wowok 2.2.3 → 2.2.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (427) hide show
  1. package/dist/cjs/_deps/bcs/bcs-type.d.ts +127 -0
  2. package/dist/cjs/_deps/bcs/bcs-type.js +1 -0
  3. package/dist/cjs/_deps/bcs/bcs.d.ts +49 -0
  4. package/dist/cjs/_deps/bcs/bcs.js +1 -0
  5. package/dist/cjs/_deps/bcs/index.d.ts +16 -0
  6. package/dist/cjs/_deps/bcs/index.js +1 -0
  7. package/dist/cjs/_deps/bcs/reader.d.ts +15 -0
  8. package/dist/cjs/_deps/bcs/reader.js +1 -0
  9. package/dist/cjs/_deps/bcs/types.d.ts +24 -0
  10. package/dist/cjs/_deps/bcs/uleb.d.ts +5 -0
  11. package/dist/cjs/_deps/bcs/uleb.js +1 -0
  12. package/dist/cjs/_deps/bcs/utils.d.ts +4 -0
  13. package/dist/cjs/_deps/bcs/utils.js +1 -0
  14. package/dist/cjs/_deps/bcs/writer.d.ts +28 -0
  15. package/dist/cjs/_deps/bcs/writer.js +1 -0
  16. package/dist/cjs/_deps/utils/b58.d.ts +2 -0
  17. package/dist/cjs/_deps/utils/b58.js +1 -0
  18. package/dist/cjs/_deps/utils/b64.d.ts +2 -0
  19. package/dist/cjs/_deps/utils/b64.js +1 -0
  20. package/dist/cjs/_deps/utils/chunk.d.ts +1 -0
  21. package/dist/cjs/_deps/utils/chunk.js +1 -0
  22. package/dist/cjs/_deps/utils/dataloader.d.ts +43 -0
  23. package/dist/cjs/_deps/utils/dataloader.js +1 -0
  24. package/dist/cjs/_deps/utils/hex.d.ts +2 -0
  25. package/dist/cjs/_deps/utils/hex.js +1 -0
  26. package/dist/cjs/_deps/utils/index.d.ts +7 -0
  27. package/dist/cjs/_deps/utils/index.js +1 -0
  28. package/dist/cjs/_deps/utils/types.d.ts +4 -0
  29. package/dist/cjs/_deps/utils/with-resolver.d.ts +6 -0
  30. package/dist/cjs/_deps/utils/with-resolver.js +1 -0
  31. package/dist/cjs/bcs/bcs.d.ts +275 -313
  32. package/dist/cjs/bcs/bcs.js +1 -1
  33. package/dist/cjs/bcs/effects.d.ts +193 -193
  34. package/dist/cjs/bcs/effects.js +1 -1
  35. package/dist/cjs/bcs/index.d.ts +1 -1
  36. package/dist/cjs/bcs/index.js +1 -1
  37. package/dist/cjs/bcs/pure.d.ts +1 -1
  38. package/dist/cjs/bcs/pure.js +1 -1
  39. package/dist/cjs/bcs/type-tag-serializer.js +1 -1
  40. package/dist/cjs/cryptography/index.d.ts +1 -1
  41. package/dist/cjs/cryptography/index.js +1 -1
  42. package/dist/cjs/cryptography/intent.js +1 -1
  43. package/dist/cjs/cryptography/keypair.d.ts +2 -2
  44. package/dist/cjs/cryptography/keypair.js +1 -1
  45. package/dist/cjs/cryptography/mnemonics.js +1 -1
  46. package/dist/cjs/cryptography/publickey.d.ts +1 -1
  47. package/dist/cjs/cryptography/publickey.js +1 -1
  48. package/dist/cjs/cryptography/signature-scheme.d.ts +4 -15
  49. package/dist/cjs/cryptography/signature-scheme.js +1 -1
  50. package/dist/cjs/cryptography/signature.d.ts +1 -9
  51. package/dist/cjs/cryptography/signature.js +1 -1
  52. package/dist/cjs/experimental/client.d.ts +1 -1
  53. package/dist/cjs/grpc/client.d.ts +0 -2
  54. package/dist/cjs/grpc/client.js +1 -1
  55. package/dist/cjs/grpc/core.js +1 -1
  56. package/dist/cjs/grpc/proto/google/protobuf/any.d.ts +7 -0
  57. package/dist/cjs/grpc/proto/google/protobuf/any.js +1 -1
  58. package/dist/cjs/grpc/proto/google/protobuf/duration.d.ts +8 -0
  59. package/dist/cjs/grpc/proto/google/protobuf/duration.js +1 -1
  60. package/dist/cjs/grpc/proto/google/protobuf/empty.d.ts +8 -0
  61. package/dist/cjs/grpc/proto/google/protobuf/empty.js +1 -1
  62. package/dist/cjs/grpc/proto/google/protobuf/field_mask.d.ts +8 -0
  63. package/dist/cjs/grpc/proto/google/protobuf/field_mask.js +1 -1
  64. package/dist/cjs/grpc/proto/google/protobuf/struct.d.ts +15 -0
  65. package/dist/cjs/grpc/proto/google/protobuf/struct.js +1 -1
  66. package/dist/cjs/grpc/proto/google/protobuf/timestamp.d.ts +8 -0
  67. package/dist/cjs/grpc/proto/google/protobuf/timestamp.js +1 -1
  68. package/dist/cjs/grpc/proto/google/rpc/error_details.d.ts +48 -0
  69. package/dist/cjs/grpc/proto/google/rpc/error_details.js +1 -1
  70. package/dist/cjs/grpc/proto/google/rpc/status.d.ts +8 -0
  71. package/dist/cjs/grpc/proto/google/rpc/status.js +1 -1
  72. package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint.js +1 -1
  73. package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint_contents.js +1 -1
  74. package/dist/cjs/grpc/proto/sui/rpc/v2/checkpoint_summary.js +1 -1
  75. package/dist/cjs/grpc/proto/sui/rpc/v2/effects.js +1 -1
  76. package/dist/cjs/grpc/proto/sui/rpc/v2/event.js +1 -1
  77. package/dist/cjs/grpc/proto/sui/rpc/v2/executed_transaction.js +1 -1
  78. package/dist/cjs/grpc/proto/sui/rpc/v2/execution_status.d.ts +2 -2
  79. package/dist/cjs/grpc/proto/sui/rpc/v2/execution_status.js +1 -1
  80. package/dist/cjs/grpc/proto/sui/rpc/v2/ledger_service.js +1 -1
  81. package/dist/cjs/grpc/proto/sui/rpc/v2/move_package.js +1 -1
  82. package/dist/cjs/grpc/proto/sui/rpc/v2/move_package_service.js +1 -1
  83. package/dist/cjs/grpc/proto/sui/rpc/v2/object.js +1 -1
  84. package/dist/cjs/grpc/proto/sui/rpc/v2/signature.d.ts +9 -87
  85. package/dist/cjs/grpc/proto/sui/rpc/v2/signature.js +1 -1
  86. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_scheme.d.ts +2 -6
  87. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_scheme.js +1 -1
  88. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_verification_service.d.ts +0 -2
  89. package/dist/cjs/grpc/proto/sui/rpc/v2/signature_verification_service.js +1 -1
  90. package/dist/cjs/grpc/proto/sui/rpc/v2/state_service.js +1 -1
  91. package/dist/cjs/grpc/proto/sui/rpc/v2/system_state.d.ts +2 -2
  92. package/dist/cjs/grpc/proto/sui/rpc/v2/system_state.js +1 -1
  93. package/dist/cjs/grpc/proto/sui/rpc/v2/transaction.d.ts +13 -51
  94. package/dist/cjs/grpc/proto/sui/rpc/v2/transaction.js +1 -1
  95. package/dist/cjs/grpc/proto/sui/rpc/v2/transaction_execution_service.js +1 -1
  96. package/dist/cjs/index.d.ts +1 -1
  97. package/dist/cjs/index.js +1 -1
  98. package/dist/cjs/jsonRpc/client.js +1 -1
  99. package/dist/cjs/jsonRpc/core.js +1 -1
  100. package/dist/cjs/jsonRpc/json-rpc-resolver.js +1 -1
  101. package/dist/cjs/jsonRpc/types/chain.d.ts +0 -5
  102. package/dist/cjs/jsonRpc/types/generated.d.ts +5 -57
  103. package/dist/cjs/jsonRpc/types/params.d.ts +0 -17
  104. package/dist/cjs/keypairs/falcon512/index.d.ts +2 -0
  105. package/dist/cjs/keypairs/falcon512/index.js +1 -0
  106. package/dist/cjs/keypairs/falcon512/keypair.d.ts +19 -0
  107. package/dist/cjs/keypairs/falcon512/keypair.js +1 -0
  108. package/dist/{esm/keypairs/ed25519 → cjs/keypairs/falcon512}/publickey.d.ts +2 -2
  109. package/dist/cjs/keypairs/falcon512/publickey.js +1 -0
  110. package/dist/cjs/keypairs/index.d.ts +1 -4
  111. package/dist/cjs/keypairs/index.js +1 -1
  112. package/dist/cjs/multisig/publickey.js +1 -1
  113. package/dist/cjs/multisig/signer.js +1 -1
  114. package/dist/cjs/transactions/Commands.js +1 -1
  115. package/dist/cjs/transactions/Inputs.d.ts +1 -1
  116. package/dist/cjs/transactions/Inputs.js +1 -1
  117. package/dist/cjs/transactions/Transaction.d.ts +5 -5
  118. package/dist/cjs/transactions/Transaction.js +1 -1
  119. package/dist/cjs/transactions/TransactionData.js +1 -1
  120. package/dist/cjs/transactions/__tests__/Transaction.test.js +1 -1
  121. package/dist/cjs/transactions/__tests__/bcs.test.js +1 -1
  122. package/dist/cjs/transactions/data/internal.d.ts +2 -2
  123. package/dist/cjs/transactions/data/v1.d.ts +2 -2
  124. package/dist/cjs/transactions/data/v1.js +1 -1
  125. package/dist/cjs/transactions/data/v2.d.ts +1 -1
  126. package/dist/cjs/transactions/executor/parallel.js +1 -1
  127. package/dist/cjs/transactions/executor/serial.js +1 -1
  128. package/dist/cjs/transactions/pure.d.ts +1 -1
  129. package/dist/cjs/transactions/pure.js +1 -1
  130. package/dist/cjs/transactions/serializer.d.ts +1 -1
  131. package/dist/cjs/utils/dynamic-fields.js +1 -1
  132. package/dist/cjs/utils/index.d.ts +1 -1
  133. package/dist/cjs/utils/index.js +1 -1
  134. package/dist/cjs/utils/move-registry.js +1 -1
  135. package/dist/cjs/utils/sui-types.js +1 -1
  136. package/dist/cjs/verify/verify.js +1 -1
  137. package/dist/cjs/w/call/arbitration.js +1 -1
  138. package/dist/cjs/w/call/base.js +1 -1
  139. package/dist/cjs/w/call/contact.js +1 -1
  140. package/dist/cjs/w/call/demand.js +1 -1
  141. package/dist/cjs/w/call/guard.js +1 -1
  142. package/dist/cjs/w/call/machine.js +1 -1
  143. package/dist/cjs/w/call/personal.js +1 -1
  144. package/dist/cjs/w/call/proof.d.ts +3 -3
  145. package/dist/cjs/w/call/proof.js +1 -1
  146. package/dist/cjs/w/call/repository.js +1 -1
  147. package/dist/cjs/w/call/reward.js +1 -1
  148. package/dist/cjs/w/call/service.js +1 -1
  149. package/dist/cjs/w/call/treasury.js +1 -1
  150. package/dist/cjs/w/local/account.d.ts +11 -4
  151. package/dist/cjs/w/local/account.js +1 -1
  152. package/dist/cjs/w/local/storage.js +1 -1
  153. package/dist/cjs/w/local/util.js +1 -1
  154. package/dist/cjs/w/local/wip.d.ts +1 -1
  155. package/dist/cjs/w/local/wip.js +1 -1
  156. package/dist/cjs/w/messenger/crypto.d.ts +1 -3
  157. package/dist/cjs/w/messenger/crypto.js +1 -1
  158. package/dist/cjs/w/messenger/messenger-api.js +1 -1
  159. package/dist/cjs/w/messenger/messenger-manager.js +1 -1
  160. package/dist/cjs/w/messenger/messenger.js +1 -1
  161. package/dist/cjs/w/messenger/pq/crypto.d.ts +6 -6
  162. package/dist/cjs/w/messenger/pq/crypto.js +1 -1
  163. package/dist/cjs/w/messenger/pq/pqxdh.d.ts +3 -6
  164. package/dist/cjs/w/messenger/pq/pqxdh.js +1 -1
  165. package/dist/cjs/w/messenger/pq/session.d.ts +6 -4
  166. package/dist/cjs/w/messenger/pq/session.js +1 -1
  167. package/dist/cjs/w/messenger/pq/spqr.js +1 -1
  168. package/dist/cjs/w/messenger/pq/store-adapter.d.ts +1 -3
  169. package/dist/cjs/w/messenger/pq/store-adapter.js +1 -1
  170. package/dist/cjs/w/messenger/pq/types.d.ts +4 -5
  171. package/dist/cjs/w/messenger/pq/types.js +1 -1
  172. package/dist/cjs/w/messenger/session.d.ts +4 -5
  173. package/dist/cjs/w/messenger/session.js +1 -1
  174. package/dist/cjs/w/messenger/storage.js +1 -1
  175. package/dist/cjs/w/messenger/types.d.ts +7 -10
  176. package/dist/cjs/w/messenger/types.js +1 -1
  177. package/dist/cjs/w/query/object.js +1 -1
  178. package/dist/esm/_deps/bcs/bcs-type.d.ts +127 -0
  179. package/dist/esm/_deps/bcs/bcs-type.js +1 -0
  180. package/dist/esm/_deps/bcs/bcs.d.ts +49 -0
  181. package/dist/esm/_deps/bcs/bcs.js +1 -0
  182. package/dist/esm/_deps/bcs/index.d.ts +16 -0
  183. package/dist/esm/_deps/bcs/index.js +1 -0
  184. package/dist/esm/_deps/bcs/reader.d.ts +15 -0
  185. package/dist/esm/_deps/bcs/reader.js +1 -0
  186. package/dist/esm/_deps/bcs/types.d.ts +24 -0
  187. package/dist/esm/_deps/bcs/types.js +1 -0
  188. package/dist/esm/_deps/bcs/uleb.d.ts +5 -0
  189. package/dist/esm/_deps/bcs/uleb.js +1 -0
  190. package/dist/esm/_deps/bcs/utils.d.ts +4 -0
  191. package/dist/esm/_deps/bcs/utils.js +1 -0
  192. package/dist/esm/_deps/bcs/writer.d.ts +28 -0
  193. package/dist/esm/_deps/bcs/writer.js +1 -0
  194. package/dist/esm/_deps/utils/b58.d.ts +2 -0
  195. package/dist/esm/_deps/utils/b58.js +1 -0
  196. package/dist/esm/_deps/utils/b64.d.ts +2 -0
  197. package/dist/esm/_deps/utils/b64.js +1 -0
  198. package/dist/esm/_deps/utils/chunk.d.ts +1 -0
  199. package/dist/esm/_deps/utils/chunk.js +1 -0
  200. package/dist/esm/_deps/utils/dataloader.d.ts +43 -0
  201. package/dist/esm/_deps/utils/dataloader.js +1 -0
  202. package/dist/esm/_deps/utils/hex.d.ts +2 -0
  203. package/dist/esm/_deps/utils/hex.js +1 -0
  204. package/dist/esm/_deps/utils/index.d.ts +7 -0
  205. package/dist/esm/_deps/utils/index.js +1 -0
  206. package/dist/esm/_deps/utils/types.d.ts +4 -0
  207. package/dist/esm/_deps/utils/types.js +1 -0
  208. package/dist/esm/_deps/utils/with-resolver.d.ts +6 -0
  209. package/dist/esm/_deps/utils/with-resolver.js +1 -0
  210. package/dist/esm/bcs/bcs.d.ts +275 -313
  211. package/dist/esm/bcs/bcs.js +1 -1
  212. package/dist/esm/bcs/effects.d.ts +193 -193
  213. package/dist/esm/bcs/effects.js +1 -1
  214. package/dist/esm/bcs/index.d.ts +1 -1
  215. package/dist/esm/bcs/index.js +1 -1
  216. package/dist/esm/bcs/pure.d.ts +1 -1
  217. package/dist/esm/bcs/pure.js +1 -1
  218. package/dist/esm/bcs/type-tag-serializer.js +1 -1
  219. package/dist/esm/cryptography/index.d.ts +1 -1
  220. package/dist/esm/cryptography/index.js +1 -1
  221. package/dist/esm/cryptography/intent.js +1 -1
  222. package/dist/esm/cryptography/keypair.d.ts +2 -2
  223. package/dist/esm/cryptography/keypair.js +1 -1
  224. package/dist/esm/cryptography/mnemonics.js +1 -1
  225. package/dist/esm/cryptography/publickey.d.ts +1 -1
  226. package/dist/esm/cryptography/publickey.js +1 -1
  227. package/dist/esm/cryptography/signature-scheme.d.ts +4 -15
  228. package/dist/esm/cryptography/signature-scheme.js +1 -1
  229. package/dist/esm/cryptography/signature.d.ts +1 -9
  230. package/dist/esm/cryptography/signature.js +1 -1
  231. package/dist/esm/experimental/client.d.ts +1 -1
  232. package/dist/esm/grpc/client.d.ts +0 -2
  233. package/dist/esm/grpc/client.js +1 -1
  234. package/dist/esm/grpc/core.js +1 -1
  235. package/dist/esm/grpc/proto/google/protobuf/any.d.ts +7 -0
  236. package/dist/esm/grpc/proto/google/protobuf/any.js +1 -1
  237. package/dist/esm/grpc/proto/google/protobuf/duration.d.ts +8 -0
  238. package/dist/esm/grpc/proto/google/protobuf/duration.js +1 -1
  239. package/dist/esm/grpc/proto/google/protobuf/empty.d.ts +8 -0
  240. package/dist/esm/grpc/proto/google/protobuf/empty.js +1 -1
  241. package/dist/esm/grpc/proto/google/protobuf/field_mask.d.ts +8 -0
  242. package/dist/esm/grpc/proto/google/protobuf/field_mask.js +1 -1
  243. package/dist/esm/grpc/proto/google/protobuf/struct.d.ts +15 -0
  244. package/dist/esm/grpc/proto/google/protobuf/struct.js +1 -1
  245. package/dist/esm/grpc/proto/google/protobuf/timestamp.d.ts +8 -0
  246. package/dist/esm/grpc/proto/google/protobuf/timestamp.js +1 -1
  247. package/dist/esm/grpc/proto/google/rpc/error_details.d.ts +48 -0
  248. package/dist/esm/grpc/proto/google/rpc/error_details.js +1 -1
  249. package/dist/esm/grpc/proto/google/rpc/status.d.ts +8 -0
  250. package/dist/esm/grpc/proto/google/rpc/status.js +1 -1
  251. package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint.js +1 -1
  252. package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint_contents.js +1 -1
  253. package/dist/esm/grpc/proto/sui/rpc/v2/checkpoint_summary.js +1 -1
  254. package/dist/esm/grpc/proto/sui/rpc/v2/effects.js +1 -1
  255. package/dist/esm/grpc/proto/sui/rpc/v2/event.js +1 -1
  256. package/dist/esm/grpc/proto/sui/rpc/v2/executed_transaction.js +1 -1
  257. package/dist/esm/grpc/proto/sui/rpc/v2/execution_status.d.ts +2 -2
  258. package/dist/esm/grpc/proto/sui/rpc/v2/execution_status.js +1 -1
  259. package/dist/esm/grpc/proto/sui/rpc/v2/ledger_service.js +1 -1
  260. package/dist/esm/grpc/proto/sui/rpc/v2/move_package.js +1 -1
  261. package/dist/esm/grpc/proto/sui/rpc/v2/move_package_service.js +1 -1
  262. package/dist/esm/grpc/proto/sui/rpc/v2/object.js +1 -1
  263. package/dist/esm/grpc/proto/sui/rpc/v2/signature.d.ts +9 -87
  264. package/dist/esm/grpc/proto/sui/rpc/v2/signature.js +1 -1
  265. package/dist/esm/grpc/proto/sui/rpc/v2/signature_scheme.d.ts +2 -6
  266. package/dist/esm/grpc/proto/sui/rpc/v2/signature_scheme.js +1 -1
  267. package/dist/esm/grpc/proto/sui/rpc/v2/signature_verification_service.d.ts +0 -2
  268. package/dist/esm/grpc/proto/sui/rpc/v2/signature_verification_service.js +1 -1
  269. package/dist/esm/grpc/proto/sui/rpc/v2/state_service.js +1 -1
  270. package/dist/esm/grpc/proto/sui/rpc/v2/system_state.d.ts +2 -2
  271. package/dist/esm/grpc/proto/sui/rpc/v2/system_state.js +1 -1
  272. package/dist/esm/grpc/proto/sui/rpc/v2/transaction.d.ts +13 -51
  273. package/dist/esm/grpc/proto/sui/rpc/v2/transaction.js +1 -1
  274. package/dist/esm/grpc/proto/sui/rpc/v2/transaction_execution_service.js +1 -1
  275. package/dist/esm/index.d.ts +1 -1
  276. package/dist/esm/index.js +1 -1
  277. package/dist/esm/jsonRpc/client.js +1 -1
  278. package/dist/esm/jsonRpc/core.js +1 -1
  279. package/dist/esm/jsonRpc/json-rpc-resolver.js +1 -1
  280. package/dist/esm/jsonRpc/types/chain.d.ts +0 -5
  281. package/dist/esm/jsonRpc/types/generated.d.ts +5 -57
  282. package/dist/esm/jsonRpc/types/params.d.ts +0 -17
  283. package/dist/esm/keypairs/falcon512/index.d.ts +2 -0
  284. package/dist/esm/keypairs/falcon512/index.js +1 -0
  285. package/dist/esm/keypairs/falcon512/keypair.d.ts +19 -0
  286. package/dist/esm/keypairs/falcon512/keypair.js +1 -0
  287. package/dist/{cjs/keypairs/ed25519 → esm/keypairs/falcon512}/publickey.d.ts +2 -2
  288. package/dist/esm/keypairs/falcon512/publickey.js +1 -0
  289. package/dist/esm/keypairs/index.d.ts +1 -4
  290. package/dist/esm/keypairs/index.js +1 -1
  291. package/dist/esm/multisig/publickey.js +1 -1
  292. package/dist/esm/multisig/signer.js +1 -1
  293. package/dist/esm/transactions/Commands.js +1 -1
  294. package/dist/esm/transactions/Inputs.d.ts +1 -1
  295. package/dist/esm/transactions/Inputs.js +1 -1
  296. package/dist/esm/transactions/Transaction.d.ts +5 -5
  297. package/dist/esm/transactions/Transaction.js +1 -1
  298. package/dist/esm/transactions/TransactionData.js +1 -1
  299. package/dist/esm/transactions/__tests__/Transaction.test.js +1 -1
  300. package/dist/esm/transactions/__tests__/bcs.test.js +1 -1
  301. package/dist/esm/transactions/data/internal.d.ts +2 -2
  302. package/dist/esm/transactions/data/v1.d.ts +2 -2
  303. package/dist/esm/transactions/data/v1.js +1 -1
  304. package/dist/esm/transactions/data/v2.d.ts +1 -1
  305. package/dist/esm/transactions/executor/parallel.js +1 -1
  306. package/dist/esm/transactions/executor/serial.js +1 -1
  307. package/dist/esm/transactions/pure.d.ts +1 -1
  308. package/dist/esm/transactions/pure.js +1 -1
  309. package/dist/esm/transactions/serializer.d.ts +1 -1
  310. package/dist/esm/utils/dynamic-fields.js +1 -1
  311. package/dist/esm/utils/index.d.ts +1 -1
  312. package/dist/esm/utils/index.js +1 -1
  313. package/dist/esm/utils/move-registry.js +1 -1
  314. package/dist/esm/utils/sui-types.js +1 -1
  315. package/dist/esm/verify/verify.js +1 -1
  316. package/dist/esm/w/call/arbitration.js +1 -1
  317. package/dist/esm/w/call/base.js +1 -1
  318. package/dist/esm/w/call/contact.js +1 -1
  319. package/dist/esm/w/call/demand.js +1 -1
  320. package/dist/esm/w/call/guard.js +1 -1
  321. package/dist/esm/w/call/machine.js +1 -1
  322. package/dist/esm/w/call/personal.js +1 -1
  323. package/dist/esm/w/call/proof.d.ts +3 -3
  324. package/dist/esm/w/call/proof.js +1 -1
  325. package/dist/esm/w/call/repository.js +1 -1
  326. package/dist/esm/w/call/reward.js +1 -1
  327. package/dist/esm/w/call/service.js +1 -1
  328. package/dist/esm/w/call/treasury.js +1 -1
  329. package/dist/esm/w/local/account.d.ts +11 -4
  330. package/dist/esm/w/local/account.js +1 -1
  331. package/dist/esm/w/local/storage.js +1 -1
  332. package/dist/esm/w/local/util.js +1 -1
  333. package/dist/esm/w/local/wip.d.ts +1 -1
  334. package/dist/esm/w/local/wip.js +1 -1
  335. package/dist/esm/w/messenger/crypto.d.ts +1 -3
  336. package/dist/esm/w/messenger/crypto.js +1 -1
  337. package/dist/esm/w/messenger/messenger-api.js +1 -1
  338. package/dist/esm/w/messenger/messenger-manager.js +1 -1
  339. package/dist/esm/w/messenger/messenger.js +1 -1
  340. package/dist/esm/w/messenger/pq/crypto.d.ts +6 -6
  341. package/dist/esm/w/messenger/pq/crypto.js +1 -1
  342. package/dist/esm/w/messenger/pq/pqxdh.d.ts +3 -6
  343. package/dist/esm/w/messenger/pq/pqxdh.js +1 -1
  344. package/dist/esm/w/messenger/pq/session.d.ts +6 -4
  345. package/dist/esm/w/messenger/pq/session.js +1 -1
  346. package/dist/esm/w/messenger/pq/spqr.js +1 -1
  347. package/dist/esm/w/messenger/pq/store-adapter.d.ts +1 -3
  348. package/dist/esm/w/messenger/pq/store-adapter.js +1 -1
  349. package/dist/esm/w/messenger/pq/types.d.ts +4 -5
  350. package/dist/esm/w/messenger/pq/types.js +1 -1
  351. package/dist/esm/w/messenger/session.d.ts +4 -5
  352. package/dist/esm/w/messenger/session.js +1 -1
  353. package/dist/esm/w/messenger/storage.js +1 -1
  354. package/dist/esm/w/messenger/types.d.ts +7 -10
  355. package/dist/esm/w/messenger/types.js +1 -1
  356. package/dist/esm/w/query/object.js +1 -1
  357. package/package.json +22 -24
  358. package/dist/cjs/grpc/proto/sui/rpc/v2/jwk.d.ts +0 -20
  359. package/dist/cjs/grpc/proto/sui/rpc/v2/jwk.js +0 -1
  360. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.client.d.ts +0 -23
  361. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.client.js +0 -1
  362. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.d.ts +0 -47
  363. package/dist/cjs/grpc/proto/sui/rpc/v2/name_service.js +0 -1
  364. package/dist/cjs/keypairs/ed25519/ed25519-hd-key.d.ts +0 -8
  365. package/dist/cjs/keypairs/ed25519/ed25519-hd-key.js +0 -1
  366. package/dist/cjs/keypairs/ed25519/index.d.ts +0 -2
  367. package/dist/cjs/keypairs/ed25519/index.js +0 -1
  368. package/dist/cjs/keypairs/ed25519/keypair.d.ts +0 -22
  369. package/dist/cjs/keypairs/ed25519/keypair.js +0 -1
  370. package/dist/cjs/keypairs/ed25519/publickey.js +0 -1
  371. package/dist/cjs/keypairs/passkey/index.d.ts +0 -3
  372. package/dist/cjs/keypairs/passkey/index.js +0 -1
  373. package/dist/cjs/keypairs/passkey/keypair.d.ts +0 -33
  374. package/dist/cjs/keypairs/passkey/keypair.js +0 -1
  375. package/dist/cjs/keypairs/passkey/publickey.d.ts +0 -25
  376. package/dist/cjs/keypairs/passkey/publickey.js +0 -1
  377. package/dist/cjs/keypairs/passkey/types.d.ts +0 -6
  378. package/dist/cjs/keypairs/secp256k1/index.d.ts +0 -2
  379. package/dist/cjs/keypairs/secp256k1/index.js +0 -1
  380. package/dist/cjs/keypairs/secp256k1/keypair.d.ts +0 -22
  381. package/dist/cjs/keypairs/secp256k1/keypair.js +0 -1
  382. package/dist/cjs/keypairs/secp256k1/publickey.d.ts +0 -11
  383. package/dist/cjs/keypairs/secp256k1/publickey.js +0 -1
  384. package/dist/cjs/keypairs/secp256r1/index.d.ts +0 -2
  385. package/dist/cjs/keypairs/secp256r1/index.js +0 -1
  386. package/dist/cjs/keypairs/secp256r1/keypair.d.ts +0 -22
  387. package/dist/cjs/keypairs/secp256r1/keypair.js +0 -1
  388. package/dist/cjs/keypairs/secp256r1/publickey.d.ts +0 -11
  389. package/dist/cjs/keypairs/secp256r1/publickey.js +0 -1
  390. package/dist/cjs/utils/suins.d.ts +0 -2
  391. package/dist/cjs/utils/suins.js +0 -1
  392. package/dist/esm/grpc/proto/sui/rpc/v2/jwk.d.ts +0 -20
  393. package/dist/esm/grpc/proto/sui/rpc/v2/jwk.js +0 -1
  394. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.client.d.ts +0 -23
  395. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.client.js +0 -1
  396. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.d.ts +0 -47
  397. package/dist/esm/grpc/proto/sui/rpc/v2/name_service.js +0 -1
  398. package/dist/esm/keypairs/ed25519/ed25519-hd-key.d.ts +0 -8
  399. package/dist/esm/keypairs/ed25519/ed25519-hd-key.js +0 -1
  400. package/dist/esm/keypairs/ed25519/index.d.ts +0 -2
  401. package/dist/esm/keypairs/ed25519/index.js +0 -1
  402. package/dist/esm/keypairs/ed25519/keypair.d.ts +0 -22
  403. package/dist/esm/keypairs/ed25519/keypair.js +0 -1
  404. package/dist/esm/keypairs/ed25519/publickey.js +0 -1
  405. package/dist/esm/keypairs/passkey/index.d.ts +0 -3
  406. package/dist/esm/keypairs/passkey/index.js +0 -1
  407. package/dist/esm/keypairs/passkey/keypair.d.ts +0 -33
  408. package/dist/esm/keypairs/passkey/keypair.js +0 -1
  409. package/dist/esm/keypairs/passkey/publickey.d.ts +0 -25
  410. package/dist/esm/keypairs/passkey/publickey.js +0 -1
  411. package/dist/esm/keypairs/passkey/types.d.ts +0 -6
  412. package/dist/esm/keypairs/secp256k1/index.d.ts +0 -2
  413. package/dist/esm/keypairs/secp256k1/index.js +0 -1
  414. package/dist/esm/keypairs/secp256k1/keypair.d.ts +0 -22
  415. package/dist/esm/keypairs/secp256k1/keypair.js +0 -1
  416. package/dist/esm/keypairs/secp256k1/publickey.d.ts +0 -11
  417. package/dist/esm/keypairs/secp256k1/publickey.js +0 -1
  418. package/dist/esm/keypairs/secp256r1/index.d.ts +0 -2
  419. package/dist/esm/keypairs/secp256r1/index.js +0 -1
  420. package/dist/esm/keypairs/secp256r1/keypair.d.ts +0 -22
  421. package/dist/esm/keypairs/secp256r1/keypair.js +0 -1
  422. package/dist/esm/keypairs/secp256r1/publickey.d.ts +0 -11
  423. package/dist/esm/keypairs/secp256r1/publickey.js +0 -1
  424. package/dist/esm/utils/suins.d.ts +0 -2
  425. package/dist/esm/utils/suins.js +0 -1
  426. /package/dist/cjs/{keypairs/passkey → _deps/bcs}/types.js +0 -0
  427. /package/dist/{esm/keypairs/passkey → cjs/_deps/utils}/types.js +0 -0
@@ -1,8 +0,0 @@
1
- type Hex = string;
2
- type Path = string;
3
- type Keys = {
4
- key: Uint8Array;
5
- chainCode: Uint8Array;
6
- };
7
- export declare const derivePath: (path: Path, seed: Hex, offset?: number) => Keys;
8
- export {};
@@ -1 +0,0 @@
1
- import{fromHex}from'@mysten/bcs';import{hmac}from'@noble/hashes/hmac';import{sha512}from'@noble/hashes/sha512';const ED25519_CURVE='ed25519\x20seed',HARDENED_OFFSET=0x80000000,pathRegex=new RegExp('^m(\x5c/[0-9]+\x27)+$'),replaceDerive=a=>a['replace']('\x27',''),getMasterKeyFromSeed=a=>{const b=hmac['create'](sha512,ED25519_CURVE),c=b['update'](fromHex(a))['digest'](),d=c['slice'](0x0,0x20),e=c['slice'](0x20);return{'key':d,'chainCode':e};},CKDPriv=({key:a,chainCode:b},c)=>{const d=new ArrayBuffer(0x4),e=new DataView(d);e['setUint32'](0x0,c);const f=new Uint8Array(0x1+a['length']+d['byteLength']);f['set'](new Uint8Array(0x1)['fill'](0x0)),f['set'](a,0x1),f['set'](new Uint8Array(d,0x0,d['byteLength']),a['length']+0x1);const g=hmac['create'](sha512,b)['update'](f)['digest'](),h=g['slice'](0x0,0x20),i=g['slice'](0x20);return{'key':h,'chainCode':i};},isValidPath=a=>{if(!pathRegex['test'](a))return![];return!a['split']('/')['slice'](0x1)['map'](replaceDerive)['some'](isNaN);};export const derivePath=(a,b,c=HARDENED_OFFSET)=>{if(!isValidPath(a))throw new Error('Invalid\x20derivation\x20path');const {key:d,chainCode:e}=getMasterKeyFromSeed(b),f=a['split']('/')['slice'](0x1)['map'](replaceDerive)['map'](g=>parseInt(g,0xa));return f['reduce']((g,h)=>CKDPriv(g,h+c),{'key':d,'chainCode':e});};
@@ -1,2 +0,0 @@
1
- export { DEFAULT_ED25519_DERIVATION_PATH, Ed25519Keypair, type Ed25519KeypairData, } from "./keypair.js";
2
- export { Ed25519PublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{DEFAULT_ED25519_DERIVATION_PATH,Ed25519Keypair}from'./keypair.js';export{Ed25519PublicKey}from'./publickey.js';
@@ -1,22 +0,0 @@
1
- import { Keypair } from "../../cryptography/keypair.js";
2
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
3
- import { Ed25519PublicKey } from "./publickey.js";
4
- export declare const DEFAULT_ED25519_DERIVATION_PATH = "m/44'/784'/0'/0'/0'";
5
- export interface Ed25519KeypairData {
6
- publicKey: Uint8Array;
7
- secretKey: Uint8Array;
8
- }
9
- export declare class Ed25519Keypair extends Keypair {
10
- private keypair;
11
- constructor(keypair?: Ed25519KeypairData);
12
- getKeyScheme(): SignatureScheme;
13
- static generate(): Ed25519Keypair;
14
- static fromSecretKey(secretKey: Uint8Array | string, options?: {
15
- skipValidation?: boolean;
16
- }): Ed25519Keypair;
17
- getPublicKey(): Ed25519PublicKey;
18
- getSecretKey(): string;
19
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
20
- static deriveKeypair(mnemonics: string, path?: string): Ed25519Keypair;
21
- static deriveKeypairFromSeed(seedHex: string, path?: string): Ed25519Keypair;
22
- }
@@ -1 +0,0 @@
1
- import{ed25519}from'@noble/curves/ed25519';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair,PRIVATE_KEY_SIZE}from'../../cryptography/keypair.js';import{isValidHardenedPath,mnemonicToSeedHex}from'../../cryptography/mnemonics.js';import{derivePath}from'./ed25519-hd-key.js';import{Ed25519PublicKey}from'./publickey.js';export const DEFAULT_ED25519_DERIVATION_PATH='m/44\x27/784\x27/0\x27/0\x27/0\x27';export class Ed25519Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']={'publicKey':a['publicKey'],'secretKey':a['secretKey']['slice'](0x0,0x20)};else{const b=ed25519['utils']['randomPrivateKey']();this['keypair']={'publicKey':ed25519['getPublicKey'](b),'secretKey':b};}}['getKeyScheme'](){return'ED25519';}static['generate'](){const a=ed25519['utils']['randomPrivateKey']();return new Ed25519Keypair({'publicKey':ed25519['getPublicKey'](a),'secretKey':a});}static['fromSecretKey'](a,b){if(typeof a==='string'){const e=decodeWowPrivateKey(a);if(e['scheme']!=='ED25519')throw new Error('Expected\x20a\x20ED25519\x20keypair,\x20got\x20'+e['scheme']);return this['fromSecretKey'](e['secretKey'],b);}const c=a['length'];if(c!==PRIVATE_KEY_SIZE)throw new Error('Wrong\x20secretKey\x20size.\x20Expected\x20'+PRIVATE_KEY_SIZE+'\x20bytes,\x20got\x20'+c+'.');const d={'publicKey':ed25519['getPublicKey'](a),'secretKey':a};if(!b||!b['skipValidation']){const f=new TextEncoder(),g=f['encode']('sui\x20validation'),h=ed25519['sign'](g,a);if(!ed25519['verify'](h,g,d['publicKey']))throw new Error('provided\x20secretKey\x20is\x20invalid');}return new Ed25519Keypair(d);}['getPublicKey'](){return new Ed25519PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey']['slice'](0x0,PRIVATE_KEY_SIZE),this['getKeyScheme']());}async['sign'](a){return ed25519['sign'](a,this['keypair']['secretKey']);}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_ED25519_DERIVATION_PATH);if(!isValidHardenedPath(b))throw new Error('Invalid\x20derivation\x20path');const {key:c}=derivePath(b,mnemonicToSeedHex(a));return Ed25519Keypair['fromSecretKey'](c);}static['deriveKeypairFromSeed'](a,b){b==null&&(b=DEFAULT_ED25519_DERIVATION_PATH);if(!isValidHardenedPath(b))throw new Error('Invalid\x20derivation\x20path');const {key:c}=derivePath(b,a);return Ed25519Keypair['fromSecretKey'](c);}}
@@ -1 +0,0 @@
1
- import{fromBase64}from'@mysten/bcs';import{ed25519}from'@noble/curves/ed25519';import{bytesEqual,parseSerializedKeypairSignature,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';const PUBLIC_KEY_SIZE=0x20;export class Ed25519PublicKey extends PublicKey{static ['SIZE']=PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['ED25519'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedKeypairSignature(b);if(d['signatureScheme']!=='ED25519')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return ed25519['verify'](c,a,this['toRawBytes']());}}
@@ -1,3 +0,0 @@
1
- export { PasskeyKeypair, BrowserPasskeyProvider, findCommonPublicKey, } from "./keypair.js";
2
- export type { PasskeyProvider, BrowserPasswordProviderOptions, } from "./keypair.js";
3
- export { PasskeyPublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{PasskeyKeypair,BrowserPasskeyProvider,findCommonPublicKey}from'./keypair.js';export{PasskeyPublicKey}from'./publickey.js';
@@ -1,33 +0,0 @@
1
- import type { IntentScope, SignatureWithBytes } from "../../cryptography/index.js";
2
- import { Signer } from "../../cryptography/index.js";
3
- import type { PublicKey } from "../../cryptography/publickey.js";
4
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
5
- import type { AuthenticationCredential, RegistrationCredential } from "./types.js";
6
- type DeepPartialConfigKeys = "rp" | "user" | "authenticatorSelection";
7
- type DeepPartial<T> = T extends object ? {
8
- [P in keyof T]?: DeepPartial<T[P]>;
9
- } : T;
10
- export type BrowserPasswordProviderOptions = Pick<DeepPartial<PublicKeyCredentialCreationOptions>, DeepPartialConfigKeys> & Omit<Partial<PublicKeyCredentialCreationOptions>, DeepPartialConfigKeys | "pubKeyCredParams" | "challenge">;
11
- export interface PasskeyProvider {
12
- create(): Promise<RegistrationCredential>;
13
- get(challenge: Uint8Array): Promise<AuthenticationCredential>;
14
- }
15
- export declare class BrowserPasskeyProvider implements PasskeyProvider {
16
- #private;
17
- constructor(name: string, options: BrowserPasswordProviderOptions);
18
- create(): Promise<RegistrationCredential>;
19
- get(challenge: Uint8Array): Promise<AuthenticationCredential>;
20
- }
21
- export declare class PasskeyKeypair extends Signer {
22
- private publicKey;
23
- private provider;
24
- getKeyScheme(): SignatureScheme;
25
- constructor(publicKey: Uint8Array, provider: PasskeyProvider);
26
- static getPasskeyInstance(provider: PasskeyProvider): Promise<PasskeyKeypair>;
27
- getPublicKey(): PublicKey;
28
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
29
- signWithIntent(bytes: Uint8Array, intent: IntentScope): Promise<SignatureWithBytes>;
30
- static signAndRecover(provider: PasskeyProvider, message: Uint8Array): Promise<PublicKey[]>;
31
- }
32
- export declare function findCommonPublicKey(arr1: PublicKey[], arr2: PublicKey[]): PublicKey;
33
- export {};
@@ -1 +0,0 @@
1
- import{toBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{randomBytes}from'@noble/hashes/utils';import{PasskeyAuthenticator}from'../../bcs/bcs.js';import{messageWithIntent,SIGNATURE_SCHEME_TO_FLAG,Signer}from'../../cryptography/index.js';import{parseDerSPKI,PASSKEY_PUBLIC_KEY_SIZE,PASSKEY_SIGNATURE_SIZE,PasskeyPublicKey}from'./publickey.js';export class BrowserPasskeyProvider{#name;#options;constructor(a,b){this.#name=a,this.#options=b;}async['create'](){return await navigator['credentials']['create']({'publicKey':{'timeout':this.#options['timeout']??0xea60,...this.#options,'rp':{'name':this.#name,...this.#options['rp']},'user':{'name':this.#name,'displayName':this.#name,...this.#options['user'],'id':randomBytes(0xa)},'challenge':new TextEncoder()['encode']('Create\x20passkey\x20wallet\x20on\x20Sui'),'pubKeyCredParams':[{'alg':-0x7,'type':'public-key'}],'authenticatorSelection':{'authenticatorAttachment':'cross-platform','residentKey':'required','requireResidentKey':!![],'userVerification':'required',...this.#options['authenticatorSelection']}}});}async['get'](a){return await navigator['credentials']['get']({'publicKey':{'challenge':a,'userVerification':this.#options['authenticatorSelection']?.['userVerification']||'required','timeout':this.#options['timeout']??0xea60}});}}export class PasskeyKeypair extends Signer{['publicKey'];['provider'];['getKeyScheme'](){return'Passkey';}constructor(a,b){super(),this['publicKey']=a,this['provider']=b;}static async['getPasskeyInstance'](a){const b=await a['create']();if(!b['response']['getPublicKey']())throw new Error('Invalid\x20credential\x20create\x20response');else{const c=b['response']['getPublicKey'](),d=parseDerSPKI(new Uint8Array(c)),e=secp256r1['ProjectivePoint']['fromHex'](d),f=e['toRawBytes'](!![]);return new PasskeyKeypair(f,a);}}['getPublicKey'](){return new PasskeyPublicKey(this['publicKey']);}async['sign'](a){const b=await this['provider']['get'](a),c=new Uint8Array(b['response']['authenticatorData']),d=new Uint8Array(b['response']['clientDataJSON']),e=new TextDecoder(),f=e['decode'](d),g=secp256r1['Signature']['fromDER'](new Uint8Array(b['response']['signature'])),h=g['normalizeS']()['toCompactRawBytes']();if(h['length']!==PASSKEY_SIGNATURE_SIZE||this['publicKey']['length']!==PASSKEY_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20signature\x20or\x20public\x20key\x20length');const i=new Uint8Array(0x1+h['length']+this['publicKey']['length']);return i['set']([SIGNATURE_SCHEME_TO_FLAG['Secp256r1']]),i['set'](h,0x1),i['set'](this['publicKey'],0x1+h['length']),PasskeyAuthenticator['serialize']({'authenticatorData':c,'clientDataJson':f,'userSignature':i})['toBytes']();}async['signWithIntent'](a,b){const c=messageWithIntent(b,a),d=blake2b(c,{'dkLen':0x20}),e=await this['sign'](d),f=new Uint8Array(0x1+e['length']);return f['set']([SIGNATURE_SCHEME_TO_FLAG[this['getKeyScheme']()]]),f['set'](e,0x1),{'signature':toBase64(f),'bytes':toBase64(a)};}static async['signAndRecover'](a,b){const c=await a['get'](b),d=messageFromAssertionResponse(c['response']),e=secp256r1['Signature']['fromDER'](new Uint8Array(c['response']['signature'])),f=[];for(let g=0x0;g<0x4;g++){const h=e['addRecoveryBit'](g);try{const j=h['recoverPublicKey'](sha256(d)),k=new PasskeyPublicKey(j['toRawBytes'](!![]));f['push'](k);}catch{continue;}}return f;}}export function findCommonPublicKey(a,b){const c=[];for(const d of a){for(const e of b){d['equals'](e)&&c['push'](d);}}if(c['length']!==0x1)throw new Error('No\x20unique\x20public\x20key\x20found');return c[0x0];}function messageFromAssertionResponse(a){const b=new Uint8Array(a['authenticatorData']),c=new Uint8Array(a['clientDataJSON']),d=sha256(c);return new Uint8Array([...b,...d]);}
@@ -1,25 +0,0 @@
1
- import { PublicKey } from "../../cryptography/publickey.js";
2
- import type { PublicKeyInitData } from "../../cryptography/publickey.js";
3
- export declare const PASSKEY_PUBLIC_KEY_SIZE = 33;
4
- export declare const PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE = 65;
5
- export declare const PASSKEY_SIGNATURE_SIZE = 64;
6
- export declare const SECP256R1_SPKI_HEADER: Uint8Array<ArrayBuffer>;
7
- export declare class PasskeyPublicKey extends PublicKey {
8
- static SIZE: number;
9
- private data;
10
- constructor(value: PublicKeyInitData);
11
- equals(publicKey: PasskeyPublicKey): boolean;
12
- toRawBytes(): Uint8Array<ArrayBuffer>;
13
- flag(): number;
14
- verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
15
- }
16
- export declare function parseDerSPKI(derBytes: Uint8Array): Uint8Array;
17
- export declare function parseSerializedPasskeySignature(signature: Uint8Array | string): {
18
- signatureScheme: "Passkey";
19
- serializedSignature: string;
20
- signature: Uint8Array<ArrayBufferLike>;
21
- authenticatorData: Uint8Array<ArrayBufferLike>;
22
- clientDataJson: string;
23
- userSignature: Uint8Array<ArrayBuffer>;
24
- publicKey: Uint8Array<ArrayBuffer>;
25
- };
@@ -1 +0,0 @@
1
- import{fromBase64,toBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{sha256}from'@noble/hashes/sha256';import{PasskeyAuthenticator}from'../../bcs/bcs.js';import{bytesEqual,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';export const PASSKEY_PUBLIC_KEY_SIZE=0x21;export const PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE=0x41;export const PASSKEY_SIGNATURE_SIZE=0x40;export const SECP256R1_SPKI_HEADER=new Uint8Array([0x30,0x59,0x30,0x13,0x6,0x7,0x2a,0x86,0x48,0xce,0x3d,0x2,0x1,0x6,0x8,0x2a,0x86,0x48,0xce,0x3d,0x3,0x1,0x7,0x3,0x42,0x0]);export class PasskeyPublicKey extends PublicKey{static ['SIZE']=PASSKEY_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==PASSKEY_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+PASSKEY_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Passkey'];}async['verify'](a,b){const c=parseSerializedPasskeySignature(b),d=JSON['parse'](c['clientDataJson']);if(d['type']!=='webauthn.get')return![];const e=fromBase64(d['challenge']['replace'](/-/g,'+')['replace'](/_/g,'/'));if(!bytesEqual(a,e))return![];const f=c['userSignature']['slice'](0x1+PASSKEY_SIGNATURE_SIZE);if(!bytesEqual(this['toRawBytes'](),f))return![];const g=new Uint8Array([...c['authenticatorData'],...sha256(c['clientDataJson'])]),h=c['userSignature']['slice'](0x1,PASSKEY_SIGNATURE_SIZE+0x1);return secp256r1['verify'](h,sha256(g),f);}}export function parseDerSPKI(a){if(a['length']!==SECP256R1_SPKI_HEADER['length']+PASSKEY_UNCOMPRESSED_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20DER\x20length');for(let b=0x0;b<SECP256R1_SPKI_HEADER['length'];b++){if(a[b]!==SECP256R1_SPKI_HEADER[b])throw new Error('Invalid\x20spki\x20header');}if(a[SECP256R1_SPKI_HEADER['length']]!==0x4)throw new Error('Invalid\x20point\x20marker');return a['slice'](SECP256R1_SPKI_HEADER['length']);}export function parseSerializedPasskeySignature(a){const b=typeof a==='string'?fromBase64(a):a;if(b[0x0]!==SIGNATURE_SCHEME_TO_FLAG['Passkey'])throw new Error('Invalid\x20signature\x20scheme');const c=PasskeyAuthenticator['parse'](b['slice'](0x1));return{'signatureScheme':'Passkey','serializedSignature':toBase64(b),'signature':b,'authenticatorData':c['authenticatorData'],'clientDataJson':c['clientDataJson'],'userSignature':new Uint8Array(c['userSignature']),'publicKey':new Uint8Array(c['userSignature']['slice'](0x1+PASSKEY_SIGNATURE_SIZE))};}
@@ -1,6 +0,0 @@
1
- export interface AuthenticationCredential extends PublicKeyCredential {
2
- response: AuthenticatorAssertionResponse;
3
- }
4
- export interface RegistrationCredential extends PublicKeyCredential {
5
- response: AuthenticatorAttestationResponse;
6
- }
@@ -1,2 +0,0 @@
1
- export { DEFAULT_SECP256K1_DERIVATION_PATH, Secp256k1Keypair, type Secp256k1KeypairData, } from "./keypair.js";
2
- export { Secp256k1PublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{DEFAULT_SECP256K1_DERIVATION_PATH,Secp256k1Keypair}from'./keypair.js';export{Secp256k1PublicKey}from'./publickey.js';
@@ -1,22 +0,0 @@
1
- import { Keypair } from "../../cryptography/keypair.js";
2
- import type { PublicKey } from "../../cryptography/publickey.js";
3
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
4
- export declare const DEFAULT_SECP256K1_DERIVATION_PATH = "m/54'/784'/0'/0/0";
5
- export interface Secp256k1KeypairData {
6
- publicKey: Uint8Array;
7
- secretKey: Uint8Array;
8
- }
9
- export declare class Secp256k1Keypair extends Keypair {
10
- private keypair;
11
- constructor(keypair?: Secp256k1KeypairData);
12
- getKeyScheme(): SignatureScheme;
13
- static generate(): Secp256k1Keypair;
14
- static fromSecretKey(secretKey: Uint8Array | string, options?: {
15
- skipValidation?: boolean;
16
- }): Secp256k1Keypair;
17
- static fromSeed(seed: Uint8Array): Secp256k1Keypair;
18
- getPublicKey(): PublicKey;
19
- getSecretKey(): string;
20
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
21
- static deriveKeypair(mnemonics: string, path?: string): Secp256k1Keypair;
22
- }
@@ -1 +0,0 @@
1
- import{secp256k1}from'@noble/curves/secp256k1';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{bytesToHex}from'@noble/hashes/utils';import{HDKey}from'@scure/bip32';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair}from'../../cryptography/keypair.js';import{isValidBIP32Path,mnemonicToSeed}from'../../cryptography/mnemonics.js';import{Secp256k1PublicKey}from'./publickey.js';export const DEFAULT_SECP256K1_DERIVATION_PATH='m/54\x27/784\x27/0\x27/0/0';export class Secp256k1Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']=a;else{const b=secp256k1['utils']['randomPrivateKey'](),c=secp256k1['getPublicKey'](b,!![]);this['keypair']={'publicKey':c,'secretKey':b};}}['getKeyScheme'](){return'Secp256k1';}static['generate'](){return new Secp256k1Keypair();}static['fromSecretKey'](a,b){if(typeof a==='string'){const d=decodeWowPrivateKey(a);if(d['scheme']!=='Secp256k1')throw new Error('Expected\x20a\x20Secp256k1\x20keypair,\x20got\x20'+d['scheme']);return this['fromSecretKey'](d['secretKey'],b);}const c=secp256k1['getPublicKey'](a,!![]);if(!b||!b['skipValidation']){const e=new TextEncoder(),f=e['encode']('sui\x20validation'),g=bytesToHex(blake2b(f,{'dkLen':0x20})),h=secp256k1['sign'](g,a);if(!secp256k1['verify'](h,g,c,{'lowS':!![]}))throw new Error('Provided\x20secretKey\x20is\x20invalid');}return new Secp256k1Keypair({'publicKey':c,'secretKey':a});}static['fromSeed'](a){const b=secp256k1['getPublicKey'](a,!![]);return new Secp256k1Keypair({'publicKey':b,'secretKey':a});}['getPublicKey'](){return new Secp256k1PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey'],this['getKeyScheme']());}async['sign'](a){const b=sha256(a),c=secp256k1['sign'](b,this['keypair']['secretKey'],{'lowS':!![]});return c['toCompactRawBytes']();}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_SECP256K1_DERIVATION_PATH);if(!isValidBIP32Path(b))throw new Error('Invalid\x20derivation\x20path');const c=HDKey['fromMasterSeed'](mnemonicToSeed(a))['derive'](b);if(c['publicKey']==null||c['privateKey']==null)throw new Error('Invalid\x20key');return new Secp256k1Keypair({'publicKey':c['publicKey'],'secretKey':c['privateKey']});}}
@@ -1,11 +0,0 @@
1
- import { PublicKey } from "../../cryptography/publickey.js";
2
- import type { PublicKeyInitData } from "../../cryptography/publickey.js";
3
- export declare class Secp256k1PublicKey extends PublicKey {
4
- static SIZE: number;
5
- private data;
6
- constructor(value: PublicKeyInitData);
7
- equals(publicKey: Secp256k1PublicKey): boolean;
8
- toRawBytes(): Uint8Array<ArrayBuffer>;
9
- flag(): number;
10
- verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
11
- }
@@ -1 +0,0 @@
1
- import{fromBase64}from'@mysten/bcs';import{secp256k1}from'@noble/curves/secp256k1';import{sha256}from'@noble/hashes/sha256';import{bytesEqual,parseSerializedKeypairSignature,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';const SECP256K1_PUBLIC_KEY_SIZE=0x21;export class Secp256k1PublicKey extends PublicKey{static ['SIZE']=SECP256K1_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==SECP256K1_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+SECP256K1_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Secp256k1'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedKeypairSignature(b);if(d['signatureScheme']!=='Secp256k1')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return secp256k1['verify'](secp256k1['Signature']['fromCompact'](c),sha256(a),this['toRawBytes']());}}
@@ -1,2 +0,0 @@
1
- export { DEFAULT_SECP256R1_DERIVATION_PATH, Secp256r1Keypair, type Secp256r1KeypairData, } from "./keypair.js";
2
- export { Secp256r1PublicKey } from "./publickey.js";
@@ -1 +0,0 @@
1
- export{DEFAULT_SECP256R1_DERIVATION_PATH,Secp256r1Keypair}from'./keypair.js';export{Secp256r1PublicKey}from'./publickey.js';
@@ -1,22 +0,0 @@
1
- import { Keypair } from "../../cryptography/keypair.js";
2
- import type { PublicKey } from "../../cryptography/publickey.js";
3
- import type { SignatureScheme } from "../../cryptography/signature-scheme.js";
4
- export declare const DEFAULT_SECP256R1_DERIVATION_PATH = "m/74'/784'/0'/0/0";
5
- export interface Secp256r1KeypairData {
6
- publicKey: Uint8Array;
7
- secretKey: Uint8Array;
8
- }
9
- export declare class Secp256r1Keypair extends Keypair {
10
- private keypair;
11
- constructor(keypair?: Secp256r1KeypairData);
12
- getKeyScheme(): SignatureScheme;
13
- static generate(): Secp256r1Keypair;
14
- static fromSecretKey(secretKey: Uint8Array | string, options?: {
15
- skipValidation?: boolean;
16
- }): Secp256r1Keypair;
17
- static fromSeed(seed: Uint8Array): Secp256r1Keypair;
18
- getPublicKey(): PublicKey;
19
- getSecretKey(): string;
20
- sign(data: Uint8Array): Promise<Uint8Array<ArrayBuffer>>;
21
- static deriveKeypair(mnemonics: string, path?: string): Secp256r1Keypair;
22
- }
@@ -1 +0,0 @@
1
- import{secp256r1}from'@noble/curves/p256';import{blake2b}from'@noble/hashes/blake2b';import{sha256}from'@noble/hashes/sha256';import{bytesToHex}from'@noble/hashes/utils';import{HDKey}from'@scure/bip32';import{decodeWowPrivateKey,encodeWowPrivateKey,Keypair}from'../../cryptography/keypair.js';import{isValidBIP32Path,mnemonicToSeed}from'../../cryptography/mnemonics.js';import{Secp256r1PublicKey}from'./publickey.js';export const DEFAULT_SECP256R1_DERIVATION_PATH='m/74\x27/784\x27/0\x27/0/0';export class Secp256r1Keypair extends Keypair{['keypair'];constructor(a){super();if(a)this['keypair']=a;else{const b=secp256r1['utils']['randomPrivateKey'](),c=secp256r1['getPublicKey'](b,!![]);this['keypair']={'publicKey':c,'secretKey':b};}}['getKeyScheme'](){return'Secp256r1';}static['generate'](){return new Secp256r1Keypair();}static['fromSecretKey'](a,b){if(typeof a==='string'){const d=decodeWowPrivateKey(a);if(d['scheme']!=='Secp256r1')throw new Error('Expected\x20a\x20Secp256r1\x20keypair,\x20got\x20'+d['scheme']);return this['fromSecretKey'](d['secretKey'],b);}const c=secp256r1['getPublicKey'](a,!![]);if(!b||!b['skipValidation']){const e=new TextEncoder(),f=e['encode']('sui\x20validation'),g=bytesToHex(blake2b(f,{'dkLen':0x20})),h=secp256r1['sign'](g,a,{'lowS':!![]});if(!secp256r1['verify'](h,g,c,{'lowS':!![]}))throw new Error('Provided\x20secretKey\x20is\x20invalid');}return new Secp256r1Keypair({'publicKey':c,'secretKey':a});}static['fromSeed'](a){const b=secp256r1['getPublicKey'](a,!![]);return new Secp256r1Keypair({'publicKey':b,'secretKey':a});}['getPublicKey'](){return new Secp256r1PublicKey(this['keypair']['publicKey']);}['getSecretKey'](){return encodeWowPrivateKey(this['keypair']['secretKey'],this['getKeyScheme']());}async['sign'](a){const b=sha256(a),c=secp256r1['sign'](b,this['keypair']['secretKey'],{'lowS':!![]});return c['toCompactRawBytes']();}static['deriveKeypair'](a,b){b==null&&(b=DEFAULT_SECP256R1_DERIVATION_PATH);if(!isValidBIP32Path(b))throw new Error('Invalid\x20derivation\x20path');const c=HDKey['fromMasterSeed'](mnemonicToSeed(a))['derive'](b)['privateKey'];return Secp256r1Keypair['fromSecretKey'](c);}}
@@ -1,11 +0,0 @@
1
- import { PublicKey } from "../../cryptography/publickey.js";
2
- import type { PublicKeyInitData } from "../../cryptography/publickey.js";
3
- export declare class Secp256r1PublicKey extends PublicKey {
4
- static SIZE: number;
5
- private data;
6
- constructor(value: PublicKeyInitData);
7
- equals(publicKey: Secp256r1PublicKey): boolean;
8
- toRawBytes(): Uint8Array<ArrayBuffer>;
9
- flag(): number;
10
- verify(message: Uint8Array, signature: Uint8Array | string): Promise<boolean>;
11
- }
@@ -1 +0,0 @@
1
- import{fromBase64}from'@mysten/bcs';import{secp256r1}from'@noble/curves/p256';import{sha256}from'@noble/hashes/sha256';import{bytesEqual,PublicKey}from'../../cryptography/publickey.js';import{SIGNATURE_SCHEME_TO_FLAG}from'../../cryptography/signature-scheme.js';import{parseSerializedSignature}from'../../cryptography/signature.js';const SECP256R1_PUBLIC_KEY_SIZE=0x21;export class Secp256r1PublicKey extends PublicKey{static ['SIZE']=SECP256R1_PUBLIC_KEY_SIZE;['data'];constructor(a){super();if(typeof a==='string')this['data']=fromBase64(a);else a instanceof Uint8Array?this['data']=a:this['data']=Uint8Array['from'](a);if(this['data']['length']!==SECP256R1_PUBLIC_KEY_SIZE)throw new Error('Invalid\x20public\x20key\x20input.\x20Expected\x20'+SECP256R1_PUBLIC_KEY_SIZE+'\x20bytes,\x20got\x20'+this['data']['length']);}['equals'](a){return super['equals'](a);}['toRawBytes'](){return this['data'];}['flag'](){return SIGNATURE_SCHEME_TO_FLAG['Secp256r1'];}async['verify'](a,b){let c;if(typeof b==='string'){const d=parseSerializedSignature(b);if(d['signatureScheme']!=='Secp256r1')throw new Error('Invalid\x20signature\x20scheme');if(!bytesEqual(this['toRawBytes'](),d['publicKey']))throw new Error('Signature\x20does\x20not\x20match\x20public\x20key');c=d['signature'];}else c=b;return secp256r1['verify'](secp256r1['Signature']['fromCompact'](c),sha256(a),this['toRawBytes']());}}
@@ -1,2 +0,0 @@
1
- export declare function isValidSuiNSName(name: string): boolean;
2
- export declare function normalizeSuiNSName(name: string, format?: "at" | "dot"): string;
@@ -1 +0,0 @@
1
- const SUI_NS_NAME_REGEX=/^(?!.*(^(?!@)|[-.@])($|[-.@]))(?:[a-z0-9-]{0,63}(?:\.[a-z0-9-]{0,63})*)?@[a-z0-9-]{0,63}$/i,SUI_NS_DOMAIN_REGEX=/^(?!.*(^|[-.])($|[-.]))(?:[a-z0-9-]{0,63}\.)+sui$/i,MAX_SUI_NS_NAME_LENGTH=0xeb;export function isValidSuiNSName(a){if(a['length']>MAX_SUI_NS_NAME_LENGTH)return![];if(a['includes']('@'))return SUI_NS_NAME_REGEX['test'](a);return SUI_NS_DOMAIN_REGEX['test'](a);}export function normalizeSuiNSName(a,b='at'){const c=a['toLowerCase']();let d;if(c['includes']('@')){if(!SUI_NS_NAME_REGEX['test'](c))throw new Error('Invalid\x20SuiNS\x20name\x20'+a);const [e,f]=c['split']('@');d=[...e?e['split']('.'):[],f];}else{if(!SUI_NS_DOMAIN_REGEX['test'](c))throw new Error('Invalid\x20SuiNS\x20name\x20'+a);d=c['split']('.')['slice'](0x0,-0x1);}if(b==='dot')return d['join']('.')+'.sui';return d['slice'](0x0,-0x1)['join']('.')+'@'+d[d['length']-0x1];}