Method.GET, "tx/" +
47589
+ this.config.blockchainRID +
47590
+ "/" +
47591
+ transactionRID.toString("hex"), this.config);
47587
47592
  return new Promise((resolve, reject) => {
47588
47593
  handleGetResponse(error, statusCode, statusCode === 200 ? toBuffer$3(rspBody.tx) : rspBody, callbackPromiseBuilder(reject, resolve, callback));
47589
47594
  });
@@ -47599,7 +47604,7 @@
47599
47604
  throw error;
47600
47605
  }
47601
47606
  const { error, statusCode, rspBody } = yield requestWithRetry(Method.GET, "tx/" +
47602
- blockchainRID +
47607
+ this.config.blockchainRID +
47603
47608
  "/" +
47604
47609
  transactionRID.toString("hex") +
47605
47610
  "/status", this.config);