@polkadot/wasm-crypto
Advanced tools
Comparing version 6.4.1 to 7.0.1
233
bundle.js
@@ -1,12 +0,4 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { bridge, initBridge } from "./init.js"; | ||
export { packageInfo } from "./packageInfo.js"; | ||
import { bridge, initBridge } from './init.js'; | ||
export { packageInfo } from './packageInfo.js'; | ||
export { bridge }; | ||
// Removes the first parameter (expected as WasmCryptoInstance) and leaves the | ||
// rest of the parameters in-tack. This allows us to dynamically create a function | ||
// return from the withWasm helper | ||
/** | ||
@@ -27,147 +19,148 @@ * @internal | ||
function withWasm(fn) { | ||
return (...params) => { | ||
if (!bridge.wasm) { | ||
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.'); | ||
} | ||
return fn(bridge.wasm, ...params); | ||
}; | ||
return (...params) => { | ||
if (!bridge.wasm) { | ||
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.'); | ||
} | ||
return fn(bridge.wasm, ...params); | ||
}; | ||
} | ||
export const bip39Generate = /*#__PURE__*/withWasm((wasm, words) => { | ||
wasm.ext_bip39_generate(8, words); | ||
return bridge.resultString(); | ||
export const bip39Generate = /*#__PURE__*/ withWasm((wasm, words) => { | ||
wasm.ext_bip39_generate(8, words); | ||
return bridge.resultString(); | ||
}); | ||
export const bip39ToEntropy = /*#__PURE__*/withWasm((wasm, phrase) => { | ||
wasm.ext_bip39_to_entropy(8, ...bridge.allocString(phrase)); | ||
return bridge.resultU8a(); | ||
export const bip39ToEntropy = /*#__PURE__*/ withWasm((wasm, phrase) => { | ||
wasm.ext_bip39_to_entropy(8, ...bridge.allocString(phrase)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const bip39ToMiniSecret = /*#__PURE__*/withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_mini_secret(8, ...bridge.allocString(phrase), ...bridge.allocString(password)); | ||
return bridge.resultU8a(); | ||
export const bip39ToMiniSecret = /*#__PURE__*/ withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_mini_secret(8, ...bridge.allocString(phrase), ...bridge.allocString(password)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const bip39ToSeed = /*#__PURE__*/withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_seed(8, ...bridge.allocString(phrase), ...bridge.allocString(password)); | ||
return bridge.resultU8a(); | ||
export const bip39ToSeed = /*#__PURE__*/ withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_seed(8, ...bridge.allocString(phrase), ...bridge.allocString(password)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const bip39Validate = /*#__PURE__*/withWasm((wasm, phrase) => { | ||
const ret = wasm.ext_bip39_validate(...bridge.allocString(phrase)); | ||
return ret !== 0; | ||
export const bip39Validate = /*#__PURE__*/ withWasm((wasm, phrase) => { | ||
const ret = wasm.ext_bip39_validate(...bridge.allocString(phrase)); | ||
return ret !== 0; | ||
}); | ||
export const ed25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => { | ||
wasm.ext_ed_from_seed(8, ...bridge.allocU8a(seed)); | ||
return bridge.resultU8a(); | ||
export const ed25519KeypairFromSeed = /*#__PURE__*/ withWasm((wasm, seed) => { | ||
wasm.ext_ed_from_seed(8, ...bridge.allocU8a(seed)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const ed25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, seckey, message) => { | ||
wasm.ext_ed_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(seckey), ...bridge.allocU8a(message)); | ||
return bridge.resultU8a(); | ||
export const ed25519Sign = /*#__PURE__*/ withWasm((wasm, pubkey, seckey, message) => { | ||
wasm.ext_ed_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(seckey), ...bridge.allocU8a(message)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const ed25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_ed_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
export const ed25519Verify = /*#__PURE__*/ withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_ed_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
}); | ||
export const secp256k1FromSeed = /*#__PURE__*/withWasm((wasm, seckey) => { | ||
wasm.ext_secp_from_seed(8, ...bridge.allocU8a(seckey)); | ||
return bridge.resultU8a(); | ||
export const secp256k1FromSeed = /*#__PURE__*/ withWasm((wasm, seckey) => { | ||
wasm.ext_secp_from_seed(8, ...bridge.allocU8a(seckey)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const secp256k1Compress = /*#__PURE__*/withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_compress(8, ...bridge.allocU8a(pubkey)); | ||
return bridge.resultU8a(); | ||
export const secp256k1Compress = /*#__PURE__*/ withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_compress(8, ...bridge.allocU8a(pubkey)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const secp256k1Expand = /*#__PURE__*/withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_expand(8, ...bridge.allocU8a(pubkey)); | ||
return bridge.resultU8a(); | ||
export const secp256k1Expand = /*#__PURE__*/ withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_expand(8, ...bridge.allocU8a(pubkey)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const secp256k1Recover = /*#__PURE__*/withWasm((wasm, msgHash, sig, recovery) => { | ||
wasm.ext_secp_recover(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(sig), recovery); | ||
return bridge.resultU8a(); | ||
export const secp256k1Recover = /*#__PURE__*/ withWasm((wasm, msgHash, sig, recovery) => { | ||
wasm.ext_secp_recover(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(sig), recovery); | ||
return bridge.resultU8a(); | ||
}); | ||
export const secp256k1Sign = /*#__PURE__*/withWasm((wasm, msgHash, seckey) => { | ||
wasm.ext_secp_sign(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(seckey)); | ||
return bridge.resultU8a(); | ||
export const secp256k1Sign = /*#__PURE__*/ withWasm((wasm, msgHash, seckey) => { | ||
wasm.ext_secp_sign(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(seckey)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sr25519DeriveKeypairHard = /*#__PURE__*/withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_hard(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc)); | ||
return bridge.resultU8a(); | ||
export const sr25519DeriveKeypairHard = /*#__PURE__*/ withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_hard(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sr25519DeriveKeypairSoft = /*#__PURE__*/withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_soft(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc)); | ||
return bridge.resultU8a(); | ||
export const sr25519DeriveKeypairSoft = /*#__PURE__*/ withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_soft(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sr25519DerivePublicSoft = /*#__PURE__*/withWasm((wasm, pubkey, cc) => { | ||
wasm.ext_sr_derive_public_soft(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(cc)); | ||
return bridge.resultU8a(); | ||
export const sr25519DerivePublicSoft = /*#__PURE__*/ withWasm((wasm, pubkey, cc) => { | ||
wasm.ext_sr_derive_public_soft(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(cc)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sr25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => { | ||
wasm.ext_sr_from_seed(8, ...bridge.allocU8a(seed)); | ||
return bridge.resultU8a(); | ||
export const sr25519KeypairFromSeed = /*#__PURE__*/ withWasm((wasm, seed) => { | ||
wasm.ext_sr_from_seed(8, ...bridge.allocU8a(seed)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sr25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, secret, message) => { | ||
wasm.ext_sr_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret), ...bridge.allocU8a(message)); | ||
return bridge.resultU8a(); | ||
export const sr25519Sign = /*#__PURE__*/ withWasm((wasm, pubkey, secret, message) => { | ||
wasm.ext_sr_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret), ...bridge.allocU8a(message)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sr25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_sr_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
export const sr25519Verify = /*#__PURE__*/ withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_sr_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
}); | ||
export const sr25519Agree = /*#__PURE__*/withWasm((wasm, pubkey, secret) => { | ||
wasm.ext_sr_agree(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret)); | ||
return bridge.resultU8a(); | ||
export const sr25519Agree = /*#__PURE__*/ withWasm((wasm, pubkey, secret) => { | ||
wasm.ext_sr_agree(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const vrfSign = /*#__PURE__*/withWasm((wasm, secret, context, message, extra) => { | ||
wasm.ext_vrf_sign(8, ...bridge.allocU8a(secret), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra)); | ||
return bridge.resultU8a(); | ||
export const vrfSign = /*#__PURE__*/ withWasm((wasm, secret, context, message, extra) => { | ||
wasm.ext_vrf_sign(8, ...bridge.allocU8a(secret), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const vrfVerify = /*#__PURE__*/withWasm((wasm, pubkey, context, message, extra, outAndProof) => { | ||
const ret = wasm.ext_vrf_verify(...bridge.allocU8a(pubkey), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra), ...bridge.allocU8a(outAndProof)); | ||
return ret !== 0; | ||
export const vrfVerify = /*#__PURE__*/ withWasm((wasm, pubkey, context, message, extra, outAndProof) => { | ||
const ret = wasm.ext_vrf_verify(...bridge.allocU8a(pubkey), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra), ...bridge.allocU8a(outAndProof)); | ||
return ret !== 0; | ||
}); | ||
export const blake2b = /*#__PURE__*/withWasm((wasm, data, key, size) => { | ||
wasm.ext_blake2b(8, ...bridge.allocU8a(data), ...bridge.allocU8a(key), size); | ||
return bridge.resultU8a(); | ||
export const blake2b = /*#__PURE__*/ withWasm((wasm, data, key, size) => { | ||
wasm.ext_blake2b(8, ...bridge.allocU8a(data), ...bridge.allocU8a(key), size); | ||
return bridge.resultU8a(); | ||
}); | ||
export const hmacSha256 = /*#__PURE__*/withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha256(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
export const hmacSha256 = /*#__PURE__*/ withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha256(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const hmacSha512 = /*#__PURE__*/withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha512(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
export const hmacSha512 = /*#__PURE__*/ withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha512(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const keccak256 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_keccak256(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
export const keccak256 = /*#__PURE__*/ withWasm((wasm, data) => { | ||
wasm.ext_keccak256(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const keccak512 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_keccak512(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
export const keccak512 = /*#__PURE__*/ withWasm((wasm, data) => { | ||
wasm.ext_keccak512(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const pbkdf2 = /*#__PURE__*/withWasm((wasm, data, salt, rounds) => { | ||
wasm.ext_pbkdf2(8, ...bridge.allocU8a(data), ...bridge.allocU8a(salt), rounds); | ||
return bridge.resultU8a(); | ||
export const pbkdf2 = /*#__PURE__*/ withWasm((wasm, data, salt, rounds) => { | ||
wasm.ext_pbkdf2(8, ...bridge.allocU8a(data), ...bridge.allocU8a(salt), rounds); | ||
return bridge.resultU8a(); | ||
}); | ||
export const scrypt = /*#__PURE__*/withWasm((wasm, password, salt, log2n, r, p) => { | ||
wasm.ext_scrypt(8, ...bridge.allocU8a(password), ...bridge.allocU8a(salt), log2n, r, p); | ||
return bridge.resultU8a(); | ||
export const scrypt = /*#__PURE__*/ withWasm((wasm, password, salt, log2n, r, p) => { | ||
wasm.ext_scrypt(8, ...bridge.allocU8a(password), ...bridge.allocU8a(salt), log2n, r, p); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sha256 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_sha256(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
export const sha256 = /*#__PURE__*/ withWasm((wasm, data) => { | ||
wasm.ext_sha256(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const sha512 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_sha512(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
export const sha512 = /*#__PURE__*/ withWasm((wasm, data) => { | ||
wasm.ext_sha512(8, ...bridge.allocU8a(data)); | ||
return bridge.resultU8a(); | ||
}); | ||
export const twox = /*#__PURE__*/withWasm((wasm, data, rounds) => { | ||
wasm.ext_twox(8, ...bridge.allocU8a(data), rounds); | ||
return bridge.resultU8a(); | ||
export const twox = /*#__PURE__*/ withWasm((wasm, data, rounds) => { | ||
wasm.ext_twox(8, ...bridge.allocU8a(data), rounds); | ||
return bridge.resultU8a(); | ||
}); | ||
export function isReady() { | ||
return !!bridge.wasm; | ||
return !!bridge.wasm; | ||
} | ||
export async function waitReady() { | ||
try { | ||
const wasm = await initBridge(); | ||
return !!wasm; | ||
} catch { | ||
return false; | ||
} | ||
} | ||
try { | ||
const wasm = await initBridge(); | ||
return !!wasm; | ||
} | ||
catch { | ||
return false; | ||
} | ||
} |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.blake2b = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = void 0; | ||
Object.defineProperty(exports, "bridge", { | ||
enumerable: true, | ||
get: function () { | ||
return _init.bridge; | ||
} | ||
}); | ||
exports.hmacSha512 = exports.hmacSha256 = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = void 0; | ||
exports.isReady = isReady; | ||
exports.keccak512 = exports.keccak256 = void 0; | ||
Object.defineProperty(exports, "packageInfo", { | ||
enumerable: true, | ||
get: function () { | ||
return _packageInfo.packageInfo; | ||
} | ||
}); | ||
exports.vrfVerify = exports.vrfSign = exports.twox = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.sr25519Agree = exports.sha512 = exports.sha256 = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1FromSeed = exports.secp256k1Expand = exports.secp256k1Compress = exports.scrypt = exports.pbkdf2 = void 0; | ||
exports.waitReady = waitReady; | ||
var _init = require("./init"); | ||
var _packageInfo = require("./packageInfo"); | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.waitReady = exports.isReady = exports.twox = exports.sha512 = exports.sha256 = exports.scrypt = exports.pbkdf2 = exports.keccak512 = exports.keccak256 = exports.hmacSha512 = exports.hmacSha256 = exports.blake2b = exports.vrfVerify = exports.vrfSign = exports.sr25519Agree = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1Expand = exports.secp256k1Compress = exports.secp256k1FromSeed = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = exports.bridge = exports.packageInfo = void 0; | ||
const init_1 = require("./init"); | ||
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_1.bridge; } }); | ||
var packageInfo_1 = require("./packageInfo"); | ||
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_1.packageInfo; } }); | ||
/** | ||
@@ -44,182 +23,150 @@ * @internal | ||
function withWasm(fn) { | ||
return function () { | ||
if (!_init.bridge.wasm) { | ||
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.'); | ||
} | ||
for (var _len = arguments.length, params = new Array(_len), _key = 0; _key < _len; _key++) { | ||
params[_key] = arguments[_key]; | ||
} | ||
return fn(_init.bridge.wasm, ...params); | ||
}; | ||
return (...params) => { | ||
if (!init_1.bridge.wasm) { | ||
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.'); | ||
} | ||
return fn(init_1.bridge.wasm, ...params); | ||
}; | ||
} | ||
const bip39Generate = /*#__PURE__*/withWasm((wasm, words) => { | ||
wasm.ext_bip39_generate(8, words); | ||
return _init.bridge.resultString(); | ||
exports.bip39Generate = withWasm((wasm, words) => { | ||
wasm.ext_bip39_generate(8, words); | ||
return init_1.bridge.resultString(); | ||
}); | ||
exports.bip39Generate = bip39Generate; | ||
const bip39ToEntropy = /*#__PURE__*/withWasm((wasm, phrase) => { | ||
wasm.ext_bip39_to_entropy(8, ..._init.bridge.allocString(phrase)); | ||
return _init.bridge.resultU8a(); | ||
exports.bip39ToEntropy = withWasm((wasm, phrase) => { | ||
wasm.ext_bip39_to_entropy(8, ...init_1.bridge.allocString(phrase)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.bip39ToEntropy = bip39ToEntropy; | ||
const bip39ToMiniSecret = /*#__PURE__*/withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_mini_secret(8, ..._init.bridge.allocString(phrase), ..._init.bridge.allocString(password)); | ||
return _init.bridge.resultU8a(); | ||
exports.bip39ToMiniSecret = withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_mini_secret(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.bip39ToMiniSecret = bip39ToMiniSecret; | ||
const bip39ToSeed = /*#__PURE__*/withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_seed(8, ..._init.bridge.allocString(phrase), ..._init.bridge.allocString(password)); | ||
return _init.bridge.resultU8a(); | ||
exports.bip39ToSeed = withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_seed(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.bip39ToSeed = bip39ToSeed; | ||
const bip39Validate = /*#__PURE__*/withWasm((wasm, phrase) => { | ||
const ret = wasm.ext_bip39_validate(..._init.bridge.allocString(phrase)); | ||
return ret !== 0; | ||
exports.bip39Validate = withWasm((wasm, phrase) => { | ||
const ret = wasm.ext_bip39_validate(...init_1.bridge.allocString(phrase)); | ||
return ret !== 0; | ||
}); | ||
exports.bip39Validate = bip39Validate; | ||
const ed25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => { | ||
wasm.ext_ed_from_seed(8, ..._init.bridge.allocU8a(seed)); | ||
return _init.bridge.resultU8a(); | ||
exports.ed25519KeypairFromSeed = withWasm((wasm, seed) => { | ||
wasm.ext_ed_from_seed(8, ...init_1.bridge.allocU8a(seed)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.ed25519KeypairFromSeed = ed25519KeypairFromSeed; | ||
const ed25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, seckey, message) => { | ||
wasm.ext_ed_sign(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(seckey), ..._init.bridge.allocU8a(message)); | ||
return _init.bridge.resultU8a(); | ||
exports.ed25519Sign = withWasm((wasm, pubkey, seckey, message) => { | ||
wasm.ext_ed_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(seckey), ...init_1.bridge.allocU8a(message)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.ed25519Sign = ed25519Sign; | ||
const ed25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_ed_verify(..._init.bridge.allocU8a(signature), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
exports.ed25519Verify = withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_ed_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
}); | ||
exports.ed25519Verify = ed25519Verify; | ||
const secp256k1FromSeed = /*#__PURE__*/withWasm((wasm, seckey) => { | ||
wasm.ext_secp_from_seed(8, ..._init.bridge.allocU8a(seckey)); | ||
return _init.bridge.resultU8a(); | ||
exports.secp256k1FromSeed = withWasm((wasm, seckey) => { | ||
wasm.ext_secp_from_seed(8, ...init_1.bridge.allocU8a(seckey)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1FromSeed = secp256k1FromSeed; | ||
const secp256k1Compress = /*#__PURE__*/withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_compress(8, ..._init.bridge.allocU8a(pubkey)); | ||
return _init.bridge.resultU8a(); | ||
exports.secp256k1Compress = withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_compress(8, ...init_1.bridge.allocU8a(pubkey)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Compress = secp256k1Compress; | ||
const secp256k1Expand = /*#__PURE__*/withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_expand(8, ..._init.bridge.allocU8a(pubkey)); | ||
return _init.bridge.resultU8a(); | ||
exports.secp256k1Expand = withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_expand(8, ...init_1.bridge.allocU8a(pubkey)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Expand = secp256k1Expand; | ||
const secp256k1Recover = /*#__PURE__*/withWasm((wasm, msgHash, sig, recovery) => { | ||
wasm.ext_secp_recover(8, ..._init.bridge.allocU8a(msgHash), ..._init.bridge.allocU8a(sig), recovery); | ||
return _init.bridge.resultU8a(); | ||
exports.secp256k1Recover = withWasm((wasm, msgHash, sig, recovery) => { | ||
wasm.ext_secp_recover(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(sig), recovery); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Recover = secp256k1Recover; | ||
const secp256k1Sign = /*#__PURE__*/withWasm((wasm, msgHash, seckey) => { | ||
wasm.ext_secp_sign(8, ..._init.bridge.allocU8a(msgHash), ..._init.bridge.allocU8a(seckey)); | ||
return _init.bridge.resultU8a(); | ||
exports.secp256k1Sign = withWasm((wasm, msgHash, seckey) => { | ||
wasm.ext_secp_sign(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(seckey)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Sign = secp256k1Sign; | ||
const sr25519DeriveKeypairHard = /*#__PURE__*/withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_hard(8, ..._init.bridge.allocU8a(pair), ..._init.bridge.allocU8a(cc)); | ||
return _init.bridge.resultU8a(); | ||
exports.sr25519DeriveKeypairHard = withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_hard(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519DeriveKeypairHard = sr25519DeriveKeypairHard; | ||
const sr25519DeriveKeypairSoft = /*#__PURE__*/withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_soft(8, ..._init.bridge.allocU8a(pair), ..._init.bridge.allocU8a(cc)); | ||
return _init.bridge.resultU8a(); | ||
exports.sr25519DeriveKeypairSoft = withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_soft(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519DeriveKeypairSoft = sr25519DeriveKeypairSoft; | ||
const sr25519DerivePublicSoft = /*#__PURE__*/withWasm((wasm, pubkey, cc) => { | ||
wasm.ext_sr_derive_public_soft(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(cc)); | ||
return _init.bridge.resultU8a(); | ||
exports.sr25519DerivePublicSoft = withWasm((wasm, pubkey, cc) => { | ||
wasm.ext_sr_derive_public_soft(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(cc)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519DerivePublicSoft = sr25519DerivePublicSoft; | ||
const sr25519KeypairFromSeed = /*#__PURE__*/withWasm((wasm, seed) => { | ||
wasm.ext_sr_from_seed(8, ..._init.bridge.allocU8a(seed)); | ||
return _init.bridge.resultU8a(); | ||
exports.sr25519KeypairFromSeed = withWasm((wasm, seed) => { | ||
wasm.ext_sr_from_seed(8, ...init_1.bridge.allocU8a(seed)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519KeypairFromSeed = sr25519KeypairFromSeed; | ||
const sr25519Sign = /*#__PURE__*/withWasm((wasm, pubkey, secret, message) => { | ||
wasm.ext_sr_sign(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(secret), ..._init.bridge.allocU8a(message)); | ||
return _init.bridge.resultU8a(); | ||
exports.sr25519Sign = withWasm((wasm, pubkey, secret, message) => { | ||
wasm.ext_sr_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(message)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519Sign = sr25519Sign; | ||
const sr25519Verify = /*#__PURE__*/withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_sr_verify(..._init.bridge.allocU8a(signature), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
exports.sr25519Verify = withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_sr_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
}); | ||
exports.sr25519Verify = sr25519Verify; | ||
const sr25519Agree = /*#__PURE__*/withWasm((wasm, pubkey, secret) => { | ||
wasm.ext_sr_agree(8, ..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(secret)); | ||
return _init.bridge.resultU8a(); | ||
exports.sr25519Agree = withWasm((wasm, pubkey, secret) => { | ||
wasm.ext_sr_agree(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519Agree = sr25519Agree; | ||
const vrfSign = /*#__PURE__*/withWasm((wasm, secret, context, message, extra) => { | ||
wasm.ext_vrf_sign(8, ..._init.bridge.allocU8a(secret), ..._init.bridge.allocU8a(context), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(extra)); | ||
return _init.bridge.resultU8a(); | ||
exports.vrfSign = withWasm((wasm, secret, context, message, extra) => { | ||
wasm.ext_vrf_sign(8, ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.vrfSign = vrfSign; | ||
const vrfVerify = /*#__PURE__*/withWasm((wasm, pubkey, context, message, extra, outAndProof) => { | ||
const ret = wasm.ext_vrf_verify(..._init.bridge.allocU8a(pubkey), ..._init.bridge.allocU8a(context), ..._init.bridge.allocU8a(message), ..._init.bridge.allocU8a(extra), ..._init.bridge.allocU8a(outAndProof)); | ||
return ret !== 0; | ||
exports.vrfVerify = withWasm((wasm, pubkey, context, message, extra, outAndProof) => { | ||
const ret = wasm.ext_vrf_verify(...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra), ...init_1.bridge.allocU8a(outAndProof)); | ||
return ret !== 0; | ||
}); | ||
exports.vrfVerify = vrfVerify; | ||
const blake2b = /*#__PURE__*/withWasm((wasm, data, key, size) => { | ||
wasm.ext_blake2b(8, ..._init.bridge.allocU8a(data), ..._init.bridge.allocU8a(key), size); | ||
return _init.bridge.resultU8a(); | ||
exports.blake2b = withWasm((wasm, data, key, size) => { | ||
wasm.ext_blake2b(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(key), size); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.blake2b = blake2b; | ||
const hmacSha256 = /*#__PURE__*/withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha256(8, ..._init.bridge.allocU8a(key), ..._init.bridge.allocU8a(data)); | ||
return _init.bridge.resultU8a(); | ||
exports.hmacSha256 = withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha256(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.hmacSha256 = hmacSha256; | ||
const hmacSha512 = /*#__PURE__*/withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha512(8, ..._init.bridge.allocU8a(key), ..._init.bridge.allocU8a(data)); | ||
return _init.bridge.resultU8a(); | ||
exports.hmacSha512 = withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha512(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.hmacSha512 = hmacSha512; | ||
const keccak256 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_keccak256(8, ..._init.bridge.allocU8a(data)); | ||
return _init.bridge.resultU8a(); | ||
exports.keccak256 = withWasm((wasm, data) => { | ||
wasm.ext_keccak256(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.keccak256 = keccak256; | ||
const keccak512 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_keccak512(8, ..._init.bridge.allocU8a(data)); | ||
return _init.bridge.resultU8a(); | ||
exports.keccak512 = withWasm((wasm, data) => { | ||
wasm.ext_keccak512(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.keccak512 = keccak512; | ||
const pbkdf2 = /*#__PURE__*/withWasm((wasm, data, salt, rounds) => { | ||
wasm.ext_pbkdf2(8, ..._init.bridge.allocU8a(data), ..._init.bridge.allocU8a(salt), rounds); | ||
return _init.bridge.resultU8a(); | ||
exports.pbkdf2 = withWasm((wasm, data, salt, rounds) => { | ||
wasm.ext_pbkdf2(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(salt), rounds); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.pbkdf2 = pbkdf2; | ||
const scrypt = /*#__PURE__*/withWasm((wasm, password, salt, log2n, r, p) => { | ||
wasm.ext_scrypt(8, ..._init.bridge.allocU8a(password), ..._init.bridge.allocU8a(salt), log2n, r, p); | ||
return _init.bridge.resultU8a(); | ||
exports.scrypt = withWasm((wasm, password, salt, log2n, r, p) => { | ||
wasm.ext_scrypt(8, ...init_1.bridge.allocU8a(password), ...init_1.bridge.allocU8a(salt), log2n, r, p); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.scrypt = scrypt; | ||
const sha256 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_sha256(8, ..._init.bridge.allocU8a(data)); | ||
return _init.bridge.resultU8a(); | ||
exports.sha256 = withWasm((wasm, data) => { | ||
wasm.ext_sha256(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sha256 = sha256; | ||
const sha512 = /*#__PURE__*/withWasm((wasm, data) => { | ||
wasm.ext_sha512(8, ..._init.bridge.allocU8a(data)); | ||
return _init.bridge.resultU8a(); | ||
exports.sha512 = withWasm((wasm, data) => { | ||
wasm.ext_sha512(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.sha512 = sha512; | ||
const twox = /*#__PURE__*/withWasm((wasm, data, rounds) => { | ||
wasm.ext_twox(8, ..._init.bridge.allocU8a(data), rounds); | ||
return _init.bridge.resultU8a(); | ||
exports.twox = withWasm((wasm, data, rounds) => { | ||
wasm.ext_twox(8, ...init_1.bridge.allocU8a(data), rounds); | ||
return init_1.bridge.resultU8a(); | ||
}); | ||
exports.twox = twox; | ||
function isReady() { | ||
return !!_init.bridge.wasm; | ||
return !!init_1.bridge.wasm; | ||
} | ||
exports.isReady = isReady; | ||
async function waitReady() { | ||
try { | ||
const wasm = await (0, _init.initBridge)(); | ||
return !!wasm; | ||
} catch { | ||
return false; | ||
} | ||
} | ||
try { | ||
const wasm = await (0, init_1.initBridge)(); | ||
return !!wasm; | ||
} | ||
catch { | ||
return false; | ||
} | ||
} | ||
exports.waitReady = waitReady; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.default = void 0; | ||
var _packageInfo = require("@polkadot/wasm-bridge/cjs/packageInfo"); | ||
var _packageInfo2 = require("@polkadot/wasm-crypto-asmjs/cjs/packageInfo"); | ||
var _packageInfo3 = require("@polkadot/wasm-crypto-init/cjs/packageInfo"); | ||
var _packageInfo4 = require("@polkadot/wasm-crypto-wasm/cjs/packageInfo"); | ||
var _packageInfo5 = require("@polkadot/wasm-util/cjs/packageInfo"); | ||
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
var _default = [_packageInfo.packageInfo, _packageInfo2.packageInfo, _packageInfo3.packageInfo, _packageInfo4.packageInfo, _packageInfo5.packageInfo]; | ||
exports.default = _default; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
const packageInfo_1 = require("@polkadot/wasm-bridge/cjs/packageInfo"); | ||
const packageInfo_2 = require("@polkadot/wasm-crypto-asmjs/cjs/packageInfo"); | ||
const packageInfo_3 = require("@polkadot/wasm-crypto-init/cjs/packageInfo"); | ||
const packageInfo_4 = require("@polkadot/wasm-crypto-wasm/cjs/packageInfo"); | ||
const packageInfo_5 = require("@polkadot/wasm-util/cjs/packageInfo"); | ||
exports.default = [packageInfo_1.packageInfo, packageInfo_2.packageInfo, packageInfo_3.packageInfo, packageInfo_4.packageInfo, packageInfo_5.packageInfo]; |
"use strict"; | ||
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault"); | ||
var _util = require("@polkadot/util"); | ||
var _detectOther = _interopRequireDefault(require("./detectOther")); | ||
var _packageInfo = require("./packageInfo"); | ||
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
// Do not edit, auto-generated by @polkadot/dev | ||
(0, _util.detectPackage)(_packageInfo.packageInfo, null, _detectOther.default); | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
const tslib_1 = require("tslib"); | ||
const util_1 = require("@polkadot/util"); | ||
const detectOther_1 = tslib_1.__importDefault(require("./detectOther")); | ||
const packageInfo_1 = require("./packageInfo"); | ||
(0, util_1.detectPackage)(packageInfo_1.packageInfo, null, detectOther_1.default); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
const tslib_1 = require("tslib"); | ||
require("./detectPackage"); | ||
var _bundle = require("./bundle"); | ||
Object.keys(_bundle).forEach(function (key) { | ||
if (key === "default" || key === "__esModule") return; | ||
if (key in exports && exports[key] === _bundle[key]) return; | ||
Object.defineProperty(exports, key, { | ||
enumerable: true, | ||
get: function () { | ||
return _bundle[key]; | ||
} | ||
}); | ||
}); | ||
tslib_1.__exportStar(require("./bundle"), exports); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.bridge = void 0; | ||
exports.initBridge = initBridge; | ||
var _wasmBridge = require("@polkadot/wasm-bridge"); | ||
var _wasmCryptoInit = require("@polkadot/wasm-crypto-init"); | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initBridge = exports.bridge = void 0; | ||
const wasm_bridge_1 = require("@polkadot/wasm-bridge"); | ||
const wasm_crypto_init_1 = require("@polkadot/wasm-crypto-init"); | ||
/** | ||
@@ -19,4 +12,3 @@ * @name bridge | ||
*/ | ||
const bridge = new _wasmBridge.Bridge(_wasmCryptoInit.createWasm); | ||
exports.bridge = new wasm_bridge_1.Bridge(wasm_crypto_init_1.createWasm); | ||
/** | ||
@@ -27,5 +19,5 @@ * @name initBridge | ||
*/ | ||
exports.bridge = bridge; | ||
async function initBridge(createWasm) { | ||
return bridge.init(createWasm); | ||
} | ||
return exports.bridge.init(createWasm); | ||
} | ||
exports.initBridge = initBridge; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.initWasm = initWasm; | ||
var _none = require("@polkadot/wasm-crypto-init/cjs/none"); | ||
var _init = require("./init"); | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const none_1 = require("@polkadot/wasm-crypto-init/cjs/none"); | ||
const init_1 = require("./init"); | ||
/** | ||
@@ -22,6 +16,7 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, _init.initBridge)(_none.createWasm); | ||
await (0, init_1.initBridge)(none_1.createWasm); | ||
} | ||
exports.initWasm = initWasm; | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.initWasm = initWasm; | ||
var _asm = require("@polkadot/wasm-crypto-init/cjs/asm"); | ||
var _init = require("./init"); | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const asm_1 = require("@polkadot/wasm-crypto-init/cjs/asm"); | ||
const init_1 = require("./init"); | ||
/** | ||
@@ -22,6 +16,7 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, _init.initBridge)(_asm.createWasm); | ||
await (0, init_1.initBridge)(asm_1.createWasm); | ||
} | ||
exports.initWasm = initWasm; | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.initWasm = initWasm; | ||
var _wasm = require("@polkadot/wasm-crypto-init/cjs/wasm"); | ||
var _init = require("./init"); | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const wasm_1 = require("@polkadot/wasm-crypto-init/cjs/wasm"); | ||
const init_1 = require("./init"); | ||
/** | ||
@@ -22,6 +16,7 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, _init.initBridge)(_wasm.createWasm); | ||
await (0, init_1.initBridge)(wasm_1.createWasm); | ||
} | ||
exports.initWasm = initWasm; | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
exports.initWasm = initWasm; | ||
var _both = require("@polkadot/wasm-crypto-init/cjs/both"); | ||
var _init = require("./init"); | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const both_1 = require("@polkadot/wasm-crypto-init/cjs/both"); | ||
const init_1 = require("./init"); | ||
/** | ||
@@ -22,6 +16,7 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, _init.initBridge)(_both.createWasm); | ||
await (0, init_1.initBridge)(both_1.createWasm); | ||
} | ||
exports.initWasm = initWasm; | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { | ||
value: true | ||
}); | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.packageInfo = void 0; | ||
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
// Do not edit, auto-generated by @polkadot/dev | ||
const packageInfo = { | ||
name: '@polkadot/wasm-crypto', | ||
path: typeof __dirname === 'string' ? __dirname : 'auto', | ||
type: 'cjs', | ||
version: '6.4.1' | ||
}; | ||
exports.packageInfo = packageInfo; | ||
exports.packageInfo = { name: '@polkadot/wasm-crypto', path: typeof __dirname === 'string' ? __dirname : 'auto', type: 'cjs', version: '7.0.1' }; |
@@ -1,4 +0,1 @@ | ||
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { packageInfo as bridgeInfo } from '@polkadot/wasm-bridge/packageInfo'; | ||
@@ -9,2 +6,2 @@ import { packageInfo as asmInfo } from '@polkadot/wasm-crypto-asmjs/packageInfo'; | ||
import { packageInfo as utilInfo } from '@polkadot/wasm-util/packageInfo'; | ||
export default [bridgeInfo, asmInfo, initInfo, wasmInfo, utilInfo]; | ||
export default [bridgeInfo, asmInfo, initInfo, wasmInfo, utilInfo]; |
@@ -1,9 +0,4 @@ | ||
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
// Do not edit, auto-generated by @polkadot/dev | ||
import { detectPackage } from '@polkadot/util'; | ||
import others from "./detectOther.js"; | ||
import { packageInfo } from "./packageInfo.js"; | ||
detectPackage(packageInfo, null, others); | ||
import others from './detectOther.js'; | ||
import { packageInfo } from './packageInfo.js'; | ||
detectPackage(packageInfo, null, others); |
@@ -1,5 +0,2 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import "./detectPackage.js"; | ||
export * from "./bundle.js"; | ||
import './detectPackage.js'; | ||
export * from './bundle.js'; |
@@ -1,7 +0,3 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { Bridge } from '@polkadot/wasm-bridge'; | ||
import { createWasm } from '@polkadot/wasm-crypto-init'; | ||
/** | ||
@@ -14,3 +10,2 @@ * @name bridge | ||
export const bridge = new Bridge(createWasm); | ||
/** | ||
@@ -22,3 +17,3 @@ * @name initBridge | ||
export async function initBridge(createWasm) { | ||
return bridge.init(createWasm); | ||
} | ||
return bridge.init(createWasm); | ||
} |
@@ -1,7 +0,3 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { createWasm } from '@polkadot/wasm-crypto-init/none'; | ||
import { initBridge } from "./init.js"; | ||
import { initBridge } from './init.js'; | ||
/** | ||
@@ -17,6 +13,6 @@ * @name initWasm | ||
export async function initWasm() { | ||
await initBridge(createWasm); | ||
await initBridge(createWasm); | ||
} | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
@@ -1,7 +0,3 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { createWasm } from '@polkadot/wasm-crypto-init/asm'; | ||
import { initBridge } from "./init.js"; | ||
import { initBridge } from './init.js'; | ||
/** | ||
@@ -17,6 +13,6 @@ * @name initWasm | ||
export async function initWasm() { | ||
await initBridge(createWasm); | ||
await initBridge(createWasm); | ||
} | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
@@ -1,7 +0,3 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { createWasm } from '@polkadot/wasm-crypto-init/wasm'; | ||
import { initBridge } from "./init.js"; | ||
import { initBridge } from './init.js'; | ||
/** | ||
@@ -17,6 +13,6 @@ * @name initWasm | ||
export async function initWasm() { | ||
await initBridge(createWasm); | ||
await initBridge(createWasm); | ||
} | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
@@ -1,7 +0,3 @@ | ||
// Copyright 2019-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
import { createWasm } from '@polkadot/wasm-crypto-init/both'; | ||
import { initBridge } from "./init.js"; | ||
import { initBridge } from './init.js'; | ||
/** | ||
@@ -17,6 +13,6 @@ * @name initWasm | ||
export async function initWasm() { | ||
await initBridge(createWasm); | ||
await initBridge(createWasm); | ||
} | ||
initWasm().catch(() => { | ||
// cannot happen, initWasm doesn't throw | ||
}); | ||
// cannot happen, initWasm doesn't throw | ||
}); |
@@ -31,3 +31,3 @@ { | ||
"type": "module", | ||
"version": "6.4.1", | ||
"version": "7.0.1", | ||
"main": "./cjs/index.js", | ||
@@ -84,3 +84,6 @@ "module": "./index.js", | ||
}, | ||
"./package.json": "./package.json", | ||
"./package.json": { | ||
"require": "./cjs/package.json", | ||
"default": "./package.json" | ||
}, | ||
"./packageInfo.js": { | ||
@@ -98,8 +101,8 @@ "types": "./packageInfo.d.ts", | ||
"dependencies": { | ||
"@babel/runtime": "^7.20.6", | ||
"@polkadot/wasm-bridge": "6.4.1", | ||
"@polkadot/wasm-crypto-asmjs": "6.4.1", | ||
"@polkadot/wasm-crypto-init": "6.4.1", | ||
"@polkadot/wasm-crypto-wasm": "6.4.1", | ||
"@polkadot/wasm-util": "6.4.1" | ||
"@polkadot/wasm-bridge": "7.0.1", | ||
"@polkadot/wasm-crypto-asmjs": "7.0.1", | ||
"@polkadot/wasm-crypto-init": "7.0.1", | ||
"@polkadot/wasm-crypto-wasm": "7.0.1", | ||
"@polkadot/wasm-util": "7.0.1", | ||
"tslib": "^2.5.0" | ||
}, | ||
@@ -106,0 +109,0 @@ "peerDependencies": { |
@@ -1,11 +0,1 @@ | ||
// Copyright 2017-2022 @polkadot/wasm-crypto authors & contributors | ||
// SPDX-License-Identifier: Apache-2.0 | ||
// Do not edit, auto-generated by @polkadot/dev | ||
export const packageInfo = { | ||
name: '@polkadot/wasm-crypto', | ||
path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', | ||
type: 'esm', | ||
version: '6.4.1' | ||
}; | ||
export const packageInfo = { name: '@polkadot/wasm-crypto', path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', type: 'esm', version: '7.0.1' }; |
Sorry, the diff of this file is too big to display
298385
2215
+ Addedtslib@^2.5.0
+ Added@polkadot/wasm-bridge@7.0.1(transitive)
+ Added@polkadot/wasm-crypto-asmjs@7.0.1(transitive)
+ Added@polkadot/wasm-crypto-init@7.0.1(transitive)
+ Added@polkadot/wasm-crypto-wasm@7.0.1(transitive)
+ Added@polkadot/wasm-util@7.0.1(transitive)
- Removed@babel/runtime@^7.20.6
- Removed@babel/runtime@7.24.7(transitive)
- Removed@polkadot/wasm-bridge@6.4.1(transitive)
- Removed@polkadot/wasm-crypto-asmjs@6.4.1(transitive)
- Removed@polkadot/wasm-crypto-init@6.4.1(transitive)
- Removed@polkadot/wasm-crypto-wasm@6.4.1(transitive)
- Removed@polkadot/wasm-util@6.4.1(transitive)
- Removedregenerator-runtime@0.14.1(transitive)
Updated@polkadot/wasm-bridge@7.0.1
Updated@polkadot/wasm-util@7.0.1