voltaire-effect 0.3.0 → 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. package/dist/{X25519Test-D5Q-5fL9.d.ts → X25519Test-avt1DUgp.d.ts} +231 -6
  2. package/dist/crypto/index.d.ts +2 -2
  3. package/dist/crypto/index.js +72 -2
  4. package/dist/{index-3UKSP3cd.d.ts → index-DxwZo3xo.d.ts} +7781 -5513
  5. package/dist/index.d.ts +990 -3096
  6. package/dist/index.js +2374 -1652
  7. package/dist/native/index.d.ts +6 -6
  8. package/dist/native/index.js +2399 -1677
  9. package/dist/primitives/index.d.ts +7 -6
  10. package/dist/primitives/index.js +2966 -2361
  11. package/dist/services/index.d.ts +1631 -1255
  12. package/dist/services/index.js +4493 -3977
  13. package/package.json +7 -3
  14. package/src/crypto/Signers/SignersService.ts +1 -1
  15. package/src/crypto/Signers/errors.ts +29 -0
  16. package/src/crypto/Signers/index.ts +1 -0
  17. package/src/crypto/Signers/operations.ts +26 -8
  18. package/src/crypto/index.ts +10 -11
  19. package/src/index.ts +1 -2
  20. package/src/jsonrpc/Anvil.ts +13 -8
  21. package/src/jsonrpc/Eth.ts +13 -8
  22. package/src/jsonrpc/Hardhat.ts +13 -8
  23. package/src/jsonrpc/IdCounter.ts +21 -5
  24. package/src/jsonrpc/JsonRpc.test.ts +126 -61
  25. package/src/jsonrpc/Net.ts +13 -8
  26. package/src/jsonrpc/Request.ts +16 -8
  27. package/src/jsonrpc/Txpool.ts +13 -8
  28. package/src/jsonrpc/Wallet.ts +13 -8
  29. package/src/jsonrpc/Web3.ts +13 -8
  30. package/src/jsonrpc/index.ts +1 -1
  31. package/src/primitives/Abi/AbiSchema.ts +3 -4
  32. package/src/primitives/Abi/fromBytecode.test.ts +47 -0
  33. package/src/primitives/Abi/fromBytecode.ts +81 -0
  34. package/src/primitives/Abi/index.ts +3 -0
  35. package/src/primitives/AccessList/from.ts +12 -9
  36. package/src/primitives/Address/Checksummed.ts +21 -27
  37. package/src/primitives/Address/from.ts +12 -15
  38. package/src/primitives/Address/toHex.ts +2 -1
  39. package/src/primitives/Base64/from.ts +21 -4
  40. package/src/primitives/Blob/from.ts +12 -4
  41. package/src/primitives/BlockHash/index.ts +2 -2
  42. package/src/primitives/BlockNumber/index.ts +3 -3
  43. package/src/primitives/Bytecode/from.ts +11 -2
  44. package/src/primitives/ContractSignature/verifySignature.ts +3 -5
  45. package/src/primitives/Ens/from.ts +12 -11
  46. package/src/primitives/Hex/from.ts +12 -4
  47. package/src/primitives/Signature/from.ts +11 -2
  48. package/src/primitives/Transaction/EIP2930/index.ts +12 -12
  49. package/src/primitives/Transaction/EIP4844/index.ts +14 -14
  50. package/src/primitives/Transaction/EIP7702/index.ts +13 -13
  51. package/src/primitives/Transaction/Legacy/index.ts +13 -13
  52. package/src/primitives/TransactionHash/index.ts +3 -2
  53. package/src/primitives/TransactionIndex/index.ts +2 -2
  54. package/src/primitives/Trie/Trie.test.ts +70 -0
  55. package/src/primitives/Trie/TrieSchema.ts +26 -0
  56. package/src/primitives/Trie/clear.ts +16 -0
  57. package/src/primitives/Trie/del.ts +18 -0
  58. package/src/primitives/Trie/get.ts +18 -0
  59. package/src/primitives/Trie/index.ts +30 -0
  60. package/src/primitives/Trie/init.ts +13 -0
  61. package/src/primitives/Trie/prove.ts +19 -0
  62. package/src/primitives/Trie/put.ts +20 -0
  63. package/src/primitives/Trie/rootHash.ts +14 -0
  64. package/src/primitives/Trie/verify.ts +18 -0
  65. package/src/primitives/Uint/from.ts +11 -2
  66. package/src/primitives/Uint16/index.ts +5 -4
  67. package/src/primitives/Uint64/index.ts +5 -4
  68. package/src/primitives/Uint8/index.ts +5 -4
  69. package/src/primitives/index.ts +3 -2
  70. package/src/services/BlockExplorerApi/BlockExplorerApi.test.ts +789 -0
  71. package/src/services/BlockExplorerApi/BlockExplorerApi.ts +797 -0
  72. package/src/services/BlockExplorerApi/BlockExplorerApiErrors.ts +176 -0
  73. package/src/services/BlockExplorerApi/BlockExplorerApiService.ts +60 -0
  74. package/src/services/BlockExplorerApi/BlockExplorerApiTypes.ts +225 -0
  75. package/src/services/BlockExplorerApi/index.ts +42 -0
  76. package/src/services/Contract/Contract.test.ts +2 -6
  77. package/src/services/Contract/ContractTypes.ts +26 -8
  78. package/src/services/Contract/estimateGas.test.ts +4 -7
  79. package/src/services/Provider/actions/multicall.ts +28 -9
  80. package/src/services/Provider/actions/readContract.test.ts +8 -11
  81. package/src/services/Provider/actions/readContract.ts +28 -9
  82. package/src/services/Provider/functions/getBlock.ts +2 -1
  83. package/src/services/Provider/functions/getBlockReceipts.ts +2 -1
  84. package/src/services/Provider/functions/getBlockTransactionCount.ts +2 -1
  85. package/src/services/Provider/functions/getUncle.ts +2 -1
  86. package/src/services/Provider/functions/getUncleCount.ts +2 -1
  87. package/src/services/Signer/actions/deployContract.ts +1 -1
  88. package/src/services/index.ts +25 -0
@@ -4,7 +4,7 @@ import * as Effect from 'effect/Effect';
4
4
  import { K as KeccakService, P as ProviderService } from './ProviderService-BZ5pqDrD.js';
5
5
  import { HashType } from '@tevm/voltaire/Hash';
6
6
  import { Secp256k1SignatureType, Secp256k1PublicKeyType } from '@tevm/voltaire/Secp256k1';
7
- import { c as InvalidSignatureError, b as InvalidRecoveryIdError, d as Secp256k1Error, S as Secp256k1Service, g as SignOptions, I as InvalidPrivateKeyError, a as InvalidPublicKeyError } from './Secp256k1Service-OxQ6hJFp.js';
7
+ import { c as InvalidSignatureError, b as InvalidRecoveryIdError, d as Secp256k1Error, S as Secp256k1Service, g as SignOptions, I as InvalidPrivateKeyError$1, a as InvalidPublicKeyError } from './Secp256k1Service-OxQ6hJFp.js';
8
8
  import * as Layer from 'effect/Layer';
9
9
  import { AddressType } from '@tevm/voltaire/Address';
10
10
  import { TypedData, Signature, Domain, Message, TypeDefinitions } from '@tevm/voltaire/EIP712';
@@ -18,7 +18,7 @@ import { InvalidSecretKeyError, Ed25519Error, InvalidSignatureError as InvalidSi
18
18
  import { HexType } from '@tevm/voltaire/Hex';
19
19
  import { HMACType } from '@tevm/voltaire/HMAC';
20
20
  import { Keystore, EncryptionError as EncryptionError$2, InvalidScryptNError, InvalidPbkdf2IterationsError, DecryptionError, InvalidMacError, UnsupportedVersionError, UnsupportedKdfError } from '@tevm/voltaire/Keystore';
21
- import { P256SignatureType, InvalidPrivateKeyError as InvalidPrivateKeyError$1, P256Error, InvalidPublicKeyError as InvalidPublicKeyError$1 } from '@tevm/voltaire/P256';
21
+ import { P256SignatureType, InvalidPrivateKeyError as InvalidPrivateKeyError$2, P256Error, InvalidPublicKeyError as InvalidPublicKeyError$1 } from '@tevm/voltaire/P256';
22
22
  import { InvalidSecretKeyError as InvalidSecretKeyError$1, InvalidPublicKeyError as InvalidPublicKeyError$3, X25519Error } from '@tevm/voltaire/X25519';
23
23
 
24
24
  /**
@@ -378,7 +378,7 @@ declare const Secp256k1Test: Layer.Layer<Secp256k1Service, never, never>;
378
378
  * @see {@link Secp256k1Service} - Service interface for dependency injection
379
379
  * @since 0.0.1
380
380
  */
381
- declare const sign$3: (messageHash: HashType, privateKey: Uint8Array, options?: SignOptions) => Effect.Effect<Secp256k1SignatureType, InvalidPrivateKeyError | Secp256k1Error>;
381
+ declare const sign$3: (messageHash: HashType, privateKey: Uint8Array, options?: SignOptions) => Effect.Effect<Secp256k1SignatureType, InvalidPrivateKeyError$1 | Secp256k1Error>;
382
382
 
383
383
  /**
384
384
  * @fileoverview Secp256k1 signature verification function for Effect-based applications.
@@ -2941,7 +2941,7 @@ interface P256ServiceShape {
2941
2941
  * @throws InvalidPrivateKeyError - When the private key is invalid
2942
2942
  * @throws P256Error - When signing fails
2943
2943
  */
2944
- readonly sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$1 | P256Error>;
2944
+ readonly sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$2 | P256Error>;
2945
2945
  /**
2946
2946
  * Verifies a P-256 ECDSA signature against a message hash and public key.
2947
2947
  *
@@ -4794,7 +4794,7 @@ declare const P256Live: Layer.Layer<P256Service, never, never>;
4794
4794
  * @see {@link P256Service} - Full service interface
4795
4795
  * @since 0.0.1
4796
4796
  */
4797
- declare const sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$1 | P256Error>;
4797
+ declare const sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$2 | P256Error>;
4798
4798
 
4799
4799
  /**
4800
4800
  * @fileoverview P-256 signature verification function for Effect-based applications.
@@ -4989,6 +4989,231 @@ declare const hash$1: (data: Uint8Array) => Effect.Effect<Ripemd160Hash, never,
4989
4989
  */
4990
4990
  declare const hash: (data: Uint8Array) => Effect.Effect<SHA256Hash, never, SHA256Service>;
4991
4991
 
4992
+ /**
4993
+ * @fileoverview Error types for Signers module using Effect TaggedError.
4994
+ * @module Signers/errors
4995
+ * @since 0.0.1
4996
+ */
4997
+ declare const CryptoError_base: new <A extends Record<string, any> = {}>(args: effect_Types.Equals<A, {}> extends true ? void : { readonly [P in keyof A as P extends "_tag" ? never : P]: A[P]; }) => effect_Cause.YieldableError & {
4998
+ readonly _tag: "CryptoError";
4999
+ } & Readonly<A>;
5000
+ /**
5001
+ * General cryptographic error during signing operations.
5002
+ *
5003
+ * @since 0.0.1
5004
+ */
5005
+ declare class CryptoError extends CryptoError_base<{
5006
+ readonly message: string;
5007
+ readonly cause?: unknown;
5008
+ }> {
5009
+ }
5010
+ declare const InvalidPrivateKeyError_base: new <A extends Record<string, any> = {}>(args: effect_Types.Equals<A, {}> extends true ? void : { readonly [P in keyof A as P extends "_tag" ? never : P]: A[P]; }) => effect_Cause.YieldableError & {
5011
+ readonly _tag: "InvalidPrivateKeyError";
5012
+ } & Readonly<A>;
5013
+ /**
5014
+ * Invalid private key format or value.
5015
+ *
5016
+ * @since 0.0.1
5017
+ */
5018
+ declare class InvalidPrivateKeyError extends InvalidPrivateKeyError_base<{
5019
+ readonly message: string;
5020
+ readonly cause?: unknown;
5021
+ }> {
5022
+ }
5023
+
5024
+ /**
5025
+ * @fileoverview SignersService Effect service definition for cryptographic signing.
5026
+ * @module
5027
+ * @since 0.0.1
5028
+ */
5029
+
5030
+ /**
5031
+ * Represents an Ethereum signer capable of signing messages, transactions, and typed data.
5032
+ *
5033
+ * @since 0.0.1
5034
+ */
5035
+ interface Signer {
5036
+ /** The Ethereum address derived from the signer's public key */
5037
+ readonly address: string;
5038
+ /** The 64-byte uncompressed public key (without 04 prefix) */
5039
+ readonly publicKey: Uint8Array;
5040
+ /** Signs a message using EIP-191 personal sign format */
5041
+ readonly signMessage: (message: string | Uint8Array) => Effect.Effect<string, CryptoError>;
5042
+ /** Signs a transaction and returns the signed transaction */
5043
+ readonly signTransaction: (transaction: unknown) => Effect.Effect<unknown, CryptoError>;
5044
+ /** Signs EIP-712 typed data */
5045
+ readonly signTypedData: (typedData: unknown) => Effect.Effect<string, CryptoError>;
5046
+ }
5047
+ /**
5048
+ * Shape of the SignersService interface.
5049
+ *
5050
+ * @since 0.0.1
5051
+ */
5052
+ interface SignersServiceShape {
5053
+ /** Creates a signer from a private key */
5054
+ readonly fromPrivateKey: (privateKey: string | Uint8Array) => Effect.Effect<Signer, InvalidPrivateKeyError>;
5055
+ /** Gets the Ethereum address from a signer */
5056
+ readonly getAddress: (signer: Signer) => Effect.Effect<string, never>;
5057
+ /** Recovers the sender address from a signed transaction */
5058
+ readonly recoverTransactionAddress: (transaction: unknown) => Effect.Effect<string, CryptoError>;
5059
+ }
5060
+ declare const SignersService_base: Context.TagClass<SignersService, "SignersService", SignersServiceShape>;
5061
+ /**
5062
+ * Effect service tag for cryptographic signing operations.
5063
+ *
5064
+ * @example
5065
+ * ```typescript
5066
+ * const program = Effect.gen(function* () {
5067
+ * const signers = yield* SignersService
5068
+ * const signer = yield* signers.fromPrivateKey(privateKey)
5069
+ * const address = yield* signers.getAddress(signer)
5070
+ * return address
5071
+ * })
5072
+ * ```
5073
+ *
5074
+ * @since 0.0.1
5075
+ */
5076
+ declare class SignersService extends SignersService_base {
5077
+ }
5078
+
5079
+ /**
5080
+ * @fileoverview Signer operations for Effect.
5081
+ * @module Signers/operations
5082
+ * @since 0.0.1
5083
+ */
5084
+
5085
+ /**
5086
+ * Creates a signer from a private key.
5087
+ *
5088
+ * @description
5089
+ * Constructs a Signer object that can sign messages, transactions, and typed data.
5090
+ * The signer derives the Ethereum address and public key from the private key.
5091
+ *
5092
+ * @param privateKey - The 32-byte private key as hex string or Uint8Array
5093
+ * @returns Effect containing a Signer object
5094
+ *
5095
+ * @example
5096
+ * ```typescript
5097
+ * import { fromPrivateKey, SignersLive } from 'voltaire-effect/crypto/Signers'
5098
+ * import * as Effect from 'effect/Effect'
5099
+ *
5100
+ * const program = Effect.gen(function* () {
5101
+ * const signer = yield* fromPrivateKey('0x...')
5102
+ * const sig = yield* signer.signMessage('Hello')
5103
+ * return sig
5104
+ * }).pipe(Effect.provide(SignersLive))
5105
+ * ```
5106
+ *
5107
+ * @throws InvalidPrivateKeyError if the private key is invalid
5108
+ * @see {@link getAddress} to get the signer's address
5109
+ * @since 0.0.1
5110
+ */
5111
+ declare const fromPrivateKey: (privateKey: string | Uint8Array) => Effect.Effect<Signer, InvalidPrivateKeyError>;
5112
+ /**
5113
+ * Gets the Ethereum address from a signer.
5114
+ *
5115
+ * @description
5116
+ * Returns the 20-byte Ethereum address derived from the signer's public key.
5117
+ * The address is checksummed per EIP-55.
5118
+ *
5119
+ * @param signer - The signer object
5120
+ * @returns Effect containing the Ethereum address as 0x-prefixed hex string
5121
+ *
5122
+ * @example
5123
+ * ```typescript
5124
+ * import { fromPrivateKey, getAddress, SignersLive } from 'voltaire-effect/crypto/Signers'
5125
+ * import * as Effect from 'effect/Effect'
5126
+ *
5127
+ * const program = Effect.gen(function* () {
5128
+ * const signer = yield* fromPrivateKey('0x...')
5129
+ * return yield* getAddress(signer)
5130
+ * }).pipe(Effect.provide(SignersLive))
5131
+ * ```
5132
+ *
5133
+ * @throws Never fails
5134
+ * @since 0.0.1
5135
+ */
5136
+ declare const getAddress: (signer: Signer) => Effect.Effect<string, never>;
5137
+ /**
5138
+ * Recovers the sender address from a signed transaction.
5139
+ *
5140
+ * @description
5141
+ * Uses ecrecover to extract the Ethereum address that signed a transaction.
5142
+ * This is how nodes verify transaction authenticity.
5143
+ *
5144
+ * @param transaction - The signed transaction object
5145
+ * @returns Effect containing the recovered Ethereum address
5146
+ *
5147
+ * @example
5148
+ * ```typescript
5149
+ * import { recoverTransactionAddress, SignersLive } from 'voltaire-effect/crypto/Signers'
5150
+ * import * as Effect from 'effect/Effect'
5151
+ *
5152
+ * const program = recoverTransactionAddress(signedTx).pipe(Effect.provide(SignersLive))
5153
+ * ```
5154
+ *
5155
+ * @throws CryptoError if signature recovery fails
5156
+ * @since 0.0.1
5157
+ */
5158
+ declare const recoverTransactionAddress: (transaction: unknown) => Effect.Effect<string, CryptoError>;
5159
+
5160
+ /**
5161
+ * @fileoverview Production implementation of SignersService.
5162
+ * @module Signers/SignersLive
5163
+ * @since 0.0.1
5164
+ */
5165
+
5166
+ /**
5167
+ * Production layer for SignersService using native implementation.
5168
+ *
5169
+ * @description
5170
+ * Provides real signing operations using secp256k1 for signatures.
5171
+ * Supports EIP-191 personal sign, transaction signing, and EIP-712 typed data.
5172
+ *
5173
+ * @example
5174
+ * ```typescript
5175
+ * import { SignersService, SignersLive } from 'voltaire-effect/crypto/Signers'
5176
+ * import * as Effect from 'effect/Effect'
5177
+ *
5178
+ * const program = Effect.gen(function* () {
5179
+ * const signers = yield* SignersService
5180
+ * const signer = yield* signers.fromPrivateKey(privateKey)
5181
+ * return yield* signers.getAddress(signer)
5182
+ * }).pipe(Effect.provide(SignersLive))
5183
+ * ```
5184
+ *
5185
+ * @since 0.0.1
5186
+ * @see {@link SignersTest} for unit testing
5187
+ */
5188
+ declare const SignersLive: Layer.Layer<SignersService, never, never>;
5189
+
5190
+ /**
5191
+ * @fileoverview Test implementation of SignersService.
5192
+ * @module Signers/SignersTest
5193
+ * @since 0.0.1
5194
+ */
5195
+
5196
+ /**
5197
+ * Test layer for SignersService returning deterministic mock values.
5198
+ *
5199
+ * @description
5200
+ * Provides mock implementations for unit testing. Returns a signer with
5201
+ * the zero address and mock signatures.
5202
+ * Use when testing application logic without cryptographic overhead.
5203
+ *
5204
+ * @example
5205
+ * ```typescript
5206
+ * import { SignersService, SignersTest, fromPrivateKey } from 'voltaire-effect/crypto/Signers'
5207
+ * import * as Effect from 'effect/Effect'
5208
+ *
5209
+ * const testProgram = fromPrivateKey('0x...').pipe(Effect.provide(SignersTest))
5210
+ * // Returns mock signer with zero address
5211
+ * ```
5212
+ *
5213
+ * @since 0.0.1
5214
+ */
5215
+ declare const SignersTest: Layer.Layer<SignersService, never, never>;
5216
+
4992
5217
  /**
4993
5218
  * @fileoverview X25519 ECDH shared secret computation for Effect.
4994
5219
  * @module X25519/computeSecret
@@ -5210,4 +5435,4 @@ declare const X25519Live: Layer.Layer<X25519Service, never, never>;
5210
5435
  */
5211
5436
  declare const X25519Test: Layer.Layer<X25519Service, never, never>;
5212
5437
 
5213
- export { g2Mul as $, AddressDerivationError as A, Bip39Service as B, ChaCha20Poly1305Service as C, Blake2Live as D, EIP712Service as E, Blake2Test as F, hash$2 as G, HMACService as H, aggregate as I, Bls12381Live as J, KeystoreService as K, type Bls12381ServiceShape as L, sign$2 as M, verify$2 as N, Bn254Error as O, P256Service as P, Bn254Live as Q, Ripemd160Service as R, SHA256Service as S, type Bn254ServiceShape as T, Bn254Test as U, VerifyError as V, g1Add as W, g1Generator as X, g1Mul as Y, g2Add as Z, g2Generator as _, Blake2Service as a, type ModExpServiceShape as a$, pairingCheck as a0, ChaCha20Poly1305Live as a1, type ChaCha20Poly1305ServiceShape as a2, ChaCha20Poly1305Test as a3, decrypt$1 as a4, encrypt$1 as a5, generateKey as a6, generateNonce as a7, Ed25519Live as a8, type Ed25519ServiceShape as a9, type HDWalletServiceShape as aA, HDWalletTest as aB, InvalidKeyError as aC, InvalidPathError as aD, InvalidSeedError as aE, mnemonicToSeed as aF, withPrivateKey as aG, withSeed as aH, HMACLive as aI, type HMACServiceShape as aJ, HMACTest as aK, hmacSha256 as aL, hmacSha512 as aM, hash$3 as aN, type DecryptError as aO, decrypt as aP, encrypt as aQ, KeystoreLive as aR, type KeystoreServiceShape as aS, KeystoreTest as aT, withDecryptedKey as aU, blobToKzgCommitment as aV, computeBlobKzgProof as aW, verifyBlobKzgProof as aX, calculateGas as aY, ModExpLive as aZ, ModExpService as a_, Ed25519Test as aa, getPublicKey$2 as ab, sign$1 as ac, verify$1 as ad, EIP712Live as ae, type EIP712ServiceShape as af, EIP712Test as ag, hashDomain as ah, hashStruct as ai, hashTypedData as aj, recoverAddress$1 as ak, signTypedData as al, verifyTypedData as am, unwrapSignature as an, verifySignature as ao, wrapSignature as ap, derive as aq, fromMnemonic as ar, fromSeed as as, generateMnemonic as at, getPrivateKey as au, getPublicKey$1 as av, HardenedDerivationError as aw, type HDNode as ax, type HDPath as ay, type HDWalletError as az, Bls12381Service as b, ModExpTest as b0, modexp as b1, modexpBytes as b2, P256Live as b3, type P256ServiceShape as b4, sign as b5, verify as b6, hash$1 as b7, Ripemd160Live as b8, Ripemd160Test as b9, hash as ba, SHA256Live as bb, SHA256Test as bc, recoverAddress as bd, type SignatureError as be, computeSecret as bf, generateKeyPair as bg, getPublicKey as bh, X25519Live as bi, X25519Service as bj, type X25519ServiceShape as bk, X25519Test as bl, recover as bm, Secp256k1Live as bn, Secp256k1Test as bo, sign$3 as bp, verify$3 as bq, type MnemonicStrength as br, WORD_COUNTS as bs, type ChaCha20Poly1305Error as bt, InvalidKeyError$1 as bu, InvalidNonceError as bv, mapToHDWalletError as bw, Bn254Service as c, Ed25519Service as d, HDWalletService as e, CryptoLive as f, CryptoTest as g, type SignatureInput as h, index as i, RecoverError as j, AesGcmLive as k, AesGcmService as l, type AesGcmServiceShape as m, AesGcmTest as n, decrypt$2 as o, encrypt$2 as p, generateKey$1 as q, generateNonce$1 as r, Bip39Live as s, type Bip39ServiceShape as t, Bip39Test as u, generateMnemonic$1 as v, getWordCount as w, mnemonicToSeed$1 as x, mnemonicToSeedSync as y, validateMnemonic as z };
5438
+ export { g2Mul as $, AddressDerivationError as A, Bip39Service as B, ChaCha20Poly1305Service as C, Blake2Live as D, EIP712Service as E, Blake2Test as F, hash$2 as G, HMACService as H, aggregate as I, Bls12381Live as J, KeystoreService as K, type Bls12381ServiceShape as L, sign$2 as M, verify$2 as N, Bn254Error as O, P256Service as P, Bn254Live as Q, Ripemd160Service as R, SHA256Service as S, type Bn254ServiceShape as T, Bn254Test as U, VerifyError as V, g1Add as W, g1Generator as X, g1Mul as Y, g2Add as Z, g2Generator as _, Blake2Service as a, type ModExpServiceShape as a$, pairingCheck as a0, ChaCha20Poly1305Live as a1, type ChaCha20Poly1305ServiceShape as a2, ChaCha20Poly1305Test as a3, decrypt$1 as a4, encrypt$1 as a5, generateKey as a6, generateNonce as a7, Ed25519Live as a8, type Ed25519ServiceShape as a9, type HDWalletServiceShape as aA, HDWalletTest as aB, InvalidKeyError as aC, InvalidPathError as aD, InvalidSeedError as aE, mnemonicToSeed as aF, withPrivateKey as aG, withSeed as aH, HMACLive as aI, type HMACServiceShape as aJ, HMACTest as aK, hmacSha256 as aL, hmacSha512 as aM, hash$3 as aN, type DecryptError as aO, decrypt as aP, encrypt as aQ, KeystoreLive as aR, type KeystoreServiceShape as aS, KeystoreTest as aT, withDecryptedKey as aU, blobToKzgCommitment as aV, computeBlobKzgProof as aW, verifyBlobKzgProof as aX, calculateGas as aY, ModExpLive as aZ, ModExpService as a_, Ed25519Test as aa, getPublicKey$2 as ab, sign$1 as ac, verify$1 as ad, EIP712Live as ae, type EIP712ServiceShape as af, EIP712Test as ag, hashDomain as ah, hashStruct as ai, hashTypedData as aj, recoverAddress$1 as ak, signTypedData as al, verifyTypedData as am, unwrapSignature as an, verifySignature as ao, wrapSignature as ap, derive as aq, fromMnemonic as ar, fromSeed as as, generateMnemonic as at, getPrivateKey as au, getPublicKey$1 as av, HardenedDerivationError as aw, type HDNode as ax, type HDPath as ay, type HDWalletError as az, Bls12381Service as b, ModExpTest as b0, modexp as b1, modexpBytes as b2, P256Live as b3, type P256ServiceShape as b4, sign as b5, verify as b6, hash$1 as b7, Ripemd160Live as b8, Ripemd160Test as b9, WORD_COUNTS as bA, type ChaCha20Poly1305Error as bB, InvalidKeyError$1 as bC, InvalidNonceError as bD, mapToHDWalletError as bE, CryptoError as bF, InvalidPrivateKeyError as bG, hash as ba, SHA256Live as bb, SHA256Test as bc, recoverAddress as bd, type SignatureError as be, fromPrivateKey as bf, getAddress as bg, recoverTransactionAddress as bh, type Signer as bi, SignersLive as bj, SignersService as bk, type SignersServiceShape as bl, SignersTest as bm, computeSecret as bn, generateKeyPair as bo, getPublicKey as bp, X25519Live as bq, X25519Service as br, type X25519ServiceShape as bs, X25519Test as bt, recover as bu, Secp256k1Live as bv, Secp256k1Test as bw, sign$3 as bx, verify$3 as by, type MnemonicStrength as bz, Bn254Service as c, Ed25519Service as d, HDWalletService as e, CryptoLive as f, CryptoTest as g, type SignatureInput as h, index as i, RecoverError as j, AesGcmLive as k, AesGcmService as l, type AesGcmServiceShape as m, AesGcmTest as n, decrypt$2 as o, encrypt$2 as p, generateKey$1 as q, generateNonce$1 as r, Bip39Live as s, type Bip39ServiceShape as t, Bip39Test as u, generateMnemonic$1 as v, getWordCount as w, mnemonicToSeed$1 as x, mnemonicToSeedSync as y, validateMnemonic as z };
@@ -1,5 +1,5 @@
1
- import { h as SignatureInput, j as RecoverError, A as AddressDerivationError, V as VerifyError, E as EIP712Service } from '../X25519Test-D5Q-5fL9.js';
2
- export { k as AesGcmLive, l as AesGcmService, m as AesGcmServiceShape, n as AesGcmTest, s as Bip39Live, B as Bip39Service, t as Bip39ServiceShape, u as Bip39Test, D as Blake2Live, a as Blake2Service, F as Blake2Test, J as Bls12381Live, b as Bls12381Service, L as Bls12381ServiceShape, O as Bn254Error, Q as Bn254Live, c as Bn254Service, T as Bn254ServiceShape, U as Bn254Test, a1 as ChaCha20Poly1305Live, C as ChaCha20Poly1305Service, a2 as ChaCha20Poly1305ServiceShape, a3 as ChaCha20Poly1305Test, f as CryptoLive, g as CryptoTest, ae as EIP712Live, af as EIP712ServiceShape, ag as EIP712Test, a8 as Ed25519Live, d as Ed25519Service, a9 as Ed25519ServiceShape, aa as Ed25519Test, ax as HDNode, ay as HDPath, az as HDWalletError, e as HDWalletService, aA as HDWalletServiceShape, aB as HDWalletTest, aI as HMACLive, H as HMACService, aJ as HMACServiceShape, aK as HMACTest, aw as HardenedDerivationError, aC as InvalidKeyError, aD as InvalidPathError, aE as InvalidSeedError, aO as KeystoreDecryptError, aR as KeystoreLive, K as KeystoreService, aS as KeystoreServiceShape, aT as KeystoreTest, aZ as ModExpLive, a_ as ModExpService, a$ as ModExpServiceShape, b0 as ModExpTest, b3 as P256Live, P as P256Service, b4 as P256ServiceShape, b8 as Ripemd160Live, R as Ripemd160Service, b9 as Ripemd160Test, bb as SHA256Live, S as SHA256Service, bc as SHA256Test, bn as Secp256k1Live, bo as Secp256k1Test, be as SignatureError, bi as X25519Live, bj as X25519Service, bk as X25519ServiceShape, bl as X25519Test, o as aesGcmDecrypt, p as aesGcmEncrypt, q as aesGcmGenerateKey, r as aesGcmGenerateNonce, v as bip39GenerateMnemonic, x as bip39MnemonicToSeed, G as blake2Hash, aV as blobToKzgCommitment, I as bls12381Aggregate, M as bls12381Sign, N as bls12381Verify, a4 as chaCha20Poly1305Decrypt, a5 as chaCha20Poly1305Encrypt, a6 as chaCha20Poly1305GenerateKey, a7 as chaCha20Poly1305GenerateNonce, aW as computeBlobKzgProof, ab as ed25519GetPublicKey, ac as ed25519Sign, ad as ed25519Verify, ak as eip712RecoverAddress, an as erc6492UnwrapSignature, ao as erc6492VerifySignature, ap as erc6492WrapSignature, ar as fromMnemonic, as as fromSeed, W as g1Add, X as g1Generator, Y as g1Mul, Z as g2Add, _ as g2Generator, $ as g2Mul, at as generateMnemonic, w as getWordCount, ah as hashDomain, ai as hashStruct, aj as hashTypedData, aq as hdwalletDerive, au as hdwalletGetPrivateKey, av as hdwalletGetPublicKey, aG as hdwalletWithPrivateKey, aH as hdwalletWithSeed, aL as hmacSha256, aM as hmacSha512, aN as keccakHash, aP as keystoreDecrypt, aQ as keystoreEncrypt, aU as keystoreWithDecryptedKey, aF as mnemonicToSeed, y as mnemonicToSeedSync, b1 as modexp, b2 as modexpBytes, aY as modexpCalculateGas, b5 as p256Sign, b6 as p256Verify, a0 as pairingCheck, bm as recover, bd as recoverAddress, b7 as ripemd160Hash, ba as sha256Hash, bp as sign, al as signTypedData, aj as signatureHashTypedData, z as validateMnemonic, bq as verify, aX as verifyBlobKzgProof, am as verifyTypedData, bf as x25519ComputeSecret, bg as x25519GenerateKeyPair, bh as x25519GetPublicKey } from '../X25519Test-D5Q-5fL9.js';
1
+ import { h as SignatureInput, j as RecoverError, A as AddressDerivationError, V as VerifyError, E as EIP712Service } from '../X25519Test-avt1DUgp.js';
2
+ export { k as AesGcmLive, l as AesGcmService, m as AesGcmServiceShape, n as AesGcmTest, s as Bip39Live, B as Bip39Service, t as Bip39ServiceShape, u as Bip39Test, D as Blake2Live, a as Blake2Service, F as Blake2Test, J as Bls12381Live, b as Bls12381Service, L as Bls12381ServiceShape, O as Bn254Error, Q as Bn254Live, c as Bn254Service, T as Bn254ServiceShape, U as Bn254Test, a1 as ChaCha20Poly1305Live, C as ChaCha20Poly1305Service, a2 as ChaCha20Poly1305ServiceShape, a3 as ChaCha20Poly1305Test, f as CryptoLive, g as CryptoTest, ae as EIP712Live, af as EIP712ServiceShape, ag as EIP712Test, a8 as Ed25519Live, d as Ed25519Service, a9 as Ed25519ServiceShape, aa as Ed25519Test, ax as HDNode, ay as HDPath, az as HDWalletError, e as HDWalletService, aA as HDWalletServiceShape, aB as HDWalletTest, aI as HMACLive, H as HMACService, aJ as HMACServiceShape, aK as HMACTest, aw as HardenedDerivationError, aC as InvalidKeyError, aD as InvalidPathError, aE as InvalidSeedError, aO as KeystoreDecryptError, aR as KeystoreLive, K as KeystoreService, aS as KeystoreServiceShape, aT as KeystoreTest, aZ as ModExpLive, a_ as ModExpService, a$ as ModExpServiceShape, b0 as ModExpTest, b3 as P256Live, P as P256Service, b4 as P256ServiceShape, b8 as Ripemd160Live, R as Ripemd160Service, b9 as Ripemd160Test, bb as SHA256Live, S as SHA256Service, bc as SHA256Test, bv as Secp256k1Live, bw as Secp256k1Test, be as SignatureError, bi as Signer, bj as SignersLive, bk as SignersService, bl as SignersServiceShape, bm as SignersTest, bq as X25519Live, br as X25519Service, bs as X25519ServiceShape, bt as X25519Test, o as aesGcmDecrypt, p as aesGcmEncrypt, q as aesGcmGenerateKey, r as aesGcmGenerateNonce, v as bip39GenerateMnemonic, x as bip39MnemonicToSeed, G as blake2Hash, aV as blobToKzgCommitment, I as bls12381Aggregate, M as bls12381Sign, N as bls12381Verify, a4 as chaCha20Poly1305Decrypt, a5 as chaCha20Poly1305Encrypt, a6 as chaCha20Poly1305GenerateKey, a7 as chaCha20Poly1305GenerateNonce, aW as computeBlobKzgProof, ab as ed25519GetPublicKey, ac as ed25519Sign, ad as ed25519Verify, ak as eip712RecoverAddress, an as erc6492UnwrapSignature, ao as erc6492VerifySignature, ap as erc6492WrapSignature, ar as fromMnemonic, bf as fromPrivateKey, as as fromSeed, W as g1Add, X as g1Generator, Y as g1Mul, Z as g2Add, _ as g2Generator, $ as g2Mul, at as generateMnemonic, w as getWordCount, ah as hashDomain, ai as hashStruct, aj as hashTypedData, aq as hdwalletDerive, au as hdwalletGetPrivateKey, av as hdwalletGetPublicKey, aG as hdwalletWithPrivateKey, aH as hdwalletWithSeed, aL as hmacSha256, aM as hmacSha512, aN as keccakHash, aP as keystoreDecrypt, aQ as keystoreEncrypt, aU as keystoreWithDecryptedKey, aF as mnemonicToSeed, y as mnemonicToSeedSync, b1 as modexp, b2 as modexpBytes, aY as modexpCalculateGas, b5 as p256Sign, b6 as p256Verify, a0 as pairingCheck, bu as recover, bd as recoverAddress, bh as recoverTransactionAddress, b7 as ripemd160Hash, ba as sha256Hash, bx as sign, al as signTypedData, aj as signatureHashTypedData, bg as signersGetAddress, z as validateMnemonic, by as verify, aX as verifyBlobKzgProof, am as verifyTypedData, bn as x25519ComputeSecret, bo as x25519GenerateKeyPair, bp as x25519GetPublicKey } from '../X25519Test-avt1DUgp.js';
3
3
  import { K as KeccakService } from '../ProviderService-BZ5pqDrD.js';
4
4
  export { b as KeccakLive, c as KeccakTest } from '../ProviderService-BZ5pqDrD.js';
5
5
  import { Keccak256Hash } from '@tevm/voltaire';
@@ -1,6 +1,6 @@
1
1
  import * as Context from 'effect/Context';
2
2
  import * as Data5 from 'effect/Data';
3
- import { Bip39, Blake2, BN254, ChaCha20Poly1305, EIP712, HMAC, Keccak256, KZG, Ripemd160, SHA256, ModExp, AesGcm, Hash } from '@tevm/voltaire';
3
+ import { Bip39, Blake2, BN254, ChaCha20Poly1305, EIP712, HMAC, Keccak256, KZG, Ripemd160, SHA256, ModExp, AesGcm, Signers, Hash } from '@tevm/voltaire';
4
4
  import * as Effect48 from 'effect/Effect';
5
5
  import * as Layer from 'effect/Layer';
6
6
  import * as Bls12381 from '@tevm/voltaire/Bls12381';
@@ -1250,6 +1250,76 @@ var verifyTypedData2 = (params) => Effect48.gen(function* () {
1250
1250
  );
1251
1251
  return constantTimeEqual(recoveredAddress, params.address);
1252
1252
  });
1253
+ var CryptoError = class extends Data5.TaggedError("CryptoError") {
1254
+ };
1255
+ var InvalidPrivateKeyError2 = class extends Data5.TaggedError(
1256
+ "InvalidPrivateKeyError"
1257
+ ) {
1258
+ };
1259
+ var fromPrivateKey = (privateKey) => Effect48.try({
1260
+ try: () => {
1261
+ const impl = Signers.PrivateKeySignerImpl.fromPrivateKey({ privateKey });
1262
+ return {
1263
+ address: impl.address,
1264
+ publicKey: impl.publicKey,
1265
+ signMessage: (message) => Effect48.tryPromise({
1266
+ try: () => impl.signMessage(message),
1267
+ catch: (e) => new CryptoError({
1268
+ message: e instanceof Error ? e.message : String(e),
1269
+ cause: e
1270
+ })
1271
+ }),
1272
+ signTransaction: (transaction) => Effect48.tryPromise({
1273
+ try: () => impl.signTransaction(transaction),
1274
+ catch: (e) => new CryptoError({
1275
+ message: e instanceof Error ? e.message : String(e),
1276
+ cause: e
1277
+ })
1278
+ }),
1279
+ signTypedData: (typedData) => Effect48.tryPromise({
1280
+ try: () => impl.signTypedData(typedData),
1281
+ catch: (e) => new CryptoError({
1282
+ message: e instanceof Error ? e.message : String(e),
1283
+ cause: e
1284
+ })
1285
+ })
1286
+ };
1287
+ },
1288
+ catch: (e) => new InvalidPrivateKeyError2({
1289
+ message: e instanceof Error ? e.message : String(e),
1290
+ cause: e
1291
+ })
1292
+ });
1293
+ var getAddress = (signer) => Effect48.succeed(signer.address);
1294
+ var recoverTransactionAddress = (transaction) => Effect48.tryPromise({
1295
+ try: () => Signers.recoverTransactionAddress(transaction),
1296
+ catch: (e) => new CryptoError({
1297
+ message: e instanceof Error ? e.message : String(e),
1298
+ cause: e
1299
+ })
1300
+ });
1301
+ var SignersService = class extends Context.Tag("SignersService")() {
1302
+ };
1303
+
1304
+ // src/crypto/Signers/SignersLive.ts
1305
+ var SignersLive = Layer.succeed(SignersService, {
1306
+ fromPrivateKey,
1307
+ getAddress,
1308
+ recoverTransactionAddress
1309
+ });
1310
+ var mockSigner = {
1311
+ address: "0x0000000000000000000000000000000000000000",
1312
+ publicKey: new Uint8Array(64),
1313
+ signMessage: (_message) => Effect48.succeed(`0x${"00".repeat(65)}`),
1314
+ signTransaction: (transaction) => Effect48.succeed(transaction),
1315
+ signTypedData: (_typedData) => Effect48.succeed(`0x${"00".repeat(65)}`)
1316
+ };
1317
+ var testImpl3 = {
1318
+ fromPrivateKey: (_privateKey) => Effect48.succeed(mockSigner),
1319
+ getAddress: (signer) => Effect48.succeed(signer.address),
1320
+ recoverTransactionAddress: (_transaction) => Effect48.succeed("0x0000000000000000000000000000000000000000")
1321
+ };
1322
+ var SignersTest = Layer.succeed(SignersService, testImpl3);
1253
1323
  var computeSecret = (secretKey, publicKey) => Effect48.try({
1254
1324
  try: () => X25519.scalarmult(secretKey, publicKey),
1255
1325
  catch: (e) => e
@@ -1277,4 +1347,4 @@ var X25519Test = Layer.succeed(X25519Service, {
1277
1347
  computeSecret: (_secretKey, _publicKey) => Effect48.succeed(new Uint8Array(32))
1278
1348
  });
1279
1349
 
1280
- export { AddressDerivationError, AesGcmLive, AesGcmService, AesGcmTest, Bip39Live, Bip39Service, Bip39Test, Blake2Live, Blake2Service, Blake2Test, Bls12381Live, Bls12381Service, Bn254Error, Bn254Live, Bn254Service, Bn254Test, ChaCha20Poly1305Live, ChaCha20Poly1305Service, ChaCha20Poly1305Test, CryptoLive, CryptoTest, EIP712Live, EIP712Service, EIP712Test, Ed25519Live, Ed25519Service, Ed25519Test, HDWalletService, HDWalletTest, HMACLive, HMACService, HMACTest, HardenedDerivationError, InvalidKeyError3 as InvalidKeyError, InvalidPathError, InvalidPrivateKeyError, InvalidPublicKeyError, InvalidRecoveryIdError, InvalidSeedError, InvalidSignatureError, KZGError, KZGLive, KZGService, KZGTest, KeccakLive, KeccakService, KeccakTest, KeystoreLive, KeystoreService, KeystoreTest, ModExpLive, ModExpService, ModExpTest, P256Live, P256Service, RecoverError, Ripemd160Live, Ripemd160Service, Ripemd160Test, SHA256Live, SHA256Service, SHA256Test, Secp256k1Error, Secp256k1Live, Secp256k1Service, Secp256k1Test, VerifyError, X25519Live, X25519Service, X25519Test, decrypt as aesGcmDecrypt, encrypt as aesGcmEncrypt, generateKey as aesGcmGenerateKey, generateNonce as aesGcmGenerateNonce, generateMnemonic as bip39GenerateMnemonic, mnemonicToSeed as bip39MnemonicToSeed, hash as blake2Hash, blobToKzgCommitment, aggregate2 as bls12381Aggregate, sign2 as bls12381Sign, verify2 as bls12381Verify, decrypt2 as chaCha20Poly1305Decrypt, encrypt2 as chaCha20Poly1305Encrypt, generateKey2 as chaCha20Poly1305GenerateKey, generateNonce2 as chaCha20Poly1305GenerateNonce, computeBlobKzgProof, constantTimeEqual, getPublicKey as ed25519GetPublicKey, sign4 as ed25519Sign, verify4 as ed25519Verify, recoverAddress as eip712RecoverAddress, unwrapSignature as erc6492UnwrapSignature, verifySignature as erc6492VerifySignature, wrapSignature as erc6492WrapSignature, fromMnemonic, fromSeed, g1Add, g1Generator, g1Mul, g2Add, g2Generator, g2Mul, generateMnemonic2 as generateMnemonic, getWordCount, hashDomain, hashMessage, hashMessage as hashPersonalMessage, hashStruct, hashTypedData, derive as hdwalletDerive, getPrivateKey as hdwalletGetPrivateKey, getPublicKey2 as hdwalletGetPublicKey, withPrivateKey as hdwalletWithPrivateKey, withSeed as hdwalletWithSeed, hmacSha256, hmacSha512, hash2 as keccakHash, decrypt3 as keystoreDecrypt, encrypt3 as keystoreEncrypt, withDecryptedKey as keystoreWithDecryptedKey, mapToSecp256k1Error, mnemonicToSeed2 as mnemonicToSeed, mnemonicToSeedSync, modexp, modexpBytes, calculateGas as modexpCalculateGas, sign6 as p256Sign, verify6 as p256Verify, pairingCheck, recover, recoverAddress2 as recoverAddress, recoverMessageAddress, hash3 as ripemd160Hash, hash4 as sha256Hash, sign9 as sign, signTypedData, hashTypedData as signatureHashTypedData, validateMnemonic, verify9 as verify, verifyBlobKzgProof, verifyHash, verifyMessage, verifyTypedData, verifyTypedData2 as verifyTypedDataSignature, computeSecret as x25519ComputeSecret, generateKeyPair as x25519GenerateKeyPair, getPublicKey3 as x25519GetPublicKey };
1350
+ export { AddressDerivationError, AesGcmLive, AesGcmService, AesGcmTest, Bip39Live, Bip39Service, Bip39Test, Blake2Live, Blake2Service, Blake2Test, Bls12381Live, Bls12381Service, Bn254Error, Bn254Live, Bn254Service, Bn254Test, ChaCha20Poly1305Live, ChaCha20Poly1305Service, ChaCha20Poly1305Test, CryptoLive, CryptoTest, EIP712Live, EIP712Service, EIP712Test, Ed25519Live, Ed25519Service, Ed25519Test, HDWalletService, HDWalletTest, HMACLive, HMACService, HMACTest, HardenedDerivationError, InvalidKeyError3 as InvalidKeyError, InvalidPathError, InvalidPrivateKeyError, InvalidPublicKeyError, InvalidRecoveryIdError, InvalidSeedError, InvalidSignatureError, KZGError, KZGLive, KZGService, KZGTest, KeccakLive, KeccakService, KeccakTest, KeystoreLive, KeystoreService, KeystoreTest, ModExpLive, ModExpService, ModExpTest, P256Live, P256Service, RecoverError, Ripemd160Live, Ripemd160Service, Ripemd160Test, SHA256Live, SHA256Service, SHA256Test, Secp256k1Error, Secp256k1Live, Secp256k1Service, Secp256k1Test, SignersLive, SignersService, SignersTest, VerifyError, X25519Live, X25519Service, X25519Test, decrypt as aesGcmDecrypt, encrypt as aesGcmEncrypt, generateKey as aesGcmGenerateKey, generateNonce as aesGcmGenerateNonce, generateMnemonic as bip39GenerateMnemonic, mnemonicToSeed as bip39MnemonicToSeed, hash as blake2Hash, blobToKzgCommitment, aggregate2 as bls12381Aggregate, sign2 as bls12381Sign, verify2 as bls12381Verify, decrypt2 as chaCha20Poly1305Decrypt, encrypt2 as chaCha20Poly1305Encrypt, generateKey2 as chaCha20Poly1305GenerateKey, generateNonce2 as chaCha20Poly1305GenerateNonce, computeBlobKzgProof, constantTimeEqual, getPublicKey as ed25519GetPublicKey, sign4 as ed25519Sign, verify4 as ed25519Verify, recoverAddress as eip712RecoverAddress, unwrapSignature as erc6492UnwrapSignature, verifySignature as erc6492VerifySignature, wrapSignature as erc6492WrapSignature, fromMnemonic, fromPrivateKey, fromSeed, g1Add, g1Generator, g1Mul, g2Add, g2Generator, g2Mul, generateMnemonic2 as generateMnemonic, getWordCount, hashDomain, hashMessage, hashMessage as hashPersonalMessage, hashStruct, hashTypedData, derive as hdwalletDerive, getPrivateKey as hdwalletGetPrivateKey, getPublicKey2 as hdwalletGetPublicKey, withPrivateKey as hdwalletWithPrivateKey, withSeed as hdwalletWithSeed, hmacSha256, hmacSha512, hash2 as keccakHash, decrypt3 as keystoreDecrypt, encrypt3 as keystoreEncrypt, withDecryptedKey as keystoreWithDecryptedKey, mapToSecp256k1Error, mnemonicToSeed2 as mnemonicToSeed, mnemonicToSeedSync, modexp, modexpBytes, calculateGas as modexpCalculateGas, sign6 as p256Sign, verify6 as p256Verify, pairingCheck, recover, recoverAddress2 as recoverAddress, recoverMessageAddress, recoverTransactionAddress, hash3 as ripemd160Hash, hash4 as sha256Hash, sign9 as sign, signTypedData, hashTypedData as signatureHashTypedData, getAddress as signersGetAddress, validateMnemonic, verify9 as verify, verifyBlobKzgProof, verifyHash, verifyMessage, verifyTypedData, verifyTypedData2 as verifyTypedDataSignature, computeSecret as x25519ComputeSecret, generateKeyPair as x25519GenerateKeyPair, getPublicKey3 as x25519GetPublicKey };