voltaire-effect 0.3.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{X25519Test-D5Q-5fL9.d.ts → X25519Test-avt1DUgp.d.ts} +231 -6
- package/dist/crypto/index.d.ts +2 -2
- package/dist/crypto/index.js +72 -2
- package/dist/{index-3UKSP3cd.d.ts → index-DxwZo3xo.d.ts} +7781 -5513
- package/dist/index.d.ts +990 -3096
- package/dist/index.js +2374 -1652
- package/dist/native/index.d.ts +6 -6
- package/dist/native/index.js +2399 -1677
- package/dist/primitives/index.d.ts +7 -6
- package/dist/primitives/index.js +2966 -2361
- package/dist/services/index.d.ts +1631 -1255
- package/dist/services/index.js +4493 -3977
- package/package.json +7 -3
- package/src/crypto/Signers/SignersService.ts +1 -1
- package/src/crypto/Signers/errors.ts +29 -0
- package/src/crypto/Signers/index.ts +1 -0
- package/src/crypto/Signers/operations.ts +26 -8
- package/src/crypto/index.ts +10 -11
- package/src/index.ts +1 -2
- package/src/jsonrpc/Anvil.ts +13 -8
- package/src/jsonrpc/Eth.ts +13 -8
- package/src/jsonrpc/Hardhat.ts +13 -8
- package/src/jsonrpc/IdCounter.ts +21 -5
- package/src/jsonrpc/JsonRpc.test.ts +126 -61
- package/src/jsonrpc/Net.ts +13 -8
- package/src/jsonrpc/Request.ts +16 -8
- package/src/jsonrpc/Txpool.ts +13 -8
- package/src/jsonrpc/Wallet.ts +13 -8
- package/src/jsonrpc/Web3.ts +13 -8
- package/src/jsonrpc/index.ts +1 -1
- package/src/primitives/Abi/AbiSchema.ts +3 -4
- package/src/primitives/Abi/fromBytecode.test.ts +47 -0
- package/src/primitives/Abi/fromBytecode.ts +81 -0
- package/src/primitives/Abi/index.ts +3 -0
- package/src/primitives/AccessList/from.ts +12 -9
- package/src/primitives/Address/Checksummed.ts +21 -27
- package/src/primitives/Address/from.ts +12 -15
- package/src/primitives/Address/toHex.ts +2 -1
- package/src/primitives/Base64/from.ts +21 -4
- package/src/primitives/Blob/from.ts +12 -4
- package/src/primitives/BlockHash/index.ts +2 -2
- package/src/primitives/BlockNumber/index.ts +3 -3
- package/src/primitives/Bytecode/from.ts +11 -2
- package/src/primitives/ContractSignature/verifySignature.ts +3 -5
- package/src/primitives/Ens/from.ts +12 -11
- package/src/primitives/Hex/from.ts +12 -4
- package/src/primitives/Signature/from.ts +11 -2
- package/src/primitives/Transaction/EIP2930/index.ts +12 -12
- package/src/primitives/Transaction/EIP4844/index.ts +14 -14
- package/src/primitives/Transaction/EIP7702/index.ts +13 -13
- package/src/primitives/Transaction/Legacy/index.ts +13 -13
- package/src/primitives/TransactionHash/index.ts +3 -2
- package/src/primitives/TransactionIndex/index.ts +2 -2
- package/src/primitives/Trie/Trie.test.ts +70 -0
- package/src/primitives/Trie/TrieSchema.ts +26 -0
- package/src/primitives/Trie/clear.ts +16 -0
- package/src/primitives/Trie/del.ts +18 -0
- package/src/primitives/Trie/get.ts +18 -0
- package/src/primitives/Trie/index.ts +30 -0
- package/src/primitives/Trie/init.ts +13 -0
- package/src/primitives/Trie/prove.ts +19 -0
- package/src/primitives/Trie/put.ts +20 -0
- package/src/primitives/Trie/rootHash.ts +14 -0
- package/src/primitives/Trie/verify.ts +18 -0
- package/src/primitives/Uint/from.ts +11 -2
- package/src/primitives/Uint16/index.ts +5 -4
- package/src/primitives/Uint64/index.ts +5 -4
- package/src/primitives/Uint8/index.ts +5 -4
- package/src/primitives/index.ts +3 -2
- package/src/services/BlockExplorerApi/BlockExplorerApi.test.ts +789 -0
- package/src/services/BlockExplorerApi/BlockExplorerApi.ts +797 -0
- package/src/services/BlockExplorerApi/BlockExplorerApiErrors.ts +176 -0
- package/src/services/BlockExplorerApi/BlockExplorerApiService.ts +60 -0
- package/src/services/BlockExplorerApi/BlockExplorerApiTypes.ts +225 -0
- package/src/services/BlockExplorerApi/index.ts +42 -0
- package/src/services/Contract/Contract.test.ts +2 -6
- package/src/services/Contract/ContractTypes.ts +26 -8
- package/src/services/Contract/estimateGas.test.ts +4 -7
- package/src/services/Provider/actions/multicall.ts +28 -9
- package/src/services/Provider/actions/readContract.test.ts +8 -11
- package/src/services/Provider/actions/readContract.ts +28 -9
- package/src/services/Provider/functions/getBlock.ts +2 -1
- package/src/services/Provider/functions/getBlockReceipts.ts +2 -1
- package/src/services/Provider/functions/getBlockTransactionCount.ts +2 -1
- package/src/services/Provider/functions/getUncle.ts +2 -1
- package/src/services/Provider/functions/getUncleCount.ts +2 -1
- package/src/services/Signer/actions/deployContract.ts +1 -1
- package/src/services/index.ts +25 -0
|
@@ -4,7 +4,7 @@ import * as Effect from 'effect/Effect';
|
|
|
4
4
|
import { K as KeccakService, P as ProviderService } from './ProviderService-BZ5pqDrD.js';
|
|
5
5
|
import { HashType } from '@tevm/voltaire/Hash';
|
|
6
6
|
import { Secp256k1SignatureType, Secp256k1PublicKeyType } from '@tevm/voltaire/Secp256k1';
|
|
7
|
-
import { c as InvalidSignatureError, b as InvalidRecoveryIdError, d as Secp256k1Error, S as Secp256k1Service, g as SignOptions, I as InvalidPrivateKeyError, a as InvalidPublicKeyError } from './Secp256k1Service-OxQ6hJFp.js';
|
|
7
|
+
import { c as InvalidSignatureError, b as InvalidRecoveryIdError, d as Secp256k1Error, S as Secp256k1Service, g as SignOptions, I as InvalidPrivateKeyError$1, a as InvalidPublicKeyError } from './Secp256k1Service-OxQ6hJFp.js';
|
|
8
8
|
import * as Layer from 'effect/Layer';
|
|
9
9
|
import { AddressType } from '@tevm/voltaire/Address';
|
|
10
10
|
import { TypedData, Signature, Domain, Message, TypeDefinitions } from '@tevm/voltaire/EIP712';
|
|
@@ -18,7 +18,7 @@ import { InvalidSecretKeyError, Ed25519Error, InvalidSignatureError as InvalidSi
|
|
|
18
18
|
import { HexType } from '@tevm/voltaire/Hex';
|
|
19
19
|
import { HMACType } from '@tevm/voltaire/HMAC';
|
|
20
20
|
import { Keystore, EncryptionError as EncryptionError$2, InvalidScryptNError, InvalidPbkdf2IterationsError, DecryptionError, InvalidMacError, UnsupportedVersionError, UnsupportedKdfError } from '@tevm/voltaire/Keystore';
|
|
21
|
-
import { P256SignatureType, InvalidPrivateKeyError as InvalidPrivateKeyError$
|
|
21
|
+
import { P256SignatureType, InvalidPrivateKeyError as InvalidPrivateKeyError$2, P256Error, InvalidPublicKeyError as InvalidPublicKeyError$1 } from '@tevm/voltaire/P256';
|
|
22
22
|
import { InvalidSecretKeyError as InvalidSecretKeyError$1, InvalidPublicKeyError as InvalidPublicKeyError$3, X25519Error } from '@tevm/voltaire/X25519';
|
|
23
23
|
|
|
24
24
|
/**
|
|
@@ -378,7 +378,7 @@ declare const Secp256k1Test: Layer.Layer<Secp256k1Service, never, never>;
|
|
|
378
378
|
* @see {@link Secp256k1Service} - Service interface for dependency injection
|
|
379
379
|
* @since 0.0.1
|
|
380
380
|
*/
|
|
381
|
-
declare const sign$3: (messageHash: HashType, privateKey: Uint8Array, options?: SignOptions) => Effect.Effect<Secp256k1SignatureType, InvalidPrivateKeyError | Secp256k1Error>;
|
|
381
|
+
declare const sign$3: (messageHash: HashType, privateKey: Uint8Array, options?: SignOptions) => Effect.Effect<Secp256k1SignatureType, InvalidPrivateKeyError$1 | Secp256k1Error>;
|
|
382
382
|
|
|
383
383
|
/**
|
|
384
384
|
* @fileoverview Secp256k1 signature verification function for Effect-based applications.
|
|
@@ -2941,7 +2941,7 @@ interface P256ServiceShape {
|
|
|
2941
2941
|
* @throws InvalidPrivateKeyError - When the private key is invalid
|
|
2942
2942
|
* @throws P256Error - When signing fails
|
|
2943
2943
|
*/
|
|
2944
|
-
readonly sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$
|
|
2944
|
+
readonly sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$2 | P256Error>;
|
|
2945
2945
|
/**
|
|
2946
2946
|
* Verifies a P-256 ECDSA signature against a message hash and public key.
|
|
2947
2947
|
*
|
|
@@ -4794,7 +4794,7 @@ declare const P256Live: Layer.Layer<P256Service, never, never>;
|
|
|
4794
4794
|
* @see {@link P256Service} - Full service interface
|
|
4795
4795
|
* @since 0.0.1
|
|
4796
4796
|
*/
|
|
4797
|
-
declare const sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$
|
|
4797
|
+
declare const sign: (messageHash: HashType | Uint8Array, privateKey: Uint8Array) => Effect.Effect<P256SignatureType, InvalidPrivateKeyError$2 | P256Error>;
|
|
4798
4798
|
|
|
4799
4799
|
/**
|
|
4800
4800
|
* @fileoverview P-256 signature verification function for Effect-based applications.
|
|
@@ -4989,6 +4989,231 @@ declare const hash$1: (data: Uint8Array) => Effect.Effect<Ripemd160Hash, never,
|
|
|
4989
4989
|
*/
|
|
4990
4990
|
declare const hash: (data: Uint8Array) => Effect.Effect<SHA256Hash, never, SHA256Service>;
|
|
4991
4991
|
|
|
4992
|
+
/**
|
|
4993
|
+
* @fileoverview Error types for Signers module using Effect TaggedError.
|
|
4994
|
+
* @module Signers/errors
|
|
4995
|
+
* @since 0.0.1
|
|
4996
|
+
*/
|
|
4997
|
+
declare const CryptoError_base: new <A extends Record<string, any> = {}>(args: effect_Types.Equals<A, {}> extends true ? void : { readonly [P in keyof A as P extends "_tag" ? never : P]: A[P]; }) => effect_Cause.YieldableError & {
|
|
4998
|
+
readonly _tag: "CryptoError";
|
|
4999
|
+
} & Readonly<A>;
|
|
5000
|
+
/**
|
|
5001
|
+
* General cryptographic error during signing operations.
|
|
5002
|
+
*
|
|
5003
|
+
* @since 0.0.1
|
|
5004
|
+
*/
|
|
5005
|
+
declare class CryptoError extends CryptoError_base<{
|
|
5006
|
+
readonly message: string;
|
|
5007
|
+
readonly cause?: unknown;
|
|
5008
|
+
}> {
|
|
5009
|
+
}
|
|
5010
|
+
declare const InvalidPrivateKeyError_base: new <A extends Record<string, any> = {}>(args: effect_Types.Equals<A, {}> extends true ? void : { readonly [P in keyof A as P extends "_tag" ? never : P]: A[P]; }) => effect_Cause.YieldableError & {
|
|
5011
|
+
readonly _tag: "InvalidPrivateKeyError";
|
|
5012
|
+
} & Readonly<A>;
|
|
5013
|
+
/**
|
|
5014
|
+
* Invalid private key format or value.
|
|
5015
|
+
*
|
|
5016
|
+
* @since 0.0.1
|
|
5017
|
+
*/
|
|
5018
|
+
declare class InvalidPrivateKeyError extends InvalidPrivateKeyError_base<{
|
|
5019
|
+
readonly message: string;
|
|
5020
|
+
readonly cause?: unknown;
|
|
5021
|
+
}> {
|
|
5022
|
+
}
|
|
5023
|
+
|
|
5024
|
+
/**
|
|
5025
|
+
* @fileoverview SignersService Effect service definition for cryptographic signing.
|
|
5026
|
+
* @module
|
|
5027
|
+
* @since 0.0.1
|
|
5028
|
+
*/
|
|
5029
|
+
|
|
5030
|
+
/**
|
|
5031
|
+
* Represents an Ethereum signer capable of signing messages, transactions, and typed data.
|
|
5032
|
+
*
|
|
5033
|
+
* @since 0.0.1
|
|
5034
|
+
*/
|
|
5035
|
+
interface Signer {
|
|
5036
|
+
/** The Ethereum address derived from the signer's public key */
|
|
5037
|
+
readonly address: string;
|
|
5038
|
+
/** The 64-byte uncompressed public key (without 04 prefix) */
|
|
5039
|
+
readonly publicKey: Uint8Array;
|
|
5040
|
+
/** Signs a message using EIP-191 personal sign format */
|
|
5041
|
+
readonly signMessage: (message: string | Uint8Array) => Effect.Effect<string, CryptoError>;
|
|
5042
|
+
/** Signs a transaction and returns the signed transaction */
|
|
5043
|
+
readonly signTransaction: (transaction: unknown) => Effect.Effect<unknown, CryptoError>;
|
|
5044
|
+
/** Signs EIP-712 typed data */
|
|
5045
|
+
readonly signTypedData: (typedData: unknown) => Effect.Effect<string, CryptoError>;
|
|
5046
|
+
}
|
|
5047
|
+
/**
|
|
5048
|
+
* Shape of the SignersService interface.
|
|
5049
|
+
*
|
|
5050
|
+
* @since 0.0.1
|
|
5051
|
+
*/
|
|
5052
|
+
interface SignersServiceShape {
|
|
5053
|
+
/** Creates a signer from a private key */
|
|
5054
|
+
readonly fromPrivateKey: (privateKey: string | Uint8Array) => Effect.Effect<Signer, InvalidPrivateKeyError>;
|
|
5055
|
+
/** Gets the Ethereum address from a signer */
|
|
5056
|
+
readonly getAddress: (signer: Signer) => Effect.Effect<string, never>;
|
|
5057
|
+
/** Recovers the sender address from a signed transaction */
|
|
5058
|
+
readonly recoverTransactionAddress: (transaction: unknown) => Effect.Effect<string, CryptoError>;
|
|
5059
|
+
}
|
|
5060
|
+
declare const SignersService_base: Context.TagClass<SignersService, "SignersService", SignersServiceShape>;
|
|
5061
|
+
/**
|
|
5062
|
+
* Effect service tag for cryptographic signing operations.
|
|
5063
|
+
*
|
|
5064
|
+
* @example
|
|
5065
|
+
* ```typescript
|
|
5066
|
+
* const program = Effect.gen(function* () {
|
|
5067
|
+
* const signers = yield* SignersService
|
|
5068
|
+
* const signer = yield* signers.fromPrivateKey(privateKey)
|
|
5069
|
+
* const address = yield* signers.getAddress(signer)
|
|
5070
|
+
* return address
|
|
5071
|
+
* })
|
|
5072
|
+
* ```
|
|
5073
|
+
*
|
|
5074
|
+
* @since 0.0.1
|
|
5075
|
+
*/
|
|
5076
|
+
declare class SignersService extends SignersService_base {
|
|
5077
|
+
}
|
|
5078
|
+
|
|
5079
|
+
/**
|
|
5080
|
+
* @fileoverview Signer operations for Effect.
|
|
5081
|
+
* @module Signers/operations
|
|
5082
|
+
* @since 0.0.1
|
|
5083
|
+
*/
|
|
5084
|
+
|
|
5085
|
+
/**
|
|
5086
|
+
* Creates a signer from a private key.
|
|
5087
|
+
*
|
|
5088
|
+
* @description
|
|
5089
|
+
* Constructs a Signer object that can sign messages, transactions, and typed data.
|
|
5090
|
+
* The signer derives the Ethereum address and public key from the private key.
|
|
5091
|
+
*
|
|
5092
|
+
* @param privateKey - The 32-byte private key as hex string or Uint8Array
|
|
5093
|
+
* @returns Effect containing a Signer object
|
|
5094
|
+
*
|
|
5095
|
+
* @example
|
|
5096
|
+
* ```typescript
|
|
5097
|
+
* import { fromPrivateKey, SignersLive } from 'voltaire-effect/crypto/Signers'
|
|
5098
|
+
* import * as Effect from 'effect/Effect'
|
|
5099
|
+
*
|
|
5100
|
+
* const program = Effect.gen(function* () {
|
|
5101
|
+
* const signer = yield* fromPrivateKey('0x...')
|
|
5102
|
+
* const sig = yield* signer.signMessage('Hello')
|
|
5103
|
+
* return sig
|
|
5104
|
+
* }).pipe(Effect.provide(SignersLive))
|
|
5105
|
+
* ```
|
|
5106
|
+
*
|
|
5107
|
+
* @throws InvalidPrivateKeyError if the private key is invalid
|
|
5108
|
+
* @see {@link getAddress} to get the signer's address
|
|
5109
|
+
* @since 0.0.1
|
|
5110
|
+
*/
|
|
5111
|
+
declare const fromPrivateKey: (privateKey: string | Uint8Array) => Effect.Effect<Signer, InvalidPrivateKeyError>;
|
|
5112
|
+
/**
|
|
5113
|
+
* Gets the Ethereum address from a signer.
|
|
5114
|
+
*
|
|
5115
|
+
* @description
|
|
5116
|
+
* Returns the 20-byte Ethereum address derived from the signer's public key.
|
|
5117
|
+
* The address is checksummed per EIP-55.
|
|
5118
|
+
*
|
|
5119
|
+
* @param signer - The signer object
|
|
5120
|
+
* @returns Effect containing the Ethereum address as 0x-prefixed hex string
|
|
5121
|
+
*
|
|
5122
|
+
* @example
|
|
5123
|
+
* ```typescript
|
|
5124
|
+
* import { fromPrivateKey, getAddress, SignersLive } from 'voltaire-effect/crypto/Signers'
|
|
5125
|
+
* import * as Effect from 'effect/Effect'
|
|
5126
|
+
*
|
|
5127
|
+
* const program = Effect.gen(function* () {
|
|
5128
|
+
* const signer = yield* fromPrivateKey('0x...')
|
|
5129
|
+
* return yield* getAddress(signer)
|
|
5130
|
+
* }).pipe(Effect.provide(SignersLive))
|
|
5131
|
+
* ```
|
|
5132
|
+
*
|
|
5133
|
+
* @throws Never fails
|
|
5134
|
+
* @since 0.0.1
|
|
5135
|
+
*/
|
|
5136
|
+
declare const getAddress: (signer: Signer) => Effect.Effect<string, never>;
|
|
5137
|
+
/**
|
|
5138
|
+
* Recovers the sender address from a signed transaction.
|
|
5139
|
+
*
|
|
5140
|
+
* @description
|
|
5141
|
+
* Uses ecrecover to extract the Ethereum address that signed a transaction.
|
|
5142
|
+
* This is how nodes verify transaction authenticity.
|
|
5143
|
+
*
|
|
5144
|
+
* @param transaction - The signed transaction object
|
|
5145
|
+
* @returns Effect containing the recovered Ethereum address
|
|
5146
|
+
*
|
|
5147
|
+
* @example
|
|
5148
|
+
* ```typescript
|
|
5149
|
+
* import { recoverTransactionAddress, SignersLive } from 'voltaire-effect/crypto/Signers'
|
|
5150
|
+
* import * as Effect from 'effect/Effect'
|
|
5151
|
+
*
|
|
5152
|
+
* const program = recoverTransactionAddress(signedTx).pipe(Effect.provide(SignersLive))
|
|
5153
|
+
* ```
|
|
5154
|
+
*
|
|
5155
|
+
* @throws CryptoError if signature recovery fails
|
|
5156
|
+
* @since 0.0.1
|
|
5157
|
+
*/
|
|
5158
|
+
declare const recoverTransactionAddress: (transaction: unknown) => Effect.Effect<string, CryptoError>;
|
|
5159
|
+
|
|
5160
|
+
/**
|
|
5161
|
+
* @fileoverview Production implementation of SignersService.
|
|
5162
|
+
* @module Signers/SignersLive
|
|
5163
|
+
* @since 0.0.1
|
|
5164
|
+
*/
|
|
5165
|
+
|
|
5166
|
+
/**
|
|
5167
|
+
* Production layer for SignersService using native implementation.
|
|
5168
|
+
*
|
|
5169
|
+
* @description
|
|
5170
|
+
* Provides real signing operations using secp256k1 for signatures.
|
|
5171
|
+
* Supports EIP-191 personal sign, transaction signing, and EIP-712 typed data.
|
|
5172
|
+
*
|
|
5173
|
+
* @example
|
|
5174
|
+
* ```typescript
|
|
5175
|
+
* import { SignersService, SignersLive } from 'voltaire-effect/crypto/Signers'
|
|
5176
|
+
* import * as Effect from 'effect/Effect'
|
|
5177
|
+
*
|
|
5178
|
+
* const program = Effect.gen(function* () {
|
|
5179
|
+
* const signers = yield* SignersService
|
|
5180
|
+
* const signer = yield* signers.fromPrivateKey(privateKey)
|
|
5181
|
+
* return yield* signers.getAddress(signer)
|
|
5182
|
+
* }).pipe(Effect.provide(SignersLive))
|
|
5183
|
+
* ```
|
|
5184
|
+
*
|
|
5185
|
+
* @since 0.0.1
|
|
5186
|
+
* @see {@link SignersTest} for unit testing
|
|
5187
|
+
*/
|
|
5188
|
+
declare const SignersLive: Layer.Layer<SignersService, never, never>;
|
|
5189
|
+
|
|
5190
|
+
/**
|
|
5191
|
+
* @fileoverview Test implementation of SignersService.
|
|
5192
|
+
* @module Signers/SignersTest
|
|
5193
|
+
* @since 0.0.1
|
|
5194
|
+
*/
|
|
5195
|
+
|
|
5196
|
+
/**
|
|
5197
|
+
* Test layer for SignersService returning deterministic mock values.
|
|
5198
|
+
*
|
|
5199
|
+
* @description
|
|
5200
|
+
* Provides mock implementations for unit testing. Returns a signer with
|
|
5201
|
+
* the zero address and mock signatures.
|
|
5202
|
+
* Use when testing application logic without cryptographic overhead.
|
|
5203
|
+
*
|
|
5204
|
+
* @example
|
|
5205
|
+
* ```typescript
|
|
5206
|
+
* import { SignersService, SignersTest, fromPrivateKey } from 'voltaire-effect/crypto/Signers'
|
|
5207
|
+
* import * as Effect from 'effect/Effect'
|
|
5208
|
+
*
|
|
5209
|
+
* const testProgram = fromPrivateKey('0x...').pipe(Effect.provide(SignersTest))
|
|
5210
|
+
* // Returns mock signer with zero address
|
|
5211
|
+
* ```
|
|
5212
|
+
*
|
|
5213
|
+
* @since 0.0.1
|
|
5214
|
+
*/
|
|
5215
|
+
declare const SignersTest: Layer.Layer<SignersService, never, never>;
|
|
5216
|
+
|
|
4992
5217
|
/**
|
|
4993
5218
|
* @fileoverview X25519 ECDH shared secret computation for Effect.
|
|
4994
5219
|
* @module X25519/computeSecret
|
|
@@ -5210,4 +5435,4 @@ declare const X25519Live: Layer.Layer<X25519Service, never, never>;
|
|
|
5210
5435
|
*/
|
|
5211
5436
|
declare const X25519Test: Layer.Layer<X25519Service, never, never>;
|
|
5212
5437
|
|
|
5213
|
-
export { g2Mul as $, AddressDerivationError as A, Bip39Service as B, ChaCha20Poly1305Service as C, Blake2Live as D, EIP712Service as E, Blake2Test as F, hash$2 as G, HMACService as H, aggregate as I, Bls12381Live as J, KeystoreService as K, type Bls12381ServiceShape as L, sign$2 as M, verify$2 as N, Bn254Error as O, P256Service as P, Bn254Live as Q, Ripemd160Service as R, SHA256Service as S, type Bn254ServiceShape as T, Bn254Test as U, VerifyError as V, g1Add as W, g1Generator as X, g1Mul as Y, g2Add as Z, g2Generator as _, Blake2Service as a, type ModExpServiceShape as a$, pairingCheck as a0, ChaCha20Poly1305Live as a1, type ChaCha20Poly1305ServiceShape as a2, ChaCha20Poly1305Test as a3, decrypt$1 as a4, encrypt$1 as a5, generateKey as a6, generateNonce as a7, Ed25519Live as a8, type Ed25519ServiceShape as a9, type HDWalletServiceShape as aA, HDWalletTest as aB, InvalidKeyError as aC, InvalidPathError as aD, InvalidSeedError as aE, mnemonicToSeed as aF, withPrivateKey as aG, withSeed as aH, HMACLive as aI, type HMACServiceShape as aJ, HMACTest as aK, hmacSha256 as aL, hmacSha512 as aM, hash$3 as aN, type DecryptError as aO, decrypt as aP, encrypt as aQ, KeystoreLive as aR, type KeystoreServiceShape as aS, KeystoreTest as aT, withDecryptedKey as aU, blobToKzgCommitment as aV, computeBlobKzgProof as aW, verifyBlobKzgProof as aX, calculateGas as aY, ModExpLive as aZ, ModExpService as a_, Ed25519Test as aa, getPublicKey$2 as ab, sign$1 as ac, verify$1 as ad, EIP712Live as ae, type EIP712ServiceShape as af, EIP712Test as ag, hashDomain as ah, hashStruct as ai, hashTypedData as aj, recoverAddress$1 as ak, signTypedData as al, verifyTypedData as am, unwrapSignature as an, verifySignature as ao, wrapSignature as ap, derive as aq, fromMnemonic as ar, fromSeed as as, generateMnemonic as at, getPrivateKey as au, getPublicKey$1 as av, HardenedDerivationError as aw, type HDNode as ax, type HDPath as ay, type HDWalletError as az, Bls12381Service as b, ModExpTest as b0, modexp as b1, modexpBytes as b2, P256Live as b3, type P256ServiceShape as b4, sign as b5, verify as b6, hash$1 as b7, Ripemd160Live as b8, Ripemd160Test as b9, hash as ba, SHA256Live as bb, SHA256Test as bc, recoverAddress as bd, type SignatureError as be,
|
|
5438
|
+
export { g2Mul as $, AddressDerivationError as A, Bip39Service as B, ChaCha20Poly1305Service as C, Blake2Live as D, EIP712Service as E, Blake2Test as F, hash$2 as G, HMACService as H, aggregate as I, Bls12381Live as J, KeystoreService as K, type Bls12381ServiceShape as L, sign$2 as M, verify$2 as N, Bn254Error as O, P256Service as P, Bn254Live as Q, Ripemd160Service as R, SHA256Service as S, type Bn254ServiceShape as T, Bn254Test as U, VerifyError as V, g1Add as W, g1Generator as X, g1Mul as Y, g2Add as Z, g2Generator as _, Blake2Service as a, type ModExpServiceShape as a$, pairingCheck as a0, ChaCha20Poly1305Live as a1, type ChaCha20Poly1305ServiceShape as a2, ChaCha20Poly1305Test as a3, decrypt$1 as a4, encrypt$1 as a5, generateKey as a6, generateNonce as a7, Ed25519Live as a8, type Ed25519ServiceShape as a9, type HDWalletServiceShape as aA, HDWalletTest as aB, InvalidKeyError as aC, InvalidPathError as aD, InvalidSeedError as aE, mnemonicToSeed as aF, withPrivateKey as aG, withSeed as aH, HMACLive as aI, type HMACServiceShape as aJ, HMACTest as aK, hmacSha256 as aL, hmacSha512 as aM, hash$3 as aN, type DecryptError as aO, decrypt as aP, encrypt as aQ, KeystoreLive as aR, type KeystoreServiceShape as aS, KeystoreTest as aT, withDecryptedKey as aU, blobToKzgCommitment as aV, computeBlobKzgProof as aW, verifyBlobKzgProof as aX, calculateGas as aY, ModExpLive as aZ, ModExpService as a_, Ed25519Test as aa, getPublicKey$2 as ab, sign$1 as ac, verify$1 as ad, EIP712Live as ae, type EIP712ServiceShape as af, EIP712Test as ag, hashDomain as ah, hashStruct as ai, hashTypedData as aj, recoverAddress$1 as ak, signTypedData as al, verifyTypedData as am, unwrapSignature as an, verifySignature as ao, wrapSignature as ap, derive as aq, fromMnemonic as ar, fromSeed as as, generateMnemonic as at, getPrivateKey as au, getPublicKey$1 as av, HardenedDerivationError as aw, type HDNode as ax, type HDPath as ay, type HDWalletError as az, Bls12381Service as b, ModExpTest as b0, modexp as b1, modexpBytes as b2, P256Live as b3, type P256ServiceShape as b4, sign as b5, verify as b6, hash$1 as b7, Ripemd160Live as b8, Ripemd160Test as b9, WORD_COUNTS as bA, type ChaCha20Poly1305Error as bB, InvalidKeyError$1 as bC, InvalidNonceError as bD, mapToHDWalletError as bE, CryptoError as bF, InvalidPrivateKeyError as bG, hash as ba, SHA256Live as bb, SHA256Test as bc, recoverAddress as bd, type SignatureError as be, fromPrivateKey as bf, getAddress as bg, recoverTransactionAddress as bh, type Signer as bi, SignersLive as bj, SignersService as bk, type SignersServiceShape as bl, SignersTest as bm, computeSecret as bn, generateKeyPair as bo, getPublicKey as bp, X25519Live as bq, X25519Service as br, type X25519ServiceShape as bs, X25519Test as bt, recover as bu, Secp256k1Live as bv, Secp256k1Test as bw, sign$3 as bx, verify$3 as by, type MnemonicStrength as bz, Bn254Service as c, Ed25519Service as d, HDWalletService as e, CryptoLive as f, CryptoTest as g, type SignatureInput as h, index as i, RecoverError as j, AesGcmLive as k, AesGcmService as l, type AesGcmServiceShape as m, AesGcmTest as n, decrypt$2 as o, encrypt$2 as p, generateKey$1 as q, generateNonce$1 as r, Bip39Live as s, type Bip39ServiceShape as t, Bip39Test as u, generateMnemonic$1 as v, getWordCount as w, mnemonicToSeed$1 as x, mnemonicToSeedSync as y, validateMnemonic as z };
|
package/dist/crypto/index.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import { h as SignatureInput, j as RecoverError, A as AddressDerivationError, V as VerifyError, E as EIP712Service } from '../X25519Test-
|
|
2
|
-
export { k as AesGcmLive, l as AesGcmService, m as AesGcmServiceShape, n as AesGcmTest, s as Bip39Live, B as Bip39Service, t as Bip39ServiceShape, u as Bip39Test, D as Blake2Live, a as Blake2Service, F as Blake2Test, J as Bls12381Live, b as Bls12381Service, L as Bls12381ServiceShape, O as Bn254Error, Q as Bn254Live, c as Bn254Service, T as Bn254ServiceShape, U as Bn254Test, a1 as ChaCha20Poly1305Live, C as ChaCha20Poly1305Service, a2 as ChaCha20Poly1305ServiceShape, a3 as ChaCha20Poly1305Test, f as CryptoLive, g as CryptoTest, ae as EIP712Live, af as EIP712ServiceShape, ag as EIP712Test, a8 as Ed25519Live, d as Ed25519Service, a9 as Ed25519ServiceShape, aa as Ed25519Test, ax as HDNode, ay as HDPath, az as HDWalletError, e as HDWalletService, aA as HDWalletServiceShape, aB as HDWalletTest, aI as HMACLive, H as HMACService, aJ as HMACServiceShape, aK as HMACTest, aw as HardenedDerivationError, aC as InvalidKeyError, aD as InvalidPathError, aE as InvalidSeedError, aO as KeystoreDecryptError, aR as KeystoreLive, K as KeystoreService, aS as KeystoreServiceShape, aT as KeystoreTest, aZ as ModExpLive, a_ as ModExpService, a$ as ModExpServiceShape, b0 as ModExpTest, b3 as P256Live, P as P256Service, b4 as P256ServiceShape, b8 as Ripemd160Live, R as Ripemd160Service, b9 as Ripemd160Test, bb as SHA256Live, S as SHA256Service, bc as SHA256Test,
|
|
1
|
+
import { h as SignatureInput, j as RecoverError, A as AddressDerivationError, V as VerifyError, E as EIP712Service } from '../X25519Test-avt1DUgp.js';
|
|
2
|
+
export { k as AesGcmLive, l as AesGcmService, m as AesGcmServiceShape, n as AesGcmTest, s as Bip39Live, B as Bip39Service, t as Bip39ServiceShape, u as Bip39Test, D as Blake2Live, a as Blake2Service, F as Blake2Test, J as Bls12381Live, b as Bls12381Service, L as Bls12381ServiceShape, O as Bn254Error, Q as Bn254Live, c as Bn254Service, T as Bn254ServiceShape, U as Bn254Test, a1 as ChaCha20Poly1305Live, C as ChaCha20Poly1305Service, a2 as ChaCha20Poly1305ServiceShape, a3 as ChaCha20Poly1305Test, f as CryptoLive, g as CryptoTest, ae as EIP712Live, af as EIP712ServiceShape, ag as EIP712Test, a8 as Ed25519Live, d as Ed25519Service, a9 as Ed25519ServiceShape, aa as Ed25519Test, ax as HDNode, ay as HDPath, az as HDWalletError, e as HDWalletService, aA as HDWalletServiceShape, aB as HDWalletTest, aI as HMACLive, H as HMACService, aJ as HMACServiceShape, aK as HMACTest, aw as HardenedDerivationError, aC as InvalidKeyError, aD as InvalidPathError, aE as InvalidSeedError, aO as KeystoreDecryptError, aR as KeystoreLive, K as KeystoreService, aS as KeystoreServiceShape, aT as KeystoreTest, aZ as ModExpLive, a_ as ModExpService, a$ as ModExpServiceShape, b0 as ModExpTest, b3 as P256Live, P as P256Service, b4 as P256ServiceShape, b8 as Ripemd160Live, R as Ripemd160Service, b9 as Ripemd160Test, bb as SHA256Live, S as SHA256Service, bc as SHA256Test, bv as Secp256k1Live, bw as Secp256k1Test, be as SignatureError, bi as Signer, bj as SignersLive, bk as SignersService, bl as SignersServiceShape, bm as SignersTest, bq as X25519Live, br as X25519Service, bs as X25519ServiceShape, bt as X25519Test, o as aesGcmDecrypt, p as aesGcmEncrypt, q as aesGcmGenerateKey, r as aesGcmGenerateNonce, v as bip39GenerateMnemonic, x as bip39MnemonicToSeed, G as blake2Hash, aV as blobToKzgCommitment, I as bls12381Aggregate, M as bls12381Sign, N as bls12381Verify, a4 as chaCha20Poly1305Decrypt, a5 as chaCha20Poly1305Encrypt, a6 as chaCha20Poly1305GenerateKey, a7 as chaCha20Poly1305GenerateNonce, aW as computeBlobKzgProof, ab as ed25519GetPublicKey, ac as ed25519Sign, ad as ed25519Verify, ak as eip712RecoverAddress, an as erc6492UnwrapSignature, ao as erc6492VerifySignature, ap as erc6492WrapSignature, ar as fromMnemonic, bf as fromPrivateKey, as as fromSeed, W as g1Add, X as g1Generator, Y as g1Mul, Z as g2Add, _ as g2Generator, $ as g2Mul, at as generateMnemonic, w as getWordCount, ah as hashDomain, ai as hashStruct, aj as hashTypedData, aq as hdwalletDerive, au as hdwalletGetPrivateKey, av as hdwalletGetPublicKey, aG as hdwalletWithPrivateKey, aH as hdwalletWithSeed, aL as hmacSha256, aM as hmacSha512, aN as keccakHash, aP as keystoreDecrypt, aQ as keystoreEncrypt, aU as keystoreWithDecryptedKey, aF as mnemonicToSeed, y as mnemonicToSeedSync, b1 as modexp, b2 as modexpBytes, aY as modexpCalculateGas, b5 as p256Sign, b6 as p256Verify, a0 as pairingCheck, bu as recover, bd as recoverAddress, bh as recoverTransactionAddress, b7 as ripemd160Hash, ba as sha256Hash, bx as sign, al as signTypedData, aj as signatureHashTypedData, bg as signersGetAddress, z as validateMnemonic, by as verify, aX as verifyBlobKzgProof, am as verifyTypedData, bn as x25519ComputeSecret, bo as x25519GenerateKeyPair, bp as x25519GetPublicKey } from '../X25519Test-avt1DUgp.js';
|
|
3
3
|
import { K as KeccakService } from '../ProviderService-BZ5pqDrD.js';
|
|
4
4
|
export { b as KeccakLive, c as KeccakTest } from '../ProviderService-BZ5pqDrD.js';
|
|
5
5
|
import { Keccak256Hash } from '@tevm/voltaire';
|
package/dist/crypto/index.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as Context from 'effect/Context';
|
|
2
2
|
import * as Data5 from 'effect/Data';
|
|
3
|
-
import { Bip39, Blake2, BN254, ChaCha20Poly1305, EIP712, HMAC, Keccak256, KZG, Ripemd160, SHA256, ModExp, AesGcm, Hash } from '@tevm/voltaire';
|
|
3
|
+
import { Bip39, Blake2, BN254, ChaCha20Poly1305, EIP712, HMAC, Keccak256, KZG, Ripemd160, SHA256, ModExp, AesGcm, Signers, Hash } from '@tevm/voltaire';
|
|
4
4
|
import * as Effect48 from 'effect/Effect';
|
|
5
5
|
import * as Layer from 'effect/Layer';
|
|
6
6
|
import * as Bls12381 from '@tevm/voltaire/Bls12381';
|
|
@@ -1250,6 +1250,76 @@ var verifyTypedData2 = (params) => Effect48.gen(function* () {
|
|
|
1250
1250
|
);
|
|
1251
1251
|
return constantTimeEqual(recoveredAddress, params.address);
|
|
1252
1252
|
});
|
|
1253
|
+
var CryptoError = class extends Data5.TaggedError("CryptoError") {
|
|
1254
|
+
};
|
|
1255
|
+
var InvalidPrivateKeyError2 = class extends Data5.TaggedError(
|
|
1256
|
+
"InvalidPrivateKeyError"
|
|
1257
|
+
) {
|
|
1258
|
+
};
|
|
1259
|
+
var fromPrivateKey = (privateKey) => Effect48.try({
|
|
1260
|
+
try: () => {
|
|
1261
|
+
const impl = Signers.PrivateKeySignerImpl.fromPrivateKey({ privateKey });
|
|
1262
|
+
return {
|
|
1263
|
+
address: impl.address,
|
|
1264
|
+
publicKey: impl.publicKey,
|
|
1265
|
+
signMessage: (message) => Effect48.tryPromise({
|
|
1266
|
+
try: () => impl.signMessage(message),
|
|
1267
|
+
catch: (e) => new CryptoError({
|
|
1268
|
+
message: e instanceof Error ? e.message : String(e),
|
|
1269
|
+
cause: e
|
|
1270
|
+
})
|
|
1271
|
+
}),
|
|
1272
|
+
signTransaction: (transaction) => Effect48.tryPromise({
|
|
1273
|
+
try: () => impl.signTransaction(transaction),
|
|
1274
|
+
catch: (e) => new CryptoError({
|
|
1275
|
+
message: e instanceof Error ? e.message : String(e),
|
|
1276
|
+
cause: e
|
|
1277
|
+
})
|
|
1278
|
+
}),
|
|
1279
|
+
signTypedData: (typedData) => Effect48.tryPromise({
|
|
1280
|
+
try: () => impl.signTypedData(typedData),
|
|
1281
|
+
catch: (e) => new CryptoError({
|
|
1282
|
+
message: e instanceof Error ? e.message : String(e),
|
|
1283
|
+
cause: e
|
|
1284
|
+
})
|
|
1285
|
+
})
|
|
1286
|
+
};
|
|
1287
|
+
},
|
|
1288
|
+
catch: (e) => new InvalidPrivateKeyError2({
|
|
1289
|
+
message: e instanceof Error ? e.message : String(e),
|
|
1290
|
+
cause: e
|
|
1291
|
+
})
|
|
1292
|
+
});
|
|
1293
|
+
var getAddress = (signer) => Effect48.succeed(signer.address);
|
|
1294
|
+
var recoverTransactionAddress = (transaction) => Effect48.tryPromise({
|
|
1295
|
+
try: () => Signers.recoverTransactionAddress(transaction),
|
|
1296
|
+
catch: (e) => new CryptoError({
|
|
1297
|
+
message: e instanceof Error ? e.message : String(e),
|
|
1298
|
+
cause: e
|
|
1299
|
+
})
|
|
1300
|
+
});
|
|
1301
|
+
var SignersService = class extends Context.Tag("SignersService")() {
|
|
1302
|
+
};
|
|
1303
|
+
|
|
1304
|
+
// src/crypto/Signers/SignersLive.ts
|
|
1305
|
+
var SignersLive = Layer.succeed(SignersService, {
|
|
1306
|
+
fromPrivateKey,
|
|
1307
|
+
getAddress,
|
|
1308
|
+
recoverTransactionAddress
|
|
1309
|
+
});
|
|
1310
|
+
var mockSigner = {
|
|
1311
|
+
address: "0x0000000000000000000000000000000000000000",
|
|
1312
|
+
publicKey: new Uint8Array(64),
|
|
1313
|
+
signMessage: (_message) => Effect48.succeed(`0x${"00".repeat(65)}`),
|
|
1314
|
+
signTransaction: (transaction) => Effect48.succeed(transaction),
|
|
1315
|
+
signTypedData: (_typedData) => Effect48.succeed(`0x${"00".repeat(65)}`)
|
|
1316
|
+
};
|
|
1317
|
+
var testImpl3 = {
|
|
1318
|
+
fromPrivateKey: (_privateKey) => Effect48.succeed(mockSigner),
|
|
1319
|
+
getAddress: (signer) => Effect48.succeed(signer.address),
|
|
1320
|
+
recoverTransactionAddress: (_transaction) => Effect48.succeed("0x0000000000000000000000000000000000000000")
|
|
1321
|
+
};
|
|
1322
|
+
var SignersTest = Layer.succeed(SignersService, testImpl3);
|
|
1253
1323
|
var computeSecret = (secretKey, publicKey) => Effect48.try({
|
|
1254
1324
|
try: () => X25519.scalarmult(secretKey, publicKey),
|
|
1255
1325
|
catch: (e) => e
|
|
@@ -1277,4 +1347,4 @@ var X25519Test = Layer.succeed(X25519Service, {
|
|
|
1277
1347
|
computeSecret: (_secretKey, _publicKey) => Effect48.succeed(new Uint8Array(32))
|
|
1278
1348
|
});
|
|
1279
1349
|
|
|
1280
|
-
export { AddressDerivationError, AesGcmLive, AesGcmService, AesGcmTest, Bip39Live, Bip39Service, Bip39Test, Blake2Live, Blake2Service, Blake2Test, Bls12381Live, Bls12381Service, Bn254Error, Bn254Live, Bn254Service, Bn254Test, ChaCha20Poly1305Live, ChaCha20Poly1305Service, ChaCha20Poly1305Test, CryptoLive, CryptoTest, EIP712Live, EIP712Service, EIP712Test, Ed25519Live, Ed25519Service, Ed25519Test, HDWalletService, HDWalletTest, HMACLive, HMACService, HMACTest, HardenedDerivationError, InvalidKeyError3 as InvalidKeyError, InvalidPathError, InvalidPrivateKeyError, InvalidPublicKeyError, InvalidRecoveryIdError, InvalidSeedError, InvalidSignatureError, KZGError, KZGLive, KZGService, KZGTest, KeccakLive, KeccakService, KeccakTest, KeystoreLive, KeystoreService, KeystoreTest, ModExpLive, ModExpService, ModExpTest, P256Live, P256Service, RecoverError, Ripemd160Live, Ripemd160Service, Ripemd160Test, SHA256Live, SHA256Service, SHA256Test, Secp256k1Error, Secp256k1Live, Secp256k1Service, Secp256k1Test, VerifyError, X25519Live, X25519Service, X25519Test, decrypt as aesGcmDecrypt, encrypt as aesGcmEncrypt, generateKey as aesGcmGenerateKey, generateNonce as aesGcmGenerateNonce, generateMnemonic as bip39GenerateMnemonic, mnemonicToSeed as bip39MnemonicToSeed, hash as blake2Hash, blobToKzgCommitment, aggregate2 as bls12381Aggregate, sign2 as bls12381Sign, verify2 as bls12381Verify, decrypt2 as chaCha20Poly1305Decrypt, encrypt2 as chaCha20Poly1305Encrypt, generateKey2 as chaCha20Poly1305GenerateKey, generateNonce2 as chaCha20Poly1305GenerateNonce, computeBlobKzgProof, constantTimeEqual, getPublicKey as ed25519GetPublicKey, sign4 as ed25519Sign, verify4 as ed25519Verify, recoverAddress as eip712RecoverAddress, unwrapSignature as erc6492UnwrapSignature, verifySignature as erc6492VerifySignature, wrapSignature as erc6492WrapSignature, fromMnemonic, fromSeed, g1Add, g1Generator, g1Mul, g2Add, g2Generator, g2Mul, generateMnemonic2 as generateMnemonic, getWordCount, hashDomain, hashMessage, hashMessage as hashPersonalMessage, hashStruct, hashTypedData, derive as hdwalletDerive, getPrivateKey as hdwalletGetPrivateKey, getPublicKey2 as hdwalletGetPublicKey, withPrivateKey as hdwalletWithPrivateKey, withSeed as hdwalletWithSeed, hmacSha256, hmacSha512, hash2 as keccakHash, decrypt3 as keystoreDecrypt, encrypt3 as keystoreEncrypt, withDecryptedKey as keystoreWithDecryptedKey, mapToSecp256k1Error, mnemonicToSeed2 as mnemonicToSeed, mnemonicToSeedSync, modexp, modexpBytes, calculateGas as modexpCalculateGas, sign6 as p256Sign, verify6 as p256Verify, pairingCheck, recover, recoverAddress2 as recoverAddress, recoverMessageAddress, hash3 as ripemd160Hash, hash4 as sha256Hash, sign9 as sign, signTypedData, hashTypedData as signatureHashTypedData, validateMnemonic, verify9 as verify, verifyBlobKzgProof, verifyHash, verifyMessage, verifyTypedData, verifyTypedData2 as verifyTypedDataSignature, computeSecret as x25519ComputeSecret, generateKeyPair as x25519GenerateKeyPair, getPublicKey3 as x25519GetPublicKey };
|
|
1350
|
+
export { AddressDerivationError, AesGcmLive, AesGcmService, AesGcmTest, Bip39Live, Bip39Service, Bip39Test, Blake2Live, Blake2Service, Blake2Test, Bls12381Live, Bls12381Service, Bn254Error, Bn254Live, Bn254Service, Bn254Test, ChaCha20Poly1305Live, ChaCha20Poly1305Service, ChaCha20Poly1305Test, CryptoLive, CryptoTest, EIP712Live, EIP712Service, EIP712Test, Ed25519Live, Ed25519Service, Ed25519Test, HDWalletService, HDWalletTest, HMACLive, HMACService, HMACTest, HardenedDerivationError, InvalidKeyError3 as InvalidKeyError, InvalidPathError, InvalidPrivateKeyError, InvalidPublicKeyError, InvalidRecoveryIdError, InvalidSeedError, InvalidSignatureError, KZGError, KZGLive, KZGService, KZGTest, KeccakLive, KeccakService, KeccakTest, KeystoreLive, KeystoreService, KeystoreTest, ModExpLive, ModExpService, ModExpTest, P256Live, P256Service, RecoverError, Ripemd160Live, Ripemd160Service, Ripemd160Test, SHA256Live, SHA256Service, SHA256Test, Secp256k1Error, Secp256k1Live, Secp256k1Service, Secp256k1Test, SignersLive, SignersService, SignersTest, VerifyError, X25519Live, X25519Service, X25519Test, decrypt as aesGcmDecrypt, encrypt as aesGcmEncrypt, generateKey as aesGcmGenerateKey, generateNonce as aesGcmGenerateNonce, generateMnemonic as bip39GenerateMnemonic, mnemonicToSeed as bip39MnemonicToSeed, hash as blake2Hash, blobToKzgCommitment, aggregate2 as bls12381Aggregate, sign2 as bls12381Sign, verify2 as bls12381Verify, decrypt2 as chaCha20Poly1305Decrypt, encrypt2 as chaCha20Poly1305Encrypt, generateKey2 as chaCha20Poly1305GenerateKey, generateNonce2 as chaCha20Poly1305GenerateNonce, computeBlobKzgProof, constantTimeEqual, getPublicKey as ed25519GetPublicKey, sign4 as ed25519Sign, verify4 as ed25519Verify, recoverAddress as eip712RecoverAddress, unwrapSignature as erc6492UnwrapSignature, verifySignature as erc6492VerifySignature, wrapSignature as erc6492WrapSignature, fromMnemonic, fromPrivateKey, fromSeed, g1Add, g1Generator, g1Mul, g2Add, g2Generator, g2Mul, generateMnemonic2 as generateMnemonic, getWordCount, hashDomain, hashMessage, hashMessage as hashPersonalMessage, hashStruct, hashTypedData, derive as hdwalletDerive, getPrivateKey as hdwalletGetPrivateKey, getPublicKey2 as hdwalletGetPublicKey, withPrivateKey as hdwalletWithPrivateKey, withSeed as hdwalletWithSeed, hmacSha256, hmacSha512, hash2 as keccakHash, decrypt3 as keystoreDecrypt, encrypt3 as keystoreEncrypt, withDecryptedKey as keystoreWithDecryptedKey, mapToSecp256k1Error, mnemonicToSeed2 as mnemonicToSeed, mnemonicToSeedSync, modexp, modexpBytes, calculateGas as modexpCalculateGas, sign6 as p256Sign, verify6 as p256Verify, pairingCheck, recover, recoverAddress2 as recoverAddress, recoverMessageAddress, recoverTransactionAddress, hash3 as ripemd160Hash, hash4 as sha256Hash, sign9 as sign, signTypedData, hashTypedData as signatureHashTypedData, getAddress as signersGetAddress, validateMnemonic, verify9 as verify, verifyBlobKzgProof, verifyHash, verifyMessage, verifyTypedData, verifyTypedData2 as verifyTypedDataSignature, computeSecret as x25519ComputeSecret, generateKeyPair as x25519GenerateKeyPair, getPublicKey3 as x25519GetPublicKey };
|