Socket
Socket
Sign inDemoInstall

@polkadot/wasm-crypto

Package Overview
Dependencies
16
Maintainers
2
Versions
564
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

Comparing version 6.4.1 to 7.0.1

233

bundle.js

@@ -1,12 +0,4 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { bridge, initBridge } from "./init.js";
export { packageInfo } from "./packageInfo.js";
import { bridge, initBridge } from './init.js';
export { packageInfo } from './packageInfo.js';
export { bridge };
// Removes the first parameter (expected as WasmCryptoInstance) and leaves the
// rest of the parameters in-tack. This allows us to dynamically create a function
// return from the withWasm helper
/**

@@ -27,147 +19,148 @@ * @internal

function withWasm(fn) {
return (...params) => {
if (!bridge.wasm) {
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.');
}
return fn(bridge.wasm, ...params);
};
return (...params) => {
if (!bridge.wasm) {
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.');
}
return fn(bridge.wasm, ...params);
};
}
export const bip39Generate = /*#__PURE__*/withWasm((wasm, words) => {
wasm.ext_bip39_generate(8, words);
return bridge.resultString();
export const bip39Generate = /*#__PURE__*/ withWasm((wasm, words) => {
wasm.ext_bip39_generate(8, words);
return bridge.resultString();
});
export const bip39ToEntropy = /*#__PURE__*/withWasm((wasm, phrase) => {
wasm.ext_bip39_to_entropy(8, ...bridge.allocString(phrase));
return bridge.resultU8a();
export const bip39ToEntropy = /*#__PURE__*/ withWasm((wasm, phrase) => {
wasm.ext_bip39_to_entropy(8, ...bridge.allocString(phrase));
return bridge.resultU8a();
});
export const bip39ToMiniSecret = /*#__PURE__*/withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_mini_secret(8, ...bridge.allocString(phrase), ...bridge.allocString(password));
return bridge.resultU8a();
export const bip39ToMiniSecret = /*#__PURE__*/ withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_mini_secret(8, ...bridge.allocString(phrase), ...bridge.allocString(password));
return bridge.resultU8a();
});
export const bip39ToSeed = /*#__PURE__*/withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_seed(8, ...bridge.allocString(phrase), ...bridge.allocString(password));
return bridge.resultU8a();
export const bip39ToSeed = /*#__PURE__*/ withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_seed(8, ...bridge.allocString(phrase), ...bridge.allocString(password));
return bridge.resultU8a();
});
export const bip39Validate = /*#__PURE__*/withWasm((wasm, phrase) => {
const ret = wasm.ext_bip39_validate(...bridge.allocString(phrase));
return ret !== 0;
export const bip39Validate = /*#__PURE__*/ withWasm((wasm, phrase) => {
const ret = wasm.ext_bip39_validate(...bridge.allocString(phrase));
return ret !== 0;
});
export const ed25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => {
wasm.ext_ed_from_seed(8, ...bridge.allocU8a(seed));
return bridge.resultU8a();
export const ed25519KeypairFromSeed = /*#__PURE__*/ withWasm((wasm, seed) => {
wasm.ext_ed_from_seed(8, ...bridge.allocU8a(seed));
return bridge.resultU8a();
});
export const ed25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, seckey, message) => {
wasm.ext_ed_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(seckey), ...bridge.allocU8a(message));
return bridge.resultU8a();
export const ed25519Sign = /*#__PURE__*/ withWasm((wasm, pubkey, seckey, message) => {
wasm.ext_ed_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(seckey), ...bridge.allocU8a(message));
return bridge.resultU8a();
});
export const ed25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_ed_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey));
return ret !== 0;
export const ed25519Verify = /*#__PURE__*/ withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_ed_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey));
return ret !== 0;
});
export const secp256k1FromSeed = /*#__PURE__*/withWasm((wasm, seckey) => {
wasm.ext_secp_from_seed(8, ...bridge.allocU8a(seckey));
return bridge.resultU8a();
export const secp256k1FromSeed = /*#__PURE__*/ withWasm((wasm, seckey) => {
wasm.ext_secp_from_seed(8, ...bridge.allocU8a(seckey));
return bridge.resultU8a();
});
export const secp256k1Compress = /*#__PURE__*/withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_compress(8, ...bridge.allocU8a(pubkey));
return bridge.resultU8a();
export const secp256k1Compress = /*#__PURE__*/ withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_compress(8, ...bridge.allocU8a(pubkey));
return bridge.resultU8a();
});
export const secp256k1Expand = /*#__PURE__*/withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_expand(8, ...bridge.allocU8a(pubkey));
return bridge.resultU8a();
export const secp256k1Expand = /*#__PURE__*/ withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_expand(8, ...bridge.allocU8a(pubkey));
return bridge.resultU8a();
});
export const secp256k1Recover = /*#__PURE__*/withWasm((wasm, msgHash, sig, recovery) => {
wasm.ext_secp_recover(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(sig), recovery);
return bridge.resultU8a();
export const secp256k1Recover = /*#__PURE__*/ withWasm((wasm, msgHash, sig, recovery) => {
wasm.ext_secp_recover(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(sig), recovery);
return bridge.resultU8a();
});
export const secp256k1Sign = /*#__PURE__*/withWasm((wasm, msgHash, seckey) => {
wasm.ext_secp_sign(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(seckey));
return bridge.resultU8a();
export const secp256k1Sign = /*#__PURE__*/ withWasm((wasm, msgHash, seckey) => {
wasm.ext_secp_sign(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(seckey));
return bridge.resultU8a();
});
export const sr25519DeriveKeypairHard = /*#__PURE__*/withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_hard(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc));
return bridge.resultU8a();
export const sr25519DeriveKeypairHard = /*#__PURE__*/ withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_hard(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc));
return bridge.resultU8a();
});
export const sr25519DeriveKeypairSoft = /*#__PURE__*/withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_soft(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc));
return bridge.resultU8a();
export const sr25519DeriveKeypairSoft = /*#__PURE__*/ withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_soft(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc));
return bridge.resultU8a();
});
export const sr25519DerivePublicSoft = /*#__PURE__*/withWasm((wasm, pubkey, cc) => {
wasm.ext_sr_derive_public_soft(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(cc));
return bridge.resultU8a();
export const sr25519DerivePublicSoft = /*#__PURE__*/ withWasm((wasm, pubkey, cc) => {
wasm.ext_sr_derive_public_soft(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(cc));
return bridge.resultU8a();
});
export const sr25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => {
wasm.ext_sr_from_seed(8, ...bridge.allocU8a(seed));
return bridge.resultU8a();
export const sr25519KeypairFromSeed = /*#__PURE__*/ withWasm((wasm, seed) => {
wasm.ext_sr_from_seed(8, ...bridge.allocU8a(seed));
return bridge.resultU8a();
});
export const sr25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, secret, message) => {
wasm.ext_sr_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret), ...bridge.allocU8a(message));
return bridge.resultU8a();
export const sr25519Sign = /*#__PURE__*/ withWasm((wasm, pubkey, secret, message) => {
wasm.ext_sr_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret), ...bridge.allocU8a(message));
return bridge.resultU8a();
});
export const sr25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_sr_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey));
return ret !== 0;
export const sr25519Verify = /*#__PURE__*/ withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_sr_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey));
return ret !== 0;
});
export const sr25519Agree = /*#__PURE__*/withWasm((wasm, pubkey, secret) => {
wasm.ext_sr_agree(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret));
return bridge.resultU8a();
export const sr25519Agree = /*#__PURE__*/ withWasm((wasm, pubkey, secret) => {
wasm.ext_sr_agree(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret));
return bridge.resultU8a();
});
export const vrfSign = /*#__PURE__*/withWasm((wasm, secret, context, message, extra) => {
wasm.ext_vrf_sign(8, ...bridge.allocU8a(secret), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra));
return bridge.resultU8a();
export const vrfSign = /*#__PURE__*/ withWasm((wasm, secret, context, message, extra) => {
wasm.ext_vrf_sign(8, ...bridge.allocU8a(secret), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra));
return bridge.resultU8a();
});
export const vrfVerify = /*#__PURE__*/withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
const ret = wasm.ext_vrf_verify(...bridge.allocU8a(pubkey), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra), ...bridge.allocU8a(outAndProof));
return ret !== 0;
export const vrfVerify = /*#__PURE__*/ withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
const ret = wasm.ext_vrf_verify(...bridge.allocU8a(pubkey), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra), ...bridge.allocU8a(outAndProof));
return ret !== 0;
});
export const blake2b = /*#__PURE__*/withWasm((wasm, data, key, size) => {
wasm.ext_blake2b(8, ...bridge.allocU8a(data), ...bridge.allocU8a(key), size);
return bridge.resultU8a();
export const blake2b = /*#__PURE__*/ withWasm((wasm, data, key, size) => {
wasm.ext_blake2b(8, ...bridge.allocU8a(data), ...bridge.allocU8a(key), size);
return bridge.resultU8a();
});
export const hmacSha256 = /*#__PURE__*/withWasm((wasm, key, data) => {
wasm.ext_hmac_sha256(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data));
return bridge.resultU8a();
export const hmacSha256 = /*#__PURE__*/ withWasm((wasm, key, data) => {
wasm.ext_hmac_sha256(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data));
return bridge.resultU8a();
});
export const hmacSha512 = /*#__PURE__*/withWasm((wasm, key, data) => {
wasm.ext_hmac_sha512(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data));
return bridge.resultU8a();
export const hmacSha512 = /*#__PURE__*/ withWasm((wasm, key, data) => {
wasm.ext_hmac_sha512(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data));
return bridge.resultU8a();
});
export const keccak256 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_keccak256(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
export const keccak256 = /*#__PURE__*/ withWasm((wasm, data) => {
wasm.ext_keccak256(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
});
export const keccak512 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_keccak512(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
export const keccak512 = /*#__PURE__*/ withWasm((wasm, data) => {
wasm.ext_keccak512(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
});
export const pbkdf2 = /*#__PURE__*/withWasm((wasm, data, salt, rounds) => {
wasm.ext_pbkdf2(8, ...bridge.allocU8a(data), ...bridge.allocU8a(salt), rounds);
return bridge.resultU8a();
export const pbkdf2 = /*#__PURE__*/ withWasm((wasm, data, salt, rounds) => {
wasm.ext_pbkdf2(8, ...bridge.allocU8a(data), ...bridge.allocU8a(salt), rounds);
return bridge.resultU8a();
});
export const scrypt = /*#__PURE__*/withWasm((wasm, password, salt, log2n, r, p) => {
wasm.ext_scrypt(8, ...bridge.allocU8a(password), ...bridge.allocU8a(salt), log2n, r, p);
return bridge.resultU8a();
export const scrypt = /*#__PURE__*/ withWasm((wasm, password, salt, log2n, r, p) => {
wasm.ext_scrypt(8, ...bridge.allocU8a(password), ...bridge.allocU8a(salt), log2n, r, p);
return bridge.resultU8a();
});
export const sha256 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_sha256(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
export const sha256 = /*#__PURE__*/ withWasm((wasm, data) => {
wasm.ext_sha256(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
});
export const sha512 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_sha512(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
export const sha512 = /*#__PURE__*/ withWasm((wasm, data) => {
wasm.ext_sha512(8, ...bridge.allocU8a(data));
return bridge.resultU8a();
});
export const twox = /*#__PURE__*/withWasm((wasm, data, rounds) => {
wasm.ext_twox(8, ...bridge.allocU8a(data), rounds);
return bridge.resultU8a();
export const twox = /*#__PURE__*/ withWasm((wasm, data, rounds) => {
wasm.ext_twox(8, ...bridge.allocU8a(data), rounds);
return bridge.resultU8a();
});
export function isReady() {
return !!bridge.wasm;
return !!bridge.wasm;
}
export async function waitReady() {
try {
const wasm = await initBridge();
return !!wasm;
} catch {
return false;
}
}
try {
const wasm = await initBridge();
return !!wasm;
}
catch {
return false;
}
}
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.blake2b = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = void 0;
Object.defineProperty(exports, "bridge", {
enumerable: true,
get: function () {
return _init.bridge;
}
});
exports.hmacSha512 = exports.hmacSha256 = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = void 0;
exports.isReady = isReady;
exports.keccak512 = exports.keccak256 = void 0;
Object.defineProperty(exports, "packageInfo", {
enumerable: true,
get: function () {
return _packageInfo.packageInfo;
}
});
exports.vrfVerify = exports.vrfSign = exports.twox = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.sr25519Agree = exports.sha512 = exports.sha256 = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1FromSeed = exports.secp256k1Expand = exports.secp256k1Compress = exports.scrypt = exports.pbkdf2 = void 0;
exports.waitReady = waitReady;
var _init = require("./init");
var _packageInfo = require("./packageInfo");
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
Object.defineProperty(exports, "__esModule", { value: true });
exports.waitReady = exports.isReady = exports.twox = exports.sha512 = exports.sha256 = exports.scrypt = exports.pbkdf2 = exports.keccak512 = exports.keccak256 = exports.hmacSha512 = exports.hmacSha256 = exports.blake2b = exports.vrfVerify = exports.vrfSign = exports.sr25519Agree = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1Expand = exports.secp256k1Compress = exports.secp256k1FromSeed = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = exports.bridge = exports.packageInfo = void 0;
const init_1 = require("./init");
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_1.bridge; } });
var packageInfo_1 = require("./packageInfo");
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_1.packageInfo; } });
/**

@@ -44,182 +23,150 @@ * @internal

function withWasm(fn) {
return function () {
if (!_init.bridge.wasm) {
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.');
}
for (var _len = arguments.length, params = new Array(_len), _key = 0; _key < _len; _key++) {
params[_key] = arguments[_key];
}
return fn(_init.bridge.wasm, ...params);
};
return (...params) => {
if (!init_1.bridge.wasm) {
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.');
}
return fn(init_1.bridge.wasm, ...params);
};
}
const bip39Generate = /*#__PURE__*/withWasm((wasm, words) => {
wasm.ext_bip39_generate(8, words);
return _init.bridge.resultString();
exports.bip39Generate = withWasm((wasm, words) => {
wasm.ext_bip39_generate(8, words);
return init_1.bridge.resultString();
});
exports.bip39Generate = bip39Generate;
const bip39ToEntropy = /*#__PURE__*/withWasm((wasm, phrase) => {
wasm.ext_bip39_to_entropy(8, ..._init.bridge.allocString(phrase));
return _init.bridge.resultU8a();
exports.bip39ToEntropy = withWasm((wasm, phrase) => {
wasm.ext_bip39_to_entropy(8, ...init_1.bridge.allocString(phrase));
return init_1.bridge.resultU8a();
});
exports.bip39ToEntropy = bip39ToEntropy;
const bip39ToMiniSecret = /*#__PURE__*/withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_mini_secret(8, ..._init.bridge.allocString(phrase), ..._init.bridge.allocString(password));
return _init.bridge.resultU8a();
exports.bip39ToMiniSecret = withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_mini_secret(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password));
return init_1.bridge.resultU8a();
});
exports.bip39ToMiniSecret = bip39ToMiniSecret;
const bip39ToSeed = /*#__PURE__*/withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_seed(8, ..._init.bridge.allocString(phrase), ..._init.bridge.allocString(password));
return _init.bridge.resultU8a();
exports.bip39ToSeed = withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_seed(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password));
return init_1.bridge.resultU8a();
});
exports.bip39ToSeed = bip39ToSeed;
const bip39Validate = /*#__PURE__*/withWasm((wasm, phrase) => {
const ret = wasm.ext_bip39_validate(..._init.bridge.allocString(phrase));
return ret !== 0;
exports.bip39Validate = withWasm((wasm, phrase) => {
const ret = wasm.ext_bip39_validate(...init_1.bridge.allocString(phrase));
return ret !== 0;
});
exports.bip39Validate = bip39Validate;
const ed25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => {
wasm.ext_ed_from_seed(8, ..._init.bridge.allocU8a(seed));
return _init.bridge.resultU8a();
exports.ed25519KeypairFromSeed = withWasm((wasm, seed) => {
wasm.ext_ed_from_seed(8, ...init_1.bridge.allocU8a(seed));
return init_1.bridge.resultU8a();
});
exports.ed25519KeypairFromSeed = ed25519KeypairFromSeed;
const ed25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, seckey, message) => {
wasm.ext_ed_sign(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(seckey), ..._init.bridge.allocU8a(message));
return _init.bridge.resultU8a();
exports.ed25519Sign = withWasm((wasm, pubkey, seckey, message) => {
wasm.ext_ed_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(seckey), ...init_1.bridge.allocU8a(message));
return init_1.bridge.resultU8a();
});
exports.ed25519Sign = ed25519Sign;
const ed25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_ed_verify(..._init.bridge.allocU8a(signature), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(pubkey));
return ret !== 0;
exports.ed25519Verify = withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_ed_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey));
return ret !== 0;
});
exports.ed25519Verify = ed25519Verify;
const secp256k1FromSeed = /*#__PURE__*/withWasm((wasm, seckey) => {
wasm.ext_secp_from_seed(8, ..._init.bridge.allocU8a(seckey));
return _init.bridge.resultU8a();
exports.secp256k1FromSeed = withWasm((wasm, seckey) => {
wasm.ext_secp_from_seed(8, ...init_1.bridge.allocU8a(seckey));
return init_1.bridge.resultU8a();
});
exports.secp256k1FromSeed = secp256k1FromSeed;
const secp256k1Compress = /*#__PURE__*/withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_compress(8, ..._init.bridge.allocU8a(pubkey));
return _init.bridge.resultU8a();
exports.secp256k1Compress = withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_compress(8, ...init_1.bridge.allocU8a(pubkey));
return init_1.bridge.resultU8a();
});
exports.secp256k1Compress = secp256k1Compress;
const secp256k1Expand = /*#__PURE__*/withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_expand(8, ..._init.bridge.allocU8a(pubkey));
return _init.bridge.resultU8a();
exports.secp256k1Expand = withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_expand(8, ...init_1.bridge.allocU8a(pubkey));
return init_1.bridge.resultU8a();
});
exports.secp256k1Expand = secp256k1Expand;
const secp256k1Recover = /*#__PURE__*/withWasm((wasm, msgHash, sig, recovery) => {
wasm.ext_secp_recover(8, ..._init.bridge.allocU8a(msgHash), ..._init.bridge.allocU8a(sig), recovery);
return _init.bridge.resultU8a();
exports.secp256k1Recover = withWasm((wasm, msgHash, sig, recovery) => {
wasm.ext_secp_recover(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(sig), recovery);
return init_1.bridge.resultU8a();
});
exports.secp256k1Recover = secp256k1Recover;
const secp256k1Sign = /*#__PURE__*/withWasm((wasm, msgHash, seckey) => {
wasm.ext_secp_sign(8, ..._init.bridge.allocU8a(msgHash), ..._init.bridge.allocU8a(seckey));
return _init.bridge.resultU8a();
exports.secp256k1Sign = withWasm((wasm, msgHash, seckey) => {
wasm.ext_secp_sign(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(seckey));
return init_1.bridge.resultU8a();
});
exports.secp256k1Sign = secp256k1Sign;
const sr25519DeriveKeypairHard = /*#__PURE__*/withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_hard(8, ..._init.bridge.allocU8a(pair), ..._init.bridge.allocU8a(cc));
return _init.bridge.resultU8a();
exports.sr25519DeriveKeypairHard = withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_hard(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc));
return init_1.bridge.resultU8a();
});
exports.sr25519DeriveKeypairHard = sr25519DeriveKeypairHard;
const sr25519DeriveKeypairSoft = /*#__PURE__*/withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_soft(8, ..._init.bridge.allocU8a(pair), ..._init.bridge.allocU8a(cc));
return _init.bridge.resultU8a();
exports.sr25519DeriveKeypairSoft = withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_soft(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc));
return init_1.bridge.resultU8a();
});
exports.sr25519DeriveKeypairSoft = sr25519DeriveKeypairSoft;
const sr25519DerivePublicSoft = /*#__PURE__*/withWasm((wasm, pubkey, cc) => {
wasm.ext_sr_derive_public_soft(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(cc));
return _init.bridge.resultU8a();
exports.sr25519DerivePublicSoft = withWasm((wasm, pubkey, cc) => {
wasm.ext_sr_derive_public_soft(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(cc));
return init_1.bridge.resultU8a();
});
exports.sr25519DerivePublicSoft = sr25519DerivePublicSoft;
const sr25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => {
wasm.ext_sr_from_seed(8, ..._init.bridge.allocU8a(seed));
return _init.bridge.resultU8a();
exports.sr25519KeypairFromSeed = withWasm((wasm, seed) => {
wasm.ext_sr_from_seed(8, ...init_1.bridge.allocU8a(seed));
return init_1.bridge.resultU8a();
});
exports.sr25519KeypairFromSeed = sr25519KeypairFromSeed;
const sr25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, secret, message) => {
wasm.ext_sr_sign(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(secret), ..._init.bridge.allocU8a(message));
return _init.bridge.resultU8a();
exports.sr25519Sign = withWasm((wasm, pubkey, secret, message) => {
wasm.ext_sr_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(message));
return init_1.bridge.resultU8a();
});
exports.sr25519Sign = sr25519Sign;
const sr25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_sr_verify(..._init.bridge.allocU8a(signature), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(pubkey));
return ret !== 0;
exports.sr25519Verify = withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_sr_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey));
return ret !== 0;
});
exports.sr25519Verify = sr25519Verify;
const sr25519Agree = /*#__PURE__*/withWasm((wasm, pubkey, secret) => {
wasm.ext_sr_agree(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(secret));
return _init.bridge.resultU8a();
exports.sr25519Agree = withWasm((wasm, pubkey, secret) => {
wasm.ext_sr_agree(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret));
return init_1.bridge.resultU8a();
});
exports.sr25519Agree = sr25519Agree;
const vrfSign = /*#__PURE__*/withWasm((wasm, secret, context, message, extra) => {
wasm.ext_vrf_sign(8, ..._init.bridge.allocU8a(secret), ..._init.bridge.allocU8a(context), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(extra));
return _init.bridge.resultU8a();
exports.vrfSign = withWasm((wasm, secret, context, message, extra) => {
wasm.ext_vrf_sign(8, ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra));
return init_1.bridge.resultU8a();
});
exports.vrfSign = vrfSign;
const vrfVerify = /*#__PURE__*/withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
const ret = wasm.ext_vrf_verify(..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(context), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(extra), ..._init.bridge.allocU8a(outAndProof));
return ret !== 0;
exports.vrfVerify = withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
const ret = wasm.ext_vrf_verify(...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra), ...init_1.bridge.allocU8a(outAndProof));
return ret !== 0;
});
exports.vrfVerify = vrfVerify;
const blake2b = /*#__PURE__*/withWasm((wasm, data, key, size) => {
wasm.ext_blake2b(8, ..._init.bridge.allocU8a(data), ..._init.bridge.allocU8a(key), size);
return _init.bridge.resultU8a();
exports.blake2b = withWasm((wasm, data, key, size) => {
wasm.ext_blake2b(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(key), size);
return init_1.bridge.resultU8a();
});
exports.blake2b = blake2b;
const hmacSha256 = /*#__PURE__*/withWasm((wasm, key, data) => {
wasm.ext_hmac_sha256(8, ..._init.bridge.allocU8a(key), ..._init.bridge.allocU8a(data));
return _init.bridge.resultU8a();
exports.hmacSha256 = withWasm((wasm, key, data) => {
wasm.ext_hmac_sha256(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
});
exports.hmacSha256 = hmacSha256;
const hmacSha512 = /*#__PURE__*/withWasm((wasm, key, data) => {
wasm.ext_hmac_sha512(8, ..._init.bridge.allocU8a(key), ..._init.bridge.allocU8a(data));
return _init.bridge.resultU8a();
exports.hmacSha512 = withWasm((wasm, key, data) => {
wasm.ext_hmac_sha512(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
});
exports.hmacSha512 = hmacSha512;
const keccak256 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_keccak256(8, ..._init.bridge.allocU8a(data));
return _init.bridge.resultU8a();
exports.keccak256 = withWasm((wasm, data) => {
wasm.ext_keccak256(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
});
exports.keccak256 = keccak256;
const keccak512 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_keccak512(8, ..._init.bridge.allocU8a(data));
return _init.bridge.resultU8a();
exports.keccak512 = withWasm((wasm, data) => {
wasm.ext_keccak512(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
});
exports.keccak512 = keccak512;
const pbkdf2 = /*#__PURE__*/withWasm((wasm, data, salt, rounds) => {
wasm.ext_pbkdf2(8, ..._init.bridge.allocU8a(data), ..._init.bridge.allocU8a(salt), rounds);
return _init.bridge.resultU8a();
exports.pbkdf2 = withWasm((wasm, data, salt, rounds) => {
wasm.ext_pbkdf2(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(salt), rounds);
return init_1.bridge.resultU8a();
});
exports.pbkdf2 = pbkdf2;
const scrypt = /*#__PURE__*/withWasm((wasm, password, salt, log2n, r, p) => {
wasm.ext_scrypt(8, ..._init.bridge.allocU8a(password), ..._init.bridge.allocU8a(salt), log2n, r, p);
return _init.bridge.resultU8a();
exports.scrypt = withWasm((wasm, password, salt, log2n, r, p) => {
wasm.ext_scrypt(8, ...init_1.bridge.allocU8a(password), ...init_1.bridge.allocU8a(salt), log2n, r, p);
return init_1.bridge.resultU8a();
});
exports.scrypt = scrypt;
const sha256 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_sha256(8, ..._init.bridge.allocU8a(data));
return _init.bridge.resultU8a();
exports.sha256 = withWasm((wasm, data) => {
wasm.ext_sha256(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
});
exports.sha256 = sha256;
const sha512 = /*#__PURE__*/withWasm((wasm, data) => {
wasm.ext_sha512(8, ..._init.bridge.allocU8a(data));
return _init.bridge.resultU8a();
exports.sha512 = withWasm((wasm, data) => {
wasm.ext_sha512(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
});
exports.sha512 = sha512;
const twox = /*#__PURE__*/withWasm((wasm, data, rounds) => {
wasm.ext_twox(8, ..._init.bridge.allocU8a(data), rounds);
return _init.bridge.resultU8a();
exports.twox = withWasm((wasm, data, rounds) => {
wasm.ext_twox(8, ...init_1.bridge.allocU8a(data), rounds);
return init_1.bridge.resultU8a();
});
exports.twox = twox;
function isReady() {
return !!_init.bridge.wasm;
return !!init_1.bridge.wasm;
}
exports.isReady = isReady;
async function waitReady() {
try {
const wasm = await (0, _init.initBridge)();
return !!wasm;
} catch {
return false;
}
}
try {
const wasm = await (0, init_1.initBridge)();
return !!wasm;
}
catch {
return false;
}
}
exports.waitReady = waitReady;
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.default = void 0;
var _packageInfo = require("@polkadot/wasm-bridge/cjs/packageInfo");
var _packageInfo2 = require("@polkadot/wasm-crypto-asmjs/cjs/packageInfo");
var _packageInfo3 = require("@polkadot/wasm-crypto-init/cjs/packageInfo");
var _packageInfo4 = require("@polkadot/wasm-crypto-wasm/cjs/packageInfo");
var _packageInfo5 = require("@polkadot/wasm-util/cjs/packageInfo");
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
var _default = [_packageInfo.packageInfo, _packageInfo2.packageInfo, _packageInfo3.packageInfo, _packageInfo4.packageInfo, _packageInfo5.packageInfo];
exports.default = _default;
Object.defineProperty(exports, "__esModule", { value: true });
const packageInfo_1 = require("@polkadot/wasm-bridge/cjs/packageInfo");
const packageInfo_2 = require("@polkadot/wasm-crypto-asmjs/cjs/packageInfo");
const packageInfo_3 = require("@polkadot/wasm-crypto-init/cjs/packageInfo");
const packageInfo_4 = require("@polkadot/wasm-crypto-wasm/cjs/packageInfo");
const packageInfo_5 = require("@polkadot/wasm-util/cjs/packageInfo");
exports.default = [packageInfo_1.packageInfo, packageInfo_2.packageInfo, packageInfo_3.packageInfo, packageInfo_4.packageInfo, packageInfo_5.packageInfo];
"use strict";
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
var _util = require("@polkadot/util");
var _detectOther = _interopRequireDefault(require("./detectOther"));
var _packageInfo = require("./packageInfo");
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
// Do not edit, auto-generated by @polkadot/dev
(0, _util.detectPackage)(_packageInfo.packageInfo, null, _detectOther.default);
Object.defineProperty(exports, "__esModule", { value: true });
const tslib_1 = require("tslib");
const util_1 = require("@polkadot/util");
const detectOther_1 = tslib_1.__importDefault(require("./detectOther"));
const packageInfo_1 = require("./packageInfo");
(0, util_1.detectPackage)(packageInfo_1.packageInfo, null, detectOther_1.default);
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
Object.defineProperty(exports, "__esModule", { value: true });
const tslib_1 = require("tslib");
require("./detectPackage");
var _bundle = require("./bundle");
Object.keys(_bundle).forEach(function (key) {
if (key === "default" || key === "__esModule") return;
if (key in exports && exports[key] === _bundle[key]) return;
Object.defineProperty(exports, key, {
enumerable: true,
get: function () {
return _bundle[key];
}
});
});
tslib_1.__exportStar(require("./bundle"), exports);
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.bridge = void 0;
exports.initBridge = initBridge;
var _wasmBridge = require("@polkadot/wasm-bridge");
var _wasmCryptoInit = require("@polkadot/wasm-crypto-init");
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
Object.defineProperty(exports, "__esModule", { value: true });
exports.initBridge = exports.bridge = void 0;
const wasm_bridge_1 = require("@polkadot/wasm-bridge");
const wasm_crypto_init_1 = require("@polkadot/wasm-crypto-init");
/**

@@ -19,4 +12,3 @@ * @name bridge

*/
const bridge = new _wasmBridge.Bridge(_wasmCryptoInit.createWasm);
exports.bridge = new wasm_bridge_1.Bridge(wasm_crypto_init_1.createWasm);
/**

@@ -27,5 +19,5 @@ * @name initBridge

*/
exports.bridge = bridge;
async function initBridge(createWasm) {
return bridge.init(createWasm);
}
return exports.bridge.init(createWasm);
}
exports.initBridge = initBridge;
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.initWasm = initWasm;
var _none = require("@polkadot/wasm-crypto-init/cjs/none");
var _init = require("./init");
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const none_1 = require("@polkadot/wasm-crypto-init/cjs/none");
const init_1 = require("./init");
/**

@@ -22,6 +16,7 @@ * @name initWasm

async function initWasm() {
await (0, _init.initBridge)(_none.createWasm);
await (0, init_1.initBridge)(none_1.createWasm);
}
exports.initWasm = initWasm;
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.initWasm = initWasm;
var _asm = require("@polkadot/wasm-crypto-init/cjs/asm");
var _init = require("./init");
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const asm_1 = require("@polkadot/wasm-crypto-init/cjs/asm");
const init_1 = require("./init");
/**

@@ -22,6 +16,7 @@ * @name initWasm

async function initWasm() {
await (0, _init.initBridge)(_asm.createWasm);
await (0, init_1.initBridge)(asm_1.createWasm);
}
exports.initWasm = initWasm;
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.initWasm = initWasm;
var _wasm = require("@polkadot/wasm-crypto-init/cjs/wasm");
var _init = require("./init");
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const wasm_1 = require("@polkadot/wasm-crypto-init/cjs/wasm");
const init_1 = require("./init");
/**

@@ -22,6 +16,7 @@ * @name initWasm

async function initWasm() {
await (0, _init.initBridge)(_wasm.createWasm);
await (0, init_1.initBridge)(wasm_1.createWasm);
}
exports.initWasm = initWasm;
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.initWasm = initWasm;
var _both = require("@polkadot/wasm-crypto-init/cjs/both");
var _init = require("./init");
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const both_1 = require("@polkadot/wasm-crypto-init/cjs/both");
const init_1 = require("./init");
/**

@@ -22,6 +16,7 @@ * @name initWasm

async function initWasm() {
await (0, _init.initBridge)(_both.createWasm);
await (0, init_1.initBridge)(both_1.createWasm);
}
exports.initWasm = initWasm;
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
Object.defineProperty(exports, "__esModule", { value: true });
exports.packageInfo = void 0;
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
// Do not edit, auto-generated by @polkadot/dev
const packageInfo = {
name: '@polkadot/wasm-crypto',
path: typeof __dirname === 'string' ? __dirname : 'auto',
type: 'cjs',
version: '6.4.1'
};
exports.packageInfo = packageInfo;
exports.packageInfo = { name: '@polkadot/wasm-crypto', path: typeof __dirname === 'string' ? __dirname : 'auto', type: 'cjs', version: '7.0.1' };

@@ -1,4 +0,1 @@

// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { packageInfo as bridgeInfo } from '@polkadot/wasm-bridge/packageInfo';

@@ -9,2 +6,2 @@ import { packageInfo as asmInfo } from '@polkadot/wasm-crypto-asmjs/packageInfo';

import { packageInfo as utilInfo } from '@polkadot/wasm-util/packageInfo';
export default [bridgeInfo, asmInfo, initInfo, wasmInfo, utilInfo];
export default [bridgeInfo, asmInfo, initInfo, wasmInfo, utilInfo];

@@ -1,9 +0,4 @@

// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
// Do not edit, auto-generated by @polkadot/dev
import { detectPackage } from '@polkadot/util';
import others from "./detectOther.js";
import { packageInfo } from "./packageInfo.js";
detectPackage(packageInfo, null, others);
import others from './detectOther.js';
import { packageInfo } from './packageInfo.js';
detectPackage(packageInfo, null, others);

@@ -1,5 +0,2 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import "./detectPackage.js";
export * from "./bundle.js";
import './detectPackage.js';
export * from './bundle.js';

@@ -1,7 +0,3 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { Bridge } from '@polkadot/wasm-bridge';
import { createWasm } from '@polkadot/wasm-crypto-init';
/**

@@ -14,3 +10,2 @@ * @name bridge

export const bridge = new Bridge(createWasm);
/**

@@ -22,3 +17,3 @@ * @name initBridge

export async function initBridge(createWasm) {
return bridge.init(createWasm);
}
return bridge.init(createWasm);
}

@@ -1,7 +0,3 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { createWasm } from '@polkadot/wasm-crypto-init/none';
import { initBridge } from "./init.js";
import { initBridge } from './init.js';
/**

@@ -17,6 +13,6 @@ * @name initWasm

export async function initWasm() {
await initBridge(createWasm);
await initBridge(createWasm);
}
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});

@@ -1,7 +0,3 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { createWasm } from '@polkadot/wasm-crypto-init/asm';
import { initBridge } from "./init.js";
import { initBridge } from './init.js';
/**

@@ -17,6 +13,6 @@ * @name initWasm

export async function initWasm() {
await initBridge(createWasm);
await initBridge(createWasm);
}
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});

@@ -1,7 +0,3 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { createWasm } from '@polkadot/wasm-crypto-init/wasm';
import { initBridge } from "./init.js";
import { initBridge } from './init.js';
/**

@@ -17,6 +13,6 @@ * @name initWasm

export async function initWasm() {
await initBridge(createWasm);
await initBridge(createWasm);
}
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});

@@ -1,7 +0,3 @@

// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
import { createWasm } from '@polkadot/wasm-crypto-init/both';
import { initBridge } from "./init.js";
import { initBridge } from './init.js';
/**

@@ -17,6 +13,6 @@ * @name initWasm

export async function initWasm() {
await initBridge(createWasm);
await initBridge(createWasm);
}
initWasm().catch(() => {
// cannot happen, initWasm doesn't throw
});
// cannot happen, initWasm doesn't throw
});

@@ -31,3 +31,3 @@ {

"type": "module",
"version": "6.4.1",
"version": "7.0.1",
"main": "./cjs/index.js",

@@ -84,3 +84,6 @@ "module": "./index.js",

},
"./package.json": "./package.json",
"./package.json": {
"require": "./cjs/package.json",
"default": "./package.json"
},
"./packageInfo.js": {

@@ -98,8 +101,8 @@ "types": "./packageInfo.d.ts",

"dependencies": {
"@babel/runtime": "^7.20.6",
"@polkadot/wasm-bridge": "6.4.1",
"@polkadot/wasm-crypto-asmjs": "6.4.1",
"@polkadot/wasm-crypto-init": "6.4.1",
"@polkadot/wasm-crypto-wasm": "6.4.1",
"@polkadot/wasm-util": "6.4.1"
"@polkadot/wasm-bridge": "7.0.1",
"@polkadot/wasm-crypto-asmjs": "7.0.1",
"@polkadot/wasm-crypto-init": "7.0.1",
"@polkadot/wasm-crypto-wasm": "7.0.1",
"@polkadot/wasm-util": "7.0.1",
"tslib": "^2.5.0"
},

@@ -106,0 +109,0 @@ "peerDependencies": {

@@ -1,11 +0,1 @@

// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors
// SPDX-License-Identifier: Apache-2.0
// Do not edit, auto-generated by @polkadot/dev
export const packageInfo = {
name: '@polkadot/wasm-crypto',
path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto',
type: 'esm',
version: '6.4.1'
};
export const packageInfo = { name: '@polkadot/wasm-crypto', path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', type: 'esm', version: '7.0.1' };

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc