wowok 2.2.2 → 2.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +145 -201
- package/NOTICE +94 -26
- package/THIRD_PARTY_LICENSES/APACHE_LICENSE.txt +196 -0
- package/THIRD_PARTY_LICENSES/MIT_LICENSE.txt +58 -0
- package/dist/cjs/bcs/bcs.d.ts +30 -68
- package/dist/cjs/bcs/bcs.js +1 -1
- package/dist/cjs/bcs/index.js +1 -1
- package/dist/cjs/cryptography/index.d.ts +1 -1
- package/dist/cjs/cryptography/index.js +1 -1
- package/dist/cjs/cryptography/intent.js +1 -1
- package/dist/cjs/cryptography/keypair.d.ts +2 -2
- package/dist/cjs/cryptography/keypair.js +1 -1
- package/dist/cjs/cryptography/publickey.d.ts +1 -1
- package/dist/cjs/cryptography/publickey.js +1 -1
- package/dist/cjs/cryptography/signature-scheme.d.ts +4 -15
- package/dist/cjs/cryptography/signature-scheme.js +1 -1
- package/dist/cjs/cryptography/signature.d.ts +1 -9
- package/dist/cjs/cryptography/signature.js +1 -1
- package/dist/cjs/grpc/client.d.ts +0 -2
- package/dist/cjs/grpc/client.js +1 -1
- package/dist/cjs/grpc/proto/google/protobuf/any.d.ts +7 -0
- package/dist/cjs/grpc/proto/google/protobuf/any.js +1 -1
- package/dist/cjs/grpc/proto/google/protobuf/duration.d.ts +8 -0
- package/dist/cjs/grpc/proto/google/protobuf/duration.js +1 -1
- package/dist/cjs/grpc/proto/google/protobuf/empty.d.ts +8 -0
- package/dist/cjs/grpc/proto/google/protobuf/empty.js +1 -1
- package/dist/cjs/grpc/proto/google/protobuf/field_mask.d.ts +8 -0
- package/dist/cjs/grpc/proto/google/protobuf/field_mask.js +1 -1
- package/dist/cjs/grpc/proto/google/protobuf/struct.d.ts +15 -0
- package/dist/cjs/grpc/proto/google/protobuf/struct.js +1 -1
- package/dist/cjs/grpc/proto/google/protobuf/timestamp.d.ts +8 -0
- package/dist/cjs/grpc/proto/google/protobuf/timestamp.js +1 -1
- package/dist/cjs/grpc/proto/google/rpc/error_details.d.ts +48 -0
- package/dist/cjs/grpc/proto/google/rpc/error_details.js +1 -1
- package/dist/cjs/grpc/proto/google/rpc/status.d.ts +8 -0
- package/dist/cjs/grpc/proto/google/rpc/status.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint_contents.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint_summary.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/effects.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/event.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/executed_transaction.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/execution_status.d.ts +2 -2
- package/dist/cjs/grpc/proto/sui/rpc/v2/execution_status.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/ledger_service.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/move_package.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/move_package_service.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/object.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/signature.d.ts +9 -87
- package/dist/cjs/grpc/proto/sui/rpc/v2/signature.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/signature_scheme.d.ts +2 -6
- package/dist/cjs/grpc/proto/sui/rpc/v2/signature_scheme.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/signature_verification_service.d.ts +0 -2
- package/dist/cjs/grpc/proto/sui/rpc/v2/signature_verification_service.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/state_service.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/system_state.d.ts +2 -2
- package/dist/cjs/grpc/proto/sui/rpc/v2/system_state.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/transaction.d.ts +13 -51
- package/dist/cjs/grpc/proto/sui/rpc/v2/transaction.js +1 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/transaction_execution_service.js +1 -1
- package/dist/cjs/index.d.ts +1 -1
- package/dist/cjs/index.js +1 -1
- package/dist/cjs/jsonRpc/types/chain.d.ts +0 -5
- package/dist/cjs/jsonRpc/types/generated.d.ts +5 -57
- package/dist/cjs/jsonRpc/types/params.d.ts +0 -17
- package/dist/cjs/keypairs/falcon512/index.d.ts +2 -0
- package/dist/cjs/keypairs/falcon512/index.js +1 -0
- package/dist/cjs/keypairs/falcon512/keypair.d.ts +19 -0
- package/dist/cjs/keypairs/falcon512/keypair.js +1 -0
- package/dist/{esm/keypairs/ed25519 → cjs/keypairs/falcon512}/publickey.d.ts +2 -2
- package/dist/cjs/keypairs/falcon512/publickey.js +1 -0
- package/dist/cjs/keypairs/index.d.ts +1 -4
- package/dist/cjs/keypairs/index.js +1 -1
- package/dist/cjs/utils/move-registry.js +1 -1
- package/dist/cjs/utils/sui-types.js +1 -1
- package/dist/cjs/verify/verify.js +1 -1
- package/dist/cjs/w/call/arbitration.js +1 -1
- package/dist/cjs/w/call/base.js +1 -1
- package/dist/cjs/w/call/contact.js +1 -1
- package/dist/cjs/w/call/demand.js +1 -1
- package/dist/cjs/w/call/guard.js +1 -1
- package/dist/cjs/w/call/machine.js +1 -1
- package/dist/cjs/w/call/personal.js +1 -1
- package/dist/cjs/w/call/proof.d.ts +3 -3
- package/dist/cjs/w/call/proof.js +1 -1
- package/dist/cjs/w/call/repository.js +1 -1
- package/dist/cjs/w/call/reward.js +1 -1
- package/dist/cjs/w/call/service.js +1 -1
- package/dist/cjs/w/call/treasury.js +1 -1
- package/dist/cjs/w/local/account.d.ts +11 -4
- package/dist/cjs/w/local/account.js +1 -1
- package/dist/cjs/w/local/storage.js +1 -1
- package/dist/cjs/w/local/util.js +1 -1
- package/dist/cjs/w/local/wip.d.ts +1 -1
- package/dist/cjs/w/local/wip.js +1 -1
- package/dist/cjs/w/messenger/crypto.d.ts +1 -3
- package/dist/cjs/w/messenger/crypto.js +1 -1
- package/dist/cjs/w/messenger/messenger-api.js +1 -1
- package/dist/cjs/w/messenger/messenger-manager.js +1 -1
- package/dist/cjs/w/messenger/messenger.js +1 -1
- package/dist/cjs/w/messenger/pq/crypto.d.ts +6 -6
- package/dist/cjs/w/messenger/pq/crypto.js +1 -1
- package/dist/cjs/w/messenger/pq/pqxdh.d.ts +3 -6
- package/dist/cjs/w/messenger/pq/pqxdh.js +1 -1
- package/dist/cjs/w/messenger/pq/session.d.ts +6 -4
- package/dist/cjs/w/messenger/pq/session.js +1 -1
- package/dist/cjs/w/messenger/pq/spqr.js +1 -1
- package/dist/cjs/w/messenger/pq/store-adapter.d.ts +1 -3
- package/dist/cjs/w/messenger/pq/store-adapter.js +1 -1
- package/dist/cjs/w/messenger/pq/types.d.ts +4 -5
- package/dist/cjs/w/messenger/pq/types.js +1 -1
- package/dist/cjs/w/messenger/session.d.ts +4 -5
- package/dist/cjs/w/messenger/session.js +1 -1
- package/dist/cjs/w/messenger/storage.js +1 -1
- package/dist/cjs/w/messenger/types.d.ts +7 -10
- package/dist/cjs/w/messenger/types.js +1 -1
- package/dist/cjs/w/query/object.js +1 -1
- package/dist/esm/bcs/bcs.d.ts +30 -68
- package/dist/esm/bcs/bcs.js +1 -1
- package/dist/esm/bcs/index.js +1 -1
- package/dist/esm/cryptography/index.d.ts +1 -1
- package/dist/esm/cryptography/index.js +1 -1
- package/dist/esm/cryptography/intent.js +1 -1
- package/dist/esm/cryptography/keypair.d.ts +2 -2
- package/dist/esm/cryptography/keypair.js +1 -1
- package/dist/esm/cryptography/publickey.d.ts +1 -1
- package/dist/esm/cryptography/publickey.js +1 -1
- package/dist/esm/cryptography/signature-scheme.d.ts +4 -15
- package/dist/esm/cryptography/signature-scheme.js +1 -1
- package/dist/esm/cryptography/signature.d.ts +1 -9
- package/dist/esm/cryptography/signature.js +1 -1
- package/dist/esm/grpc/client.d.ts +0 -2
- package/dist/esm/grpc/client.js +1 -1
- package/dist/esm/grpc/proto/google/protobuf/any.d.ts +7 -0
- package/dist/esm/grpc/proto/google/protobuf/any.js +1 -1
- package/dist/esm/grpc/proto/google/protobuf/duration.d.ts +8 -0
- package/dist/esm/grpc/proto/google/protobuf/duration.js +1 -1
- package/dist/esm/grpc/proto/google/protobuf/empty.d.ts +8 -0
- package/dist/esm/grpc/proto/google/protobuf/empty.js +1 -1
- package/dist/esm/grpc/proto/google/protobuf/field_mask.d.ts +8 -0
- package/dist/esm/grpc/proto/google/protobuf/field_mask.js +1 -1
- package/dist/esm/grpc/proto/google/protobuf/struct.d.ts +15 -0
- package/dist/esm/grpc/proto/google/protobuf/struct.js +1 -1
- package/dist/esm/grpc/proto/google/protobuf/timestamp.d.ts +8 -0
- package/dist/esm/grpc/proto/google/protobuf/timestamp.js +1 -1
- package/dist/esm/grpc/proto/google/rpc/error_details.d.ts +48 -0
- package/dist/esm/grpc/proto/google/rpc/error_details.js +1 -1
- package/dist/esm/grpc/proto/google/rpc/status.d.ts +8 -0
- package/dist/esm/grpc/proto/google/rpc/status.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint_contents.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint_summary.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/effects.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/event.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/executed_transaction.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/execution_status.d.ts +2 -2
- package/dist/esm/grpc/proto/sui/rpc/v2/execution_status.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/ledger_service.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/move_package.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/move_package_service.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/object.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/signature.d.ts +9 -87
- package/dist/esm/grpc/proto/sui/rpc/v2/signature.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/signature_scheme.d.ts +2 -6
- package/dist/esm/grpc/proto/sui/rpc/v2/signature_scheme.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/signature_verification_service.d.ts +0 -2
- package/dist/esm/grpc/proto/sui/rpc/v2/signature_verification_service.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/state_service.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/system_state.d.ts +2 -2
- package/dist/esm/grpc/proto/sui/rpc/v2/system_state.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/transaction.d.ts +13 -51
- package/dist/esm/grpc/proto/sui/rpc/v2/transaction.js +1 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/transaction_execution_service.js +1 -1
- package/dist/esm/index.d.ts +1 -1
- package/dist/esm/index.js +1 -1
- package/dist/esm/jsonRpc/types/chain.d.ts +0 -5
- package/dist/esm/jsonRpc/types/generated.d.ts +5 -57
- package/dist/esm/jsonRpc/types/params.d.ts +0 -17
- package/dist/esm/keypairs/falcon512/index.d.ts +2 -0
- package/dist/esm/keypairs/falcon512/index.js +1 -0
- package/dist/esm/keypairs/falcon512/keypair.d.ts +19 -0
- package/dist/esm/keypairs/falcon512/keypair.js +1 -0
- package/dist/{cjs/keypairs/ed25519 → esm/keypairs/falcon512}/publickey.d.ts +2 -2
- package/dist/esm/keypairs/falcon512/publickey.js +1 -0
- package/dist/esm/keypairs/index.d.ts +1 -4
- package/dist/esm/keypairs/index.js +1 -1
- package/dist/esm/utils/move-registry.js +1 -1
- package/dist/esm/utils/sui-types.js +1 -1
- package/dist/esm/verify/verify.js +1 -1
- package/dist/esm/w/call/arbitration.js +1 -1
- package/dist/esm/w/call/base.js +1 -1
- package/dist/esm/w/call/contact.js +1 -1
- package/dist/esm/w/call/demand.js +1 -1
- package/dist/esm/w/call/guard.js +1 -1
- package/dist/esm/w/call/machine.js +1 -1
- package/dist/esm/w/call/personal.js +1 -1
- package/dist/esm/w/call/proof.d.ts +3 -3
- package/dist/esm/w/call/proof.js +1 -1
- package/dist/esm/w/call/repository.js +1 -1
- package/dist/esm/w/call/reward.js +1 -1
- package/dist/esm/w/call/service.js +1 -1
- package/dist/esm/w/call/treasury.js +1 -1
- package/dist/esm/w/local/account.d.ts +11 -4
- package/dist/esm/w/local/account.js +1 -1
- package/dist/esm/w/local/storage.js +1 -1
- package/dist/esm/w/local/util.js +1 -1
- package/dist/esm/w/local/wip.d.ts +1 -1
- package/dist/esm/w/local/wip.js +1 -1
- package/dist/esm/w/messenger/crypto.d.ts +1 -3
- package/dist/esm/w/messenger/crypto.js +1 -1
- package/dist/esm/w/messenger/messenger-api.js +1 -1
- package/dist/esm/w/messenger/messenger-manager.js +1 -1
- package/dist/esm/w/messenger/messenger.js +1 -1
- package/dist/esm/w/messenger/pq/crypto.d.ts +6 -6
- package/dist/esm/w/messenger/pq/crypto.js +1 -1
- package/dist/esm/w/messenger/pq/pqxdh.d.ts +3 -6
- package/dist/esm/w/messenger/pq/pqxdh.js +1 -1
- package/dist/esm/w/messenger/pq/session.d.ts +6 -4
- package/dist/esm/w/messenger/pq/session.js +1 -1
- package/dist/esm/w/messenger/pq/spqr.js +1 -1
- package/dist/esm/w/messenger/pq/store-adapter.d.ts +1 -3
- package/dist/esm/w/messenger/pq/store-adapter.js +1 -1
- package/dist/esm/w/messenger/pq/types.d.ts +4 -5
- package/dist/esm/w/messenger/pq/types.js +1 -1
- package/dist/esm/w/messenger/session.d.ts +4 -5
- package/dist/esm/w/messenger/session.js +1 -1
- package/dist/esm/w/messenger/storage.js +1 -1
- package/dist/esm/w/messenger/types.d.ts +7 -10
- package/dist/esm/w/messenger/types.js +1 -1
- package/dist/esm/w/query/object.js +1 -1
- package/package.json +25 -25
- package/dist/cjs/grpc/proto/sui/rpc/v2/jwk.d.ts +0 -20
- package/dist/cjs/grpc/proto/sui/rpc/v2/jwk.js +0 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.client.d.ts +0 -23
- package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.client.js +0 -1
- package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.d.ts +0 -47
- package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.js +0 -1
- package/dist/cjs/keypairs/ed25519/ed25519-hd-key.d.ts +0 -8
- package/dist/cjs/keypairs/ed25519/ed25519-hd-key.js +0 -1
- package/dist/cjs/keypairs/ed25519/index.d.ts +0 -2
- package/dist/cjs/keypairs/ed25519/index.js +0 -1
- package/dist/cjs/keypairs/ed25519/keypair.d.ts +0 -22
- package/dist/cjs/keypairs/ed25519/keypair.js +0 -1
- package/dist/cjs/keypairs/ed25519/publickey.js +0 -1
- package/dist/cjs/keypairs/passkey/index.d.ts +0 -3
- package/dist/cjs/keypairs/passkey/index.js +0 -1
- package/dist/cjs/keypairs/passkey/keypair.d.ts +0 -33
- package/dist/cjs/keypairs/passkey/keypair.js +0 -1
- package/dist/cjs/keypairs/passkey/publickey.d.ts +0 -25
- package/dist/cjs/keypairs/passkey/publickey.js +0 -1
- package/dist/cjs/keypairs/passkey/types.d.ts +0 -6
- package/dist/cjs/keypairs/passkey/types.js +0 -1
- package/dist/cjs/keypairs/secp256k1/index.d.ts +0 -2
- package/dist/cjs/keypairs/secp256k1/index.js +0 -1
- package/dist/cjs/keypairs/secp256k1/keypair.d.ts +0 -22
- package/dist/cjs/keypairs/secp256k1/keypair.js +0 -1
- package/dist/cjs/keypairs/secp256k1/publickey.d.ts +0 -11
- package/dist/cjs/keypairs/secp256k1/publickey.js +0 -1
- package/dist/cjs/keypairs/secp256r1/index.d.ts +0 -2
- package/dist/cjs/keypairs/secp256r1/index.js +0 -1
- package/dist/cjs/keypairs/secp256r1/keypair.d.ts +0 -22
- package/dist/cjs/keypairs/secp256r1/keypair.js +0 -1
- package/dist/cjs/keypairs/secp256r1/publickey.d.ts +0 -11
- package/dist/cjs/keypairs/secp256r1/publickey.js +0 -1
- package/dist/cjs/utils/suins.d.ts +0 -2
- package/dist/cjs/utils/suins.js +0 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/jwk.d.ts +0 -20
- package/dist/esm/grpc/proto/sui/rpc/v2/jwk.js +0 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/name_service.client.d.ts +0 -23
- package/dist/esm/grpc/proto/sui/rpc/v2/name_service.client.js +0 -1
- package/dist/esm/grpc/proto/sui/rpc/v2/name_service.d.ts +0 -47
- package/dist/esm/grpc/proto/sui/rpc/v2/name_service.js +0 -1
- package/dist/esm/keypairs/ed25519/ed25519-hd-key.d.ts +0 -8
- package/dist/esm/keypairs/ed25519/ed25519-hd-key.js +0 -1
- package/dist/esm/keypairs/ed25519/index.d.ts +0 -2
- package/dist/esm/keypairs/ed25519/index.js +0 -1
- package/dist/esm/keypairs/ed25519/keypair.d.ts +0 -22
- package/dist/esm/keypairs/ed25519/keypair.js +0 -1
- package/dist/esm/keypairs/ed25519/publickey.js +0 -1
- package/dist/esm/keypairs/passkey/index.d.ts +0 -3
- package/dist/esm/keypairs/passkey/index.js +0 -1
- package/dist/esm/keypairs/passkey/keypair.d.ts +0 -33
- package/dist/esm/keypairs/passkey/keypair.js +0 -1
- package/dist/esm/keypairs/passkey/publickey.d.ts +0 -25
- package/dist/esm/keypairs/passkey/publickey.js +0 -1
- package/dist/esm/keypairs/passkey/types.d.ts +0 -6
- package/dist/esm/keypairs/passkey/types.js +0 -1
- package/dist/esm/keypairs/secp256k1/index.d.ts +0 -2
- package/dist/esm/keypairs/secp256k1/index.js +0 -1
- package/dist/esm/keypairs/secp256k1/keypair.d.ts +0 -22
- package/dist/esm/keypairs/secp256k1/keypair.js +0 -1
- package/dist/esm/keypairs/secp256k1/publickey.d.ts +0 -11
- package/dist/esm/keypairs/secp256k1/publickey.js +0 -1
- package/dist/esm/keypairs/secp256r1/index.d.ts +0 -2
- package/dist/esm/keypairs/secp256r1/index.js +0 -1
- package/dist/esm/keypairs/secp256r1/keypair.d.ts +0 -22
- package/dist/esm/keypairs/secp256r1/keypair.js +0 -1
- package/dist/esm/keypairs/secp256r1/publickey.d.ts +0 -11
- package/dist/esm/keypairs/secp256r1/publickey.js +0 -1
- package/dist/esm/utils/suins.d.ts +0 -2
- package/dist/esm/utils/suins.js +0 -1
package/package.json
CHANGED
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
"author": "wowok <build@wowok.net>",
|
|
4
4
|
"description": "Wowok Blockchain TypeScript API",
|
|
5
5
|
"homepage": "https://wowok.net",
|
|
6
|
-
"version": "2.2.
|
|
7
|
-
"license": "
|
|
6
|
+
"version": "2.2.4",
|
|
7
|
+
"license": "IN LICENSE",
|
|
8
8
|
"sideEffects": false,
|
|
9
9
|
"files": [
|
|
10
10
|
"dist",
|
|
@@ -12,6 +12,7 @@
|
|
|
12
12
|
"scripts",
|
|
13
13
|
"LICENSE",
|
|
14
14
|
"NOTICE",
|
|
15
|
+
"THIRD_PARTY_LICENSES",
|
|
15
16
|
"README.md"
|
|
16
17
|
],
|
|
17
18
|
"engines": {
|
|
@@ -64,22 +65,6 @@
|
|
|
64
65
|
"import": "./dist/esm/jsonRpc/index.js",
|
|
65
66
|
"require": "./dist/cjs/jsonRpc/index.js"
|
|
66
67
|
},
|
|
67
|
-
"./keypairs/ed25519": {
|
|
68
|
-
"import": "./dist/esm/keypairs/ed25519/index.js",
|
|
69
|
-
"require": "./dist/cjs/keypairs/ed25519/index.js"
|
|
70
|
-
},
|
|
71
|
-
"./keypairs/secp256k1": {
|
|
72
|
-
"import": "./dist/esm/keypairs/secp256k1/index.js",
|
|
73
|
-
"require": "./dist/cjs/keypairs/secp256k1/index.js"
|
|
74
|
-
},
|
|
75
|
-
"./keypairs/secp256r1": {
|
|
76
|
-
"import": "./dist/esm/keypairs/secp256r1/index.js",
|
|
77
|
-
"require": "./dist/cjs/keypairs/secp256r1/index.js"
|
|
78
|
-
},
|
|
79
|
-
"./keypairs/passkey": {
|
|
80
|
-
"import": "./dist/esm/keypairs/passkey/index.js",
|
|
81
|
-
"require": "./dist/cjs/keypairs/passkey/index.js"
|
|
82
|
-
},
|
|
83
68
|
"./multisig": {
|
|
84
69
|
"import": "./dist/esm/multisig/index.js",
|
|
85
70
|
"require": "./dist/cjs/multisig/index.js"
|
|
@@ -192,6 +177,10 @@
|
|
|
192
177
|
"import": "./dist/esm/w/local/cache.js",
|
|
193
178
|
"require": "./dist/cjs/w/local/cache.js"
|
|
194
179
|
},
|
|
180
|
+
"./w/local/token": {
|
|
181
|
+
"import": "./dist/esm/w/local/token.js",
|
|
182
|
+
"require": "./dist/cjs/w/local/token.js"
|
|
183
|
+
},
|
|
195
184
|
"./w/local/wts": {
|
|
196
185
|
"import": "./dist/esm/w/local/wts.js",
|
|
197
186
|
"require": "./dist/cjs/w/local/wts.js"
|
|
@@ -283,10 +272,13 @@
|
|
|
283
272
|
},
|
|
284
273
|
"scripts": {
|
|
285
274
|
"clean": "rm -rf tsconfig.tsbuildinfo ./dist",
|
|
286
|
-
"codegen": "pnpm codegen:grpc && pnpm lint:fix",
|
|
287
|
-
"codegen:grpc": "
|
|
288
|
-
"codegen:
|
|
289
|
-
"
|
|
275
|
+
"codegen": "pnpm codegen:grpc && pnpm codegen:graphql && pnpm lint:fix",
|
|
276
|
+
"codegen:grpc": "node tooling/codegen-grpc.mjs",
|
|
277
|
+
"codegen:graphql": "graphql-codegen --config graphql-codegen.ts",
|
|
278
|
+
"verify-protos": "node tooling/verify-protos.mjs",
|
|
279
|
+
"sync-protos": "node tooling/sync-protos.mjs",
|
|
280
|
+
"verify-graphql-schema": "node tooling/verify-graphql-schema.mjs",
|
|
281
|
+
"sync-graphql-schema": "node tooling/sync-graphql-schema.mjs",
|
|
290
282
|
"build": "tsc --project tsconfig.json && tsc --project tsconfig.esm.json && pnpm obfuscate",
|
|
291
283
|
"build:test": "tsc --project tsconfig.json && tsc --project tsconfig.esm.json",
|
|
292
284
|
"obfuscate": "javascript-obfuscator dist/cjs --output dist/cjs --config obfuscator.json && javascript-obfuscator dist/esm --output dist/esm --config obfuscator.json",
|
|
@@ -307,13 +299,21 @@
|
|
|
307
299
|
"prebuilds:download": "node scripts/download-prebuilds.js"
|
|
308
300
|
},
|
|
309
301
|
"devDependencies": {
|
|
302
|
+
"@graphql-codegen/add": "^7.0.0",
|
|
303
|
+
"@graphql-codegen/cli": "^7.0.0",
|
|
304
|
+
"@graphql-codegen/typed-document-node": "^7.0.0",
|
|
305
|
+
"@graphql-codegen/typescript": "^6.0.1",
|
|
306
|
+
"@graphql-codegen/typescript-operations": "^6.0.1",
|
|
307
|
+
"@graphql-typed-document-node/core": "^3.2.0",
|
|
310
308
|
"@parcel/watcher": "^2.5.1",
|
|
309
|
+
"@protobuf-ts/plugin": "^2.11.1",
|
|
311
310
|
"@sudocode-ai/better-sqlite3-win32-x64": "^11.10.0",
|
|
312
311
|
"@types/better-sqlite3": "^7.6.13",
|
|
313
312
|
"@types/node": "^24.10.1",
|
|
314
313
|
"@types/tmp": "^0.2.6",
|
|
315
314
|
"@types/ws": "^8.18.1",
|
|
316
315
|
"cross-env": "^10.1.0",
|
|
316
|
+
"gql.tada": "^1.8.0",
|
|
317
317
|
"javascript-obfuscator": "^4.1.1",
|
|
318
318
|
"moc-better-sqlite3": "^7.1.1",
|
|
319
319
|
"msw": "^2.12.3",
|
|
@@ -328,8 +328,8 @@
|
|
|
328
328
|
"ws": "^8.18.3"
|
|
329
329
|
},
|
|
330
330
|
"dependencies": {
|
|
331
|
-
"@mysten/bcs": "
|
|
332
|
-
"@mysten/utils": "
|
|
331
|
+
"@mysten/bcs": "file:../bcs",
|
|
332
|
+
"@mysten/utils": "file:../utils",
|
|
333
333
|
"@noble/curves": "=1.9.4",
|
|
334
334
|
"@noble/hashes": "^1.8.0",
|
|
335
335
|
"@noble/post-quantum": "^0.6.1",
|
|
@@ -342,8 +342,8 @@
|
|
|
342
342
|
"@types/lodash": "^4.17.21",
|
|
343
343
|
"@zip.js/zip.js": "^2.7.57",
|
|
344
344
|
"better-sqlite3": "^12.6.2",
|
|
345
|
+
"graphql": "^16.12.0",
|
|
345
346
|
"lodash": "^4.17.21",
|
|
346
|
-
"poseidon-lite": "0.2.1",
|
|
347
347
|
"valibot": "^1.2.0"
|
|
348
348
|
}
|
|
349
349
|
}
|
|
@@ -1,20 +0,0 @@
|
|
|
1
|
-
import { MessageType } from "@protobuf-ts/runtime";
|
|
2
|
-
export interface JwkId {
|
|
3
|
-
iss?: string;
|
|
4
|
-
kid?: string;
|
|
5
|
-
}
|
|
6
|
-
export interface Jwk {
|
|
7
|
-
kty?: string;
|
|
8
|
-
e?: string;
|
|
9
|
-
n?: string;
|
|
10
|
-
alg?: string;
|
|
11
|
-
}
|
|
12
|
-
declare class JwkId$Type extends MessageType<JwkId> {
|
|
13
|
-
constructor();
|
|
14
|
-
}
|
|
15
|
-
export declare const JwkId: JwkId$Type;
|
|
16
|
-
declare class Jwk$Type extends MessageType<Jwk> {
|
|
17
|
-
constructor();
|
|
18
|
-
}
|
|
19
|
-
export declare const Jwk: Jwk$Type;
|
|
20
|
-
export {};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{MessageType}from'@protobuf-ts/runtime';class JwkId$Type extends MessageType{constructor(){super('sui.rpc.v2.JwkId',[{'no':0x1,'name':'iss','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'kid','kind':'scalar','opt':!![],'T':0x9}]);}}export const JwkId=new JwkId$Type();class Jwk$Type extends MessageType{constructor(){super('sui.rpc.v2.Jwk',[{'no':0x1,'name':'kty','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'e','kind':'scalar','opt':!![],'T':0x9},{'no':0x3,'name':'n','kind':'scalar','opt':!![],'T':0x9},{'no':0x4,'name':'alg','kind':'scalar','opt':!![],'T':0x9}]);}}export const Jwk=new Jwk$Type();
|
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
import type { RpcTransport } from "@protobuf-ts/runtime-rpc";
|
|
2
|
-
import type { ServiceInfo } from "@protobuf-ts/runtime-rpc";
|
|
3
|
-
import type { ReverseLookupNameResponse } from "./name_service.js";
|
|
4
|
-
import type { ReverseLookupNameRequest } from "./name_service.js";
|
|
5
|
-
import type { LookupNameResponse } from "./name_service.js";
|
|
6
|
-
import type { LookupNameRequest } from "./name_service.js";
|
|
7
|
-
import type { UnaryCall } from "@protobuf-ts/runtime-rpc";
|
|
8
|
-
import type { RpcOptions } from "@protobuf-ts/runtime-rpc";
|
|
9
|
-
export interface INameServiceClient {
|
|
10
|
-
lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
|
|
11
|
-
reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
|
|
12
|
-
}
|
|
13
|
-
export declare class NameServiceClient implements INameServiceClient, ServiceInfo {
|
|
14
|
-
private readonly _transport;
|
|
15
|
-
typeName: string;
|
|
16
|
-
methods: import("@protobuf-ts/runtime-rpc").MethodInfo<any, any>[];
|
|
17
|
-
options: {
|
|
18
|
-
[extensionName: string]: import("@protobuf-ts/runtime").JsonValue;
|
|
19
|
-
};
|
|
20
|
-
constructor(_transport: RpcTransport);
|
|
21
|
-
lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
|
|
22
|
-
reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
|
|
23
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{NameService}from'./name_service.js';import{stackIntercept}from'@protobuf-ts/runtime-rpc';export class NameServiceClient{['_transport'];['typeName']=NameService['typeName'];['methods']=NameService['methods'];['options']=NameService['options'];constructor(a){this['_transport']=a;}['lookupName'](a,b){const c=this['methods'][0x0],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}['reverseLookupName'](a,b){const c=this['methods'][0x1],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}}
|
|
@@ -1,47 +0,0 @@
|
|
|
1
|
-
import { ServiceType } from "@protobuf-ts/runtime-rpc";
|
|
2
|
-
import { MessageType } from "@protobuf-ts/runtime";
|
|
3
|
-
import { Timestamp } from "../../../google/protobuf/timestamp.js";
|
|
4
|
-
export interface LookupNameRequest {
|
|
5
|
-
name?: string;
|
|
6
|
-
}
|
|
7
|
-
export interface LookupNameResponse {
|
|
8
|
-
record?: NameRecord;
|
|
9
|
-
}
|
|
10
|
-
export interface ReverseLookupNameRequest {
|
|
11
|
-
address?: string;
|
|
12
|
-
}
|
|
13
|
-
export interface ReverseLookupNameResponse {
|
|
14
|
-
record?: NameRecord;
|
|
15
|
-
}
|
|
16
|
-
export interface NameRecord {
|
|
17
|
-
id?: string;
|
|
18
|
-
name?: string;
|
|
19
|
-
registrationNftId?: string;
|
|
20
|
-
expirationTimestamp?: Timestamp;
|
|
21
|
-
targetAddress?: string;
|
|
22
|
-
data: {
|
|
23
|
-
[key: string]: string;
|
|
24
|
-
};
|
|
25
|
-
}
|
|
26
|
-
declare class LookupNameRequest$Type extends MessageType<LookupNameRequest> {
|
|
27
|
-
constructor();
|
|
28
|
-
}
|
|
29
|
-
export declare const LookupNameRequest: LookupNameRequest$Type;
|
|
30
|
-
declare class LookupNameResponse$Type extends MessageType<LookupNameResponse> {
|
|
31
|
-
constructor();
|
|
32
|
-
}
|
|
33
|
-
export declare const LookupNameResponse: LookupNameResponse$Type;
|
|
34
|
-
declare class ReverseLookupNameRequest$Type extends MessageType<ReverseLookupNameRequest> {
|
|
35
|
-
constructor();
|
|
36
|
-
}
|
|
37
|
-
export declare const ReverseLookupNameRequest: ReverseLookupNameRequest$Type;
|
|
38
|
-
declare class ReverseLookupNameResponse$Type extends MessageType<ReverseLookupNameResponse> {
|
|
39
|
-
constructor();
|
|
40
|
-
}
|
|
41
|
-
export declare const ReverseLookupNameResponse: ReverseLookupNameResponse$Type;
|
|
42
|
-
declare class NameRecord$Type extends MessageType<NameRecord> {
|
|
43
|
-
constructor();
|
|
44
|
-
}
|
|
45
|
-
export declare const NameRecord: NameRecord$Type;
|
|
46
|
-
export declare const NameService: ServiceType;
|
|
47
|
-
export {};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{ServiceType}from'@protobuf-ts/runtime-rpc';import{MessageType}from'@protobuf-ts/runtime';import{Timestamp}from'../../../google/protobuf/timestamp.js';class LookupNameRequest$Type extends MessageType{constructor(){super('sui.rpc.v2.LookupNameRequest',[{'no':0x1,'name':'name','kind':'scalar','opt':!![],'T':0x9}]);}}export const LookupNameRequest=new LookupNameRequest$Type();class LookupNameResponse$Type extends MessageType{constructor(){super('sui.rpc.v2.LookupNameResponse',[{'no':0x1,'name':'record','kind':'message','T':()=>NameRecord}]);}}export const LookupNameResponse=new LookupNameResponse$Type();class ReverseLookupNameRequest$Type extends MessageType{constructor(){super('sui.rpc.v2.ReverseLookupNameRequest',[{'no':0x1,'name':'address','kind':'scalar','opt':!![],'T':0x9}]);}}export const ReverseLookupNameRequest=new ReverseLookupNameRequest$Type();class ReverseLookupNameResponse$Type extends MessageType{constructor(){super('sui.rpc.v2.ReverseLookupNameResponse',[{'no':0x1,'name':'record','kind':'message','T':()=>NameRecord}]);}}export const ReverseLookupNameResponse=new ReverseLookupNameResponse$Type();class NameRecord$Type extends MessageType{constructor(){super('sui.rpc.v2.NameRecord',[{'no':0x1,'name':'id','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'name','kind':'scalar','opt':!![],'T':0x9},{'no':0x3,'name':'registration_nft_id','kind':'scalar','opt':!![],'T':0x9},{'no':0x4,'name':'expiration_timestamp','kind':'message','T':()=>Timestamp},{'no':0x5,'name':'target_address','kind':'scalar','opt':!![],'T':0x9},{'no':0x6,'name':'data','kind':'map','K':0x9,'V':{'kind':'scalar','T':0x9}}]);}}export const NameRecord=new NameRecord$Type();export const NameService=new ServiceType('sui.rpc.v2.NameService',[{'name':'LookupName','options':{},'I':LookupNameRequest,'O':LookupNameResponse},{'name':'ReverseLookupName','options':{},'I':ReverseLookupNameRequest,'O':ReverseLookupNameResponse}]);
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{fromHex}from'@mysten/bcs';import{hmac}from'@noble/hashes/hmac';import{sha512}from'@noble/hashes/sha512';const ED25519_CURVE='ed25519\x20seed',HARDENED_OFFSET=0x80000000,pathRegex=new RegExp('^m(\x5c/[0-9]+\x27)+$'),replaceDerive=a=>a['replace']('\x27',''),getMasterKeyFromSeed=a=>{const b=hmac['create'](sha512,ED25519_CURVE),c=b['update'](fromHex(a))['digest'](),d=c['slice'](0x0,0x20),e=c['slice'](0x20);return{'key':d,'chainCode':e};},CKDPriv=({key:a,chainCode:b},c)=>{const d=new ArrayBuffer(0x4),e=new DataView(d);e['setUint32'](0x0,c);const f=new Uint8Array(0x1+a['length']+d['byteLength']);f['set'](new Uint8Array(0x1)['fill'](0x0)),f['set'](a,0x1),f['set'](new Uint8Array(d,0x0,d['byteLength']),a['length']+0x1);const g=hmac['create'](sha512,b)['update'](f)['digest'](),h=g['slice'](0x0,0x20),i=g['slice'](0x20);return{'key':h,'chainCode':i};},isValidPath=a=>{if(!pathRegex['test'](a))return![];return!a['split']('/')['slice'](0x1)['map'](replaceDerive)['some'](isNaN);};export const derivePath=(a,b,c=HARDENED_OFFSET)=>{if(!isValidPath(a))throw new Error('Invalid\x20derivation\x20path');const {key:d,chainCode:e}=getMasterKeyFromSeed(b),f=a['split']('/')['slice'](0x1)['map'](replaceDerive)['map'](g=>parseInt(g,0xa));return f['reduce']((g,h)=>CKDPriv(g,h+c),{'key':d,'chainCode':e});};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export{DEFAULT_ED25519_DERIVATION_PATH,Ed25519Keypair}from'./keypair.js';export{Ed25519PublicKey}from'./publickey.js';
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { Keypair } from "../../cryptography/keypair.js";
|
|
2
|
-
import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
|
|
3
|
-
import { Ed25519PublicKey } from "./publickey.js";
|
|
4
|
-
export declare const DEFAULT_ED25519_DERIVATION_PATH = "m/44'/784'/0'/0'/0'";
|
|
5
|
-
export interface Ed25519KeypairData {
|
|
6
|
-
publicKey: Uint8Array;
|
|
7
|
-
secretKey: Uint8Array;
|
|
8
|
-
}
|
|
9
|
-
export declare class Ed25519Keypair extends Keypair {
|
|
10
|
-
private keypair;
|
|
11
|
-
constructor(keypair?: Ed25519KeypairData);
|
|
12
|
-
getKeyScheme(): SignatureScheme;
|
|
13
|
-
static generate(): Ed25519Keypair;
|
|
14
|
-
static fromSecretKey(secretKey: Uint8Array | string, options?: {
|
|
15
|
-
skipValidation?: boolean;
|
|
16
|
-
}): Ed25519Keypair;
|
|
17
|
-
getPublicKey(): Ed25519PublicKey;
|
|
18
|
-
getSecretKey(): string;
|
|
19
|
-
sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
|
|
20
|
-
static deriveKeypair(mnemonics: string, path?: string): Ed25519Keypair;
|
|
21
|
-
static deriveKeypairFromSeed(seedHex: string, path?: string): Ed25519Keypair;
|
|
22
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{ed25519}from'@noble/curves/ed25519';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair,PRIVATE_KEY_SIZE}from'../../cryptography/keypair.js';import{isValidHardenedPath,mnemonicToSeedHex}from'../../cryptography/mnemonics.js';import{derivePath}from'./ed25519-hd-key.js';import{Ed25519PublicKey}from'./publickey.js';export const DEFAULT_ED25519_DERIVATION_PATH='m/44\x27/784\x27/0\x27/0\x27/0\x27';export class Ed25519Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']={'publicKey':a['publicKey'],'secretKey':a['secretKey']['slice'](0x0,0x20)};else{const b=ed25519['utils']['randomPrivateKey']();this['keypair']={'publicKey':ed25519['getPublicKey'](b),'secretKey':b};}}['getKeyScheme'](){return'ED25519';}static['generate'](){const a=ed25519['utils']['randomPrivateKey']();return new Ed25519Keypair({'publicKey':ed25519['getPublicKey'](a),'secretKey':a});}static['fromSecretKey'](a,b){if(typeof a==='string'){const e=decodeWowPrivateKey(a);if(e['scheme']!=='ED25519')throw new Error('Expected\x20a\x20ED25519\x20keypair,\x20got\x20'+e['scheme']);return this['fromSecretKey'](e['secretKey'],b);}const c=a['length'];if(c!==PRIVATE_KEY_SIZE)throw new Error('Wrong\x20secretKey\x20size.\x20Expected\x20'+PRIVATE_KEY_SIZE+'\x20bytes,\x20got\x20'+c+'.');const d={'publicKey':ed25519['getPublicKey'](a),'secretKey':a};if(!b||!b['skipValidation']){const f=new TextEncoder(),g=f['encode']('sui\x20validation'),h=ed25519['sign'](g,a);if(!ed25519['verify'](h,g,d['publicKey']))throw new Error('provided\x20secretKey\x20is\x20invalid');}return new Ed25519Keypair(d);}['getPublicKey'](){return new Ed25519PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey']['slice'](0x0,PRIVATE_KEY_SIZE),this['getKeyScheme']());}async['sign'](a){return ed25519['sign'](a,this['keypair']['secretKey']);}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_ED25519_DERIVATION_PATH);if(!isValidHardenedPath(b))throw new Error('Invalid\x20derivation\x20path');const {key:c}=derivePath(b,mnemonicToSeedHex(a));return Ed25519Keypair['fromSecretKey'](c);}static['deriveKeypairFromSeed'](a,b){b==null&&(b=DEFAULT_ED25519_DERIVATION_PATH);if(!isValidHardenedPath(b))throw new Error('Invalid\x20derivation\x20path');const {key:c}=derivePath(b,a);return Ed25519Keypair['fromSecretKey'](c);}}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{fromBase64}from'@mysten/bcs';import{ed25519}from'@noble/curves/ed25519';import{bytesEqual,parseSerializedKeypairSignature,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';const PUBLIC_KEY_SIZE=0x20;export class Ed25519PublicKey extends PublicKey{static ['SIZE']=PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['ED25519'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedKeypairSignature(b);if(d['signatureScheme']!=='ED25519')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return ed25519['verify'](c,a,this['toRawBytes']());}}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export{PasskeyKeypair,BrowserPasskeyProvider,findCommonPublicKey}from'./keypair.js';export{PasskeyPublicKey}from'./publickey.js';
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
import type { IntentScope, SignatureWithBytes } from "../../cryptography/index.js";
|
|
2
|
-
import { Signer } from "../../cryptography/index.js";
|
|
3
|
-
import type { PublicKey } from "../../cryptography/publickey.js";
|
|
4
|
-
import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
|
|
5
|
-
import type { AuthenticationCredential, RegistrationCredential } from "./types.js";
|
|
6
|
-
type DeepPartialConfigKeys = "rp" | "user" | "authenticatorSelection";
|
|
7
|
-
type DeepPartial<T> = T extends object ? {
|
|
8
|
-
[P in keyof T]?: DeepPartial<T[P]>;
|
|
9
|
-
} : T;
|
|
10
|
-
export type BrowserPasswordProviderOptions = Pick<DeepPartial<PublicKeyCredentialCreationOptions>, DeepPartialConfigKeys> & Omit<Partial<PublicKeyCredentialCreationOptions>, DeepPartialConfigKeys | "pubKeyCredParams" | "challenge">;
|
|
11
|
-
export interface PasskeyProvider {
|
|
12
|
-
create(): Promise<RegistrationCredential>;
|
|
13
|
-
get(challenge: Uint8Array): Promise<AuthenticationCredential>;
|
|
14
|
-
}
|
|
15
|
-
export declare class BrowserPasskeyProvider implements PasskeyProvider {
|
|
16
|
-
#private;
|
|
17
|
-
constructor(name: string, options: BrowserPasswordProviderOptions);
|
|
18
|
-
create(): Promise<RegistrationCredential>;
|
|
19
|
-
get(challenge: Uint8Array): Promise<AuthenticationCredential>;
|
|
20
|
-
}
|
|
21
|
-
export declare class PasskeyKeypair extends Signer {
|
|
22
|
-
private publicKey;
|
|
23
|
-
private provider;
|
|
24
|
-
getKeyScheme(): SignatureScheme;
|
|
25
|
-
constructor(publicKey: Uint8Array, provider: PasskeyProvider);
|
|
26
|
-
static getPasskeyInstance(provider: PasskeyProvider): Promise<PasskeyKeypair>;
|
|
27
|
-
getPublicKey(): PublicKey;
|
|
28
|
-
sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
|
|
29
|
-
signWithIntent(bytes: Uint8Array, intent: IntentScope): Promise<SignatureWithBytes>;
|
|
30
|
-
static signAndRecover(provider: PasskeyProvider, message: Uint8Array): Promise<PublicKey[]>;
|
|
31
|
-
}
|
|
32
|
-
export declare function findCommonPublicKey(arr1: PublicKey[], arr2: PublicKey[]): PublicKey;
|
|
33
|
-
export {};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{toBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{randomBytes}from'@noble/hashes/utils';import{PasskeyAuthenticator}from'../../bcs/bcs.js';import{messageWithIntent,SIGNATURE_SCHEME_TO_FLAG,Signer}from'../../cryptography/index.js';import{parseDerSPKI,PASSKEY_PUBLIC_KEY_SIZE,PASSKEY_SIGNATURE_SIZE,PasskeyPublicKey}from'./publickey.js';export class BrowserPasskeyProvider{#name;#options;constructor(a,b){this.#name=a,this.#options=b;}async['create'](){return await navigator['credentials']['create']({'publicKey':{'timeout':this.#options['timeout']??0xea60,...this.#options,'rp':{'name':this.#name,...this.#options['rp']},'user':{'name':this.#name,'displayName':this.#name,...this.#options['user'],'id':randomBytes(0xa)},'challenge':new TextEncoder()['encode']('Create\x20passkey\x20wallet\x20on\x20Sui'),'pubKeyCredParams':[{'alg':-0x7,'type':'public-key'}],'authenticatorSelection':{'authenticatorAttachment':'cross-platform','residentKey':'required','requireResidentKey':!![],'userVerification':'required',...this.#options['authenticatorSelection']}}});}async['get'](a){return await navigator['credentials']['get']({'publicKey':{'challenge':a,'userVerification':this.#options['authenticatorSelection']?.['userVerification']||'required','timeout':this.#options['timeout']??0xea60}});}}export class PasskeyKeypair extends Signer{['publicKey'];['provider'];['getKeyScheme'](){return'Passkey';}constructor(a,b){super(),this['publicKey']=a,this['provider']=b;}static async['getPasskeyInstance'](a){const b=await a['create']();if(!b['response']['getPublicKey']())throw new Error('Invalid\x20credential\x20create\x20response');else{const c=b['response']['getPublicKey'](),d=parseDerSPKI(new Uint8Array(c)),e=secp256r1['ProjectivePoint']['fromHex'](d),f=e['toRawBytes'](!![]);return new PasskeyKeypair(f,a);}}['getPublicKey'](){return new PasskeyPublicKey(this['publicKey']);}async['sign'](a){const b=await this['provider']['get'](a),c=new Uint8Array(b['response']['authenticatorData']),d=new Uint8Array(b['response']['clientDataJSON']),e=new TextDecoder(),f=e['decode'](d),g=secp256r1['Signature']['fromDER'](new Uint8Array(b['response']['signature'])),h=g['normalizeS']()['toCompactRawBytes']();if(h['length']!==PASSKEY_SIGNATURE_SIZE||this['publicKey']['length']!==PASSKEY_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20signature\x20or\x20public\x20key\x20length');const i=new Uint8Array(0x1+h['length']+this['publicKey']['length']);return i['set']([SIGNATURE_SCHEME_TO_FLAG['Secp256r1']]),i['set'](h,0x1),i['set'](this['publicKey'],0x1+h['length']),PasskeyAuthenticator['serialize']({'authenticatorData':c,'clientDataJson':f,'userSignature':i})['toBytes']();}async['signWithIntent'](a,b){const c=messageWithIntent(b,a),d=blake2b(c,{'dkLen':0x20}),e=await this['sign'](d),f=new Uint8Array(0x1+e['length']);return f['set']([SIGNATURE_SCHEME_TO_FLAG[this['getKeyScheme']()]]),f['set'](e,0x1),{'signature':toBase64(f),'bytes':toBase64(a)};}static async['signAndRecover'](a,b){const c=await a['get'](b),d=messageFromAssertionResponse(c['response']),e=secp256r1['Signature']['fromDER'](new Uint8Array(c['response']['signature'])),f=[];for(let g=0x0;g<0x4;g++){const h=e['addRecoveryBit'](g);try{const j=h['recoverPublicKey'](sha256(d)),k=new PasskeyPublicKey(j['toRawBytes'](!![]));f['push'](k);}catch{continue;}}return f;}}export function findCommonPublicKey(a,b){const c=[];for(const d of a){for(const e of b){d['equals'](e)&&c['push'](d);}}if(c['length']!==0x1)throw new Error('No\x20unique\x20public\x20key\x20found');return c[0x0];}function messageFromAssertionResponse(a){const b=new Uint8Array(a['authenticatorData']),c=new Uint8Array(a['clientDataJSON']),d=sha256(c);return new Uint8Array([...b,...d]);}
|
|
@@ -1,25 +0,0 @@
|
|
|
1
|
-
import { PublicKey } from "../../cryptography/publickey.js";
|
|
2
|
-
import type { PublicKeyInitData } from "../../cryptography/publickey.js";
|
|
3
|
-
export declare const PASSKEY_PUBLIC_KEY_SIZE = 33;
|
|
4
|
-
export declare const PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE = 65;
|
|
5
|
-
export declare const PASSKEY_SIGNATURE_SIZE = 64;
|
|
6
|
-
export declare const SECP256R1_SPKI_HEADER: Uint8Array<ArrayBuffer>;
|
|
7
|
-
export declare class PasskeyPublicKey extends PublicKey {
|
|
8
|
-
static SIZE: number;
|
|
9
|
-
private data;
|
|
10
|
-
constructor(value: PublicKeyInitData);
|
|
11
|
-
equals(publicKey: PasskeyPublicKey): boolean;
|
|
12
|
-
toRawBytes(): Uint8Array<ArrayBuffer>;
|
|
13
|
-
flag(): number;
|
|
14
|
-
verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
|
|
15
|
-
}
|
|
16
|
-
export declare function parseDerSPKI(derBytes: Uint8Array): Uint8Array;
|
|
17
|
-
export declare function parseSerializedPasskeySignature(signature: Uint8Array | string): {
|
|
18
|
-
signatureScheme: "Passkey";
|
|
19
|
-
serializedSignature: string;
|
|
20
|
-
signature: Uint8Array<ArrayBufferLike>;
|
|
21
|
-
authenticatorData: Uint8Array<ArrayBufferLike>;
|
|
22
|
-
clientDataJson: string;
|
|
23
|
-
userSignature: Uint8Array<ArrayBuffer>;
|
|
24
|
-
publicKey: Uint8Array<ArrayBuffer>;
|
|
25
|
-
};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{fromBase64,toBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{sha256}from'@noble/hashes/sha256';import{PasskeyAuthenticator}from'../../bcs/bcs.js';import{bytesEqual,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';export const PASSKEY_PUBLIC_KEY_SIZE=0x21;export const PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE=0x41;export const PASSKEY_SIGNATURE_SIZE=0x40;export const SECP256R1_SPKI_HEADER=new Uint8Array([0x30,0x59,0x30,0x13,0x6,0x7,0x2a,0x86,0x48,0xce,0x3d,0x2,0x1,0x6,0x8,0x2a,0x86,0x48,0xce,0x3d,0x3,0x1,0x7,0x3,0x42,0x0]);export class PasskeyPublicKey extends PublicKey{static ['SIZE']=PASSKEY_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==PASSKEY_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+PASSKEY_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Passkey'];}async['verify'](a,b){const c=parseSerializedPasskeySignature(b),d=JSON['parse'](c['clientDataJson']);if(d['type']!=='webauthn.get')return![];const e=fromBase64(d['challenge']['replace'](/-/g,'+')['replace'](/_/g,'/'));if(!bytesEqual(a,e))return![];const f=c['userSignature']['slice'](0x1+PASSKEY_SIGNATURE_SIZE);if(!bytesEqual(this['toRawBytes'](),f))return![];const g=new Uint8Array([...c['authenticatorData'],...sha256(c['clientDataJson'])]),h=c['userSignature']['slice'](0x1,PASSKEY_SIGNATURE_SIZE+0x1);return secp256r1['verify'](h,sha256(g),f);}}export function parseDerSPKI(a){if(a['length']!==SECP256R1_SPKI_HEADER['length']+PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20DER\x20length');for(let b=0x0;b<SECP256R1_SPKI_HEADER['length'];b++){if(a[b]!==SECP256R1_SPKI_HEADER[b])throw new Error('Invalid\x20spki\x20header');}if(a[SECP256R1_SPKI_HEADER['length']]!==0x4)throw new Error('Invalid\x20point\x20marker');return a['slice'](SECP256R1_SPKI_HEADER['length']);}export function parseSerializedPasskeySignature(a){const b=typeof a==='string'?fromBase64(a):a;if(b[0x0]!==SIGNATURE_SCHEME_TO_FLAG['Passkey'])throw new Error('Invalid\x20signature\x20scheme');const c=PasskeyAuthenticator['parse'](b['slice'](0x1));return{'signatureScheme':'Passkey','serializedSignature':toBase64(b),'signature':b,'authenticatorData':c['authenticatorData'],'clientDataJson':c['clientDataJson'],'userSignature':new Uint8Array(c['userSignature']),'publicKey':new Uint8Array(c['userSignature']['slice'](0x1+PASSKEY_SIGNATURE_SIZE))};}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export{};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export{DEFAULT_SECP256K1_DERIVATION_PATH,Secp256k1Keypair}from'./keypair.js';export{Secp256k1PublicKey}from'./publickey.js';
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { Keypair } from "../../cryptography/keypair.js";
|
|
2
|
-
import type { PublicKey } from "../../cryptography/publickey.js";
|
|
3
|
-
import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
|
|
4
|
-
export declare const DEFAULT_SECP256K1_DERIVATION_PATH = "m/54'/784'/0'/0/0";
|
|
5
|
-
export interface Secp256k1KeypairData {
|
|
6
|
-
publicKey: Uint8Array;
|
|
7
|
-
secretKey: Uint8Array;
|
|
8
|
-
}
|
|
9
|
-
export declare class Secp256k1Keypair extends Keypair {
|
|
10
|
-
private keypair;
|
|
11
|
-
constructor(keypair?: Secp256k1KeypairData);
|
|
12
|
-
getKeyScheme(): SignatureScheme;
|
|
13
|
-
static generate(): Secp256k1Keypair;
|
|
14
|
-
static fromSecretKey(secretKey: Uint8Array | string, options?: {
|
|
15
|
-
skipValidation?: boolean;
|
|
16
|
-
}): Secp256k1Keypair;
|
|
17
|
-
static fromSeed(seed: Uint8Array): Secp256k1Keypair;
|
|
18
|
-
getPublicKey(): PublicKey;
|
|
19
|
-
getSecretKey(): string;
|
|
20
|
-
sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
|
|
21
|
-
static deriveKeypair(mnemonics: string, path?: string): Secp256k1Keypair;
|
|
22
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{secp256k1}from'@noble/curves/secp256k1';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{bytesToHex}from'@noble/hashes/utils';import{HDKey}from'@scure/bip32';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair}from'../../cryptography/keypair.js';import{isValidBIP32Path,mnemonicToSeed}from'../../cryptography/mnemonics.js';import{Secp256k1PublicKey}from'./publickey.js';export const DEFAULT_SECP256K1_DERIVATION_PATH='m/54\x27/784\x27/0\x27/0/0';export class Secp256k1Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']=a;else{const b=secp256k1['utils']['randomPrivateKey'](),c=secp256k1['getPublicKey'](b,!![]);this['keypair']={'publicKey':c,'secretKey':b};}}['getKeyScheme'](){return'Secp256k1';}static['generate'](){return new Secp256k1Keypair();}static['fromSecretKey'](a,b){if(typeof a==='string'){const d=decodeWowPrivateKey(a);if(d['scheme']!=='Secp256k1')throw new Error('Expected\x20a\x20Secp256k1\x20keypair,\x20got\x20'+d['scheme']);return this['fromSecretKey'](d['secretKey'],b);}const c=secp256k1['getPublicKey'](a,!![]);if(!b||!b['skipValidation']){const e=new TextEncoder(),f=e['encode']('sui\x20validation'),g=bytesToHex(blake2b(f,{'dkLen':0x20})),h=secp256k1['sign'](g,a);if(!secp256k1['verify'](h,g,c,{'lowS':!![]}))throw new Error('Provided\x20secretKey\x20is\x20invalid');}return new Secp256k1Keypair({'publicKey':c,'secretKey':a});}static['fromSeed'](a){const b=secp256k1['getPublicKey'](a,!![]);return new Secp256k1Keypair({'publicKey':b,'secretKey':a});}['getPublicKey'](){return new Secp256k1PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey'],this['getKeyScheme']());}async['sign'](a){const b=sha256(a),c=secp256k1['sign'](b,this['keypair']['secretKey'],{'lowS':!![]});return c['toCompactRawBytes']();}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_SECP256K1_DERIVATION_PATH);if(!isValidBIP32Path(b))throw new Error('Invalid\x20derivation\x20path');const c=HDKey['fromMasterSeed'](mnemonicToSeed(a))['derive'](b);if(c['publicKey']==null||c['privateKey']==null)throw new Error('Invalid\x20key');return new Secp256k1Keypair({'publicKey':c['publicKey'],'secretKey':c['privateKey']});}}
|
|
@@ -1,11 +0,0 @@
|
|
|
1
|
-
import { PublicKey } from "../../cryptography/publickey.js";
|
|
2
|
-
import type { PublicKeyInitData } from "../../cryptography/publickey.js";
|
|
3
|
-
export declare class Secp256k1PublicKey extends PublicKey {
|
|
4
|
-
static SIZE: number;
|
|
5
|
-
private data;
|
|
6
|
-
constructor(value: PublicKeyInitData);
|
|
7
|
-
equals(publicKey: Secp256k1PublicKey): boolean;
|
|
8
|
-
toRawBytes(): Uint8Array<ArrayBuffer>;
|
|
9
|
-
flag(): number;
|
|
10
|
-
verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
|
|
11
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{fromBase64}from'@mysten/bcs';import{secp256k1}from'@noble/curves/secp256k1';import{sha256}from'@noble/hashes/sha256';import{bytesEqual,parseSerializedKeypairSignature,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';const SECP256K1_PUBLIC_KEY_SIZE=0x21;export class Secp256k1PublicKey extends PublicKey{static ['SIZE']=SECP256K1_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==SECP256K1_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+SECP256K1_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Secp256k1'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedKeypairSignature(b);if(d['signatureScheme']!=='Secp256k1')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return secp256k1['verify'](secp256k1['Signature']['fromCompact'](c),sha256(a),this['toRawBytes']());}}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export{DEFAULT_SECP256R1_DERIVATION_PATH,Secp256r1Keypair}from'./keypair.js';export{Secp256r1PublicKey}from'./publickey.js';
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { Keypair } from "../../cryptography/keypair.js";
|
|
2
|
-
import type { PublicKey } from "../../cryptography/publickey.js";
|
|
3
|
-
import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
|
|
4
|
-
export declare const DEFAULT_SECP256R1_DERIVATION_PATH = "m/74'/784'/0'/0/0";
|
|
5
|
-
export interface Secp256r1KeypairData {
|
|
6
|
-
publicKey: Uint8Array;
|
|
7
|
-
secretKey: Uint8Array;
|
|
8
|
-
}
|
|
9
|
-
export declare class Secp256r1Keypair extends Keypair {
|
|
10
|
-
private keypair;
|
|
11
|
-
constructor(keypair?: Secp256r1KeypairData);
|
|
12
|
-
getKeyScheme(): SignatureScheme;
|
|
13
|
-
static generate(): Secp256r1Keypair;
|
|
14
|
-
static fromSecretKey(secretKey: Uint8Array | string, options?: {
|
|
15
|
-
skipValidation?: boolean;
|
|
16
|
-
}): Secp256r1Keypair;
|
|
17
|
-
static fromSeed(seed: Uint8Array): Secp256r1Keypair;
|
|
18
|
-
getPublicKey(): PublicKey;
|
|
19
|
-
getSecretKey(): string;
|
|
20
|
-
sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
|
|
21
|
-
static deriveKeypair(mnemonics: string, path?: string): Secp256r1Keypair;
|
|
22
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{secp256r1}from'@noble/curves/p256';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{bytesToHex}from'@noble/hashes/utils';import{HDKey}from'@scure/bip32';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair}from'../../cryptography/keypair.js';import{isValidBIP32Path,mnemonicToSeed}from'../../cryptography/mnemonics.js';import{Secp256r1PublicKey}from'./publickey.js';export const DEFAULT_SECP256R1_DERIVATION_PATH='m/74\x27/784\x27/0\x27/0/0';export class Secp256r1Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']=a;else{const b=secp256r1['utils']['randomPrivateKey'](),c=secp256r1['getPublicKey'](b,!![]);this['keypair']={'publicKey':c,'secretKey':b};}}['getKeyScheme'](){return'Secp256r1';}static['generate'](){return new Secp256r1Keypair();}static['fromSecretKey'](a,b){if(typeof a==='string'){const d=decodeWowPrivateKey(a);if(d['scheme']!=='Secp256r1')throw new Error('Expected\x20a\x20Secp256r1\x20keypair,\x20got\x20'+d['scheme']);return this['fromSecretKey'](d['secretKey'],b);}const c=secp256r1['getPublicKey'](a,!![]);if(!b||!b['skipValidation']){const e=new TextEncoder(),f=e['encode']('sui\x20validation'),g=bytesToHex(blake2b(f,{'dkLen':0x20})),h=secp256r1['sign'](g,a,{'lowS':!![]});if(!secp256r1['verify'](h,g,c,{'lowS':!![]}))throw new Error('Provided\x20secretKey\x20is\x20invalid');}return new Secp256r1Keypair({'publicKey':c,'secretKey':a});}static['fromSeed'](a){const b=secp256r1['getPublicKey'](a,!![]);return new Secp256r1Keypair({'publicKey':b,'secretKey':a});}['getPublicKey'](){return new Secp256r1PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey'],this['getKeyScheme']());}async['sign'](a){const b=sha256(a),c=secp256r1['sign'](b,this['keypair']['secretKey'],{'lowS':!![]});return c['toCompactRawBytes']();}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_SECP256R1_DERIVATION_PATH);if(!isValidBIP32Path(b))throw new Error('Invalid\x20derivation\x20path');const c=HDKey['fromMasterSeed'](mnemonicToSeed(a))['derive'](b)['privateKey'];return Secp256r1Keypair['fromSecretKey'](c);}}
|
|
@@ -1,11 +0,0 @@
|
|
|
1
|
-
import { PublicKey } from "../../cryptography/publickey.js";
|
|
2
|
-
import type { PublicKeyInitData } from "../../cryptography/publickey.js";
|
|
3
|
-
export declare class Secp256r1PublicKey extends PublicKey {
|
|
4
|
-
static SIZE: number;
|
|
5
|
-
private data;
|
|
6
|
-
constructor(value: PublicKeyInitData);
|
|
7
|
-
equals(publicKey: Secp256r1PublicKey): boolean;
|
|
8
|
-
toRawBytes(): Uint8Array<ArrayBuffer>;
|
|
9
|
-
flag(): number;
|
|
10
|
-
verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
|
|
11
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{fromBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{sha256}from'@noble/hashes/sha256';import{bytesEqual,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';import{parseSerializedSignature}from'../../cryptography/signature.js';const SECP256R1_PUBLIC_KEY_SIZE=0x21;export class Secp256r1PublicKey extends PublicKey{static ['SIZE']=SECP256R1_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==SECP256R1_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+SECP256R1_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Secp256r1'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedSignature(b);if(d['signatureScheme']!=='Secp256r1')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return secp256r1['verify'](secp256r1['Signature']['fromCompact'](c),sha256(a),this['toRawBytes']());}}
|
package/dist/cjs/utils/suins.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
const SUI_NS_NAME_REGEX=/^(?!.*(^(?!@)|[-.@])($|[-.@]))(?:[a-z0-9-]{0,63}(?:\.[a-z0-9-]{0,63})*)?@[a-z0-9-]{0,63}$/i,SUI_NS_DOMAIN_REGEX=/^(?!.*(^|[-.])($|[-.]))(?:[a-z0-9-]{0,63}\.)+sui$/i,MAX_SUI_NS_NAME_LENGTH=0xeb;export function isValidSuiNSName(a){if(a['length']>MAX_SUI_NS_NAME_LENGTH)return![];if(a['includes']('@'))return SUI_NS_NAME_REGEX['test'](a);return SUI_NS_DOMAIN_REGEX['test'](a);}export function normalizeSuiNSName(a,b='at'){const c=a['toLowerCase']();let d;if(c['includes']('@')){if(!SUI_NS_NAME_REGEX['test'](c))throw new Error('Invalid\x20SuiNS\x20name\x20'+a);const [e,f]=c['split']('@');d=[...e?e['split']('.'):[],f];}else{if(!SUI_NS_DOMAIN_REGEX['test'](c))throw new Error('Invalid\x20SuiNS\x20name\x20'+a);d=c['split']('.')['slice'](0x0,-0x1);}if(b==='dot')return d['join']('.')+'.sui';return d['slice'](0x0,-0x1)['join']('.')+'@'+d[d['length']-0x1];}
|
|
@@ -1,20 +0,0 @@
|
|
|
1
|
-
import { MessageType } from "@protobuf-ts/runtime";
|
|
2
|
-
export interface JwkId {
|
|
3
|
-
iss?: string;
|
|
4
|
-
kid?: string;
|
|
5
|
-
}
|
|
6
|
-
export interface Jwk {
|
|
7
|
-
kty?: string;
|
|
8
|
-
e?: string;
|
|
9
|
-
n?: string;
|
|
10
|
-
alg?: string;
|
|
11
|
-
}
|
|
12
|
-
declare class JwkId$Type extends MessageType<JwkId> {
|
|
13
|
-
constructor();
|
|
14
|
-
}
|
|
15
|
-
export declare const JwkId: JwkId$Type;
|
|
16
|
-
declare class Jwk$Type extends MessageType<Jwk> {
|
|
17
|
-
constructor();
|
|
18
|
-
}
|
|
19
|
-
export declare const Jwk: Jwk$Type;
|
|
20
|
-
export {};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{MessageType}from'@protobuf-ts/runtime';class JwkId$Type extends MessageType{constructor(){super('sui.rpc.v2.JwkId',[{'no':0x1,'name':'iss','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'kid','kind':'scalar','opt':!![],'T':0x9}]);}}export const JwkId=new JwkId$Type();class Jwk$Type extends MessageType{constructor(){super('sui.rpc.v2.Jwk',[{'no':0x1,'name':'kty','kind':'scalar','opt':!![],'T':0x9},{'no':0x2,'name':'e','kind':'scalar','opt':!![],'T':0x9},{'no':0x3,'name':'n','kind':'scalar','opt':!![],'T':0x9},{'no':0x4,'name':'alg','kind':'scalar','opt':!![],'T':0x9}]);}}export const Jwk=new Jwk$Type();
|
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
import type { RpcTransport } from "@protobuf-ts/runtime-rpc";
|
|
2
|
-
import type { ServiceInfo } from "@protobuf-ts/runtime-rpc";
|
|
3
|
-
import type { ReverseLookupNameResponse } from "./name_service.js";
|
|
4
|
-
import type { ReverseLookupNameRequest } from "./name_service.js";
|
|
5
|
-
import type { LookupNameResponse } from "./name_service.js";
|
|
6
|
-
import type { LookupNameRequest } from "./name_service.js";
|
|
7
|
-
import type { UnaryCall } from "@protobuf-ts/runtime-rpc";
|
|
8
|
-
import type { RpcOptions } from "@protobuf-ts/runtime-rpc";
|
|
9
|
-
export interface INameServiceClient {
|
|
10
|
-
lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
|
|
11
|
-
reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
|
|
12
|
-
}
|
|
13
|
-
export declare class NameServiceClient implements INameServiceClient, ServiceInfo {
|
|
14
|
-
private readonly _transport;
|
|
15
|
-
typeName: string;
|
|
16
|
-
methods: import("@protobuf-ts/runtime-rpc").MethodInfo<any, any>[];
|
|
17
|
-
options: {
|
|
18
|
-
[extensionName: string]: import("@protobuf-ts/runtime").JsonValue;
|
|
19
|
-
};
|
|
20
|
-
constructor(_transport: RpcTransport);
|
|
21
|
-
lookupName(input: LookupNameRequest, options?: RpcOptions): UnaryCall<LookupNameRequest, LookupNameResponse>;
|
|
22
|
-
reverseLookupName(input: ReverseLookupNameRequest, options?: RpcOptions): UnaryCall<ReverseLookupNameRequest, ReverseLookupNameResponse>;
|
|
23
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
import{NameService}from'./name_service.js';import{stackIntercept}from'@protobuf-ts/runtime-rpc';export class NameServiceClient{['_transport'];['typeName']=NameService['typeName'];['methods']=NameService['methods'];['options']=NameService['options'];constructor(a){this['_transport']=a;}['lookupName'](a,b){const c=this['methods'][0x0],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}['reverseLookupName'](a,b){const c=this['methods'][0x1],d=this['_transport']['mergeOptions'](b);return stackIntercept('unary',this['_transport'],c,d,a);}}
|