Socket
Socket
Sign inDemoInstall

@polkadot/wasm-crypto

Package Overview
Dependencies
16
Maintainers
2
Versions
564
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

Comparing version 7.0.2 to 7.0.3

4

bundle.d.ts

@@ -1,3 +0,3 @@

import { bridge } from './init';
export { packageInfo } from './packageInfo';
import { bridge } from './init.js';
export { packageInfo } from './packageInfo.js';
export { bridge };

@@ -4,0 +4,0 @@ export declare const bip39Generate: (words: 12 | 15 | 18 | 21 | 24) => string;

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.waitReady = exports.isReady = exports.twox = exports.sha512 = exports.sha256 = exports.scrypt = exports.pbkdf2 = exports.keccak512 = exports.keccak256 = exports.hmacSha512 = exports.hmacSha256 = exports.blake2b = exports.vrfVerify = exports.vrfSign = exports.sr25519Agree = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1Expand = exports.secp256k1Compress = exports.secp256k1FromSeed = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = exports.bridge = exports.packageInfo = void 0;
const init_1 = require("./init");
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_1.bridge; } });
var packageInfo_1 = require("./packageInfo");
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_1.packageInfo; } });
const init_js_1 = require("./init.js");
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_js_1.bridge; } });
var packageInfo_js_1 = require("./packageInfo.js");
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_js_1.packageInfo; } });
/**

@@ -24,6 +24,6 @@ * @internal

return (...params) => {
if (!init_1.bridge.wasm) {
if (!init_js_1.bridge.wasm) {
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.');
}
return fn(init_1.bridge.wasm, ...params);
return fn(init_js_1.bridge.wasm, ...params);
};

@@ -33,130 +33,130 @@ }

wasm.ext_bip39_generate(8, words);
return init_1.bridge.resultString();
return init_js_1.bridge.resultString();
});
exports.bip39ToEntropy = withWasm((wasm, phrase) => {
wasm.ext_bip39_to_entropy(8, ...init_1.bridge.allocString(phrase));
return init_1.bridge.resultU8a();
wasm.ext_bip39_to_entropy(8, ...init_js_1.bridge.allocString(phrase));
return init_js_1.bridge.resultU8a();
});
exports.bip39ToMiniSecret = withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_mini_secret(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password));
return init_1.bridge.resultU8a();
wasm.ext_bip39_to_mini_secret(8, ...init_js_1.bridge.allocString(phrase), ...init_js_1.bridge.allocString(password));
return init_js_1.bridge.resultU8a();
});
exports.bip39ToSeed = withWasm((wasm, phrase, password) => {
wasm.ext_bip39_to_seed(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password));
return init_1.bridge.resultU8a();
wasm.ext_bip39_to_seed(8, ...init_js_1.bridge.allocString(phrase), ...init_js_1.bridge.allocString(password));
return init_js_1.bridge.resultU8a();
});
exports.bip39Validate = withWasm((wasm, phrase) => {
const ret = wasm.ext_bip39_validate(...init_1.bridge.allocString(phrase));
const ret = wasm.ext_bip39_validate(...init_js_1.bridge.allocString(phrase));
return ret !== 0;
});
exports.ed25519KeypairFromSeed = withWasm((wasm, seed) => {
wasm.ext_ed_from_seed(8, ...init_1.bridge.allocU8a(seed));
return init_1.bridge.resultU8a();
wasm.ext_ed_from_seed(8, ...init_js_1.bridge.allocU8a(seed));
return init_js_1.bridge.resultU8a();
});
exports.ed25519Sign = withWasm((wasm, pubkey, seckey, message) => {
wasm.ext_ed_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(seckey), ...init_1.bridge.allocU8a(message));
return init_1.bridge.resultU8a();
wasm.ext_ed_sign(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(seckey), ...init_js_1.bridge.allocU8a(message));
return init_js_1.bridge.resultU8a();
});
exports.ed25519Verify = withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_ed_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey));
const ret = wasm.ext_ed_verify(...init_js_1.bridge.allocU8a(signature), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(pubkey));
return ret !== 0;
});
exports.secp256k1FromSeed = withWasm((wasm, seckey) => {
wasm.ext_secp_from_seed(8, ...init_1.bridge.allocU8a(seckey));
return init_1.bridge.resultU8a();
wasm.ext_secp_from_seed(8, ...init_js_1.bridge.allocU8a(seckey));
return init_js_1.bridge.resultU8a();
});
exports.secp256k1Compress = withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_compress(8, ...init_1.bridge.allocU8a(pubkey));
return init_1.bridge.resultU8a();
wasm.ext_secp_pub_compress(8, ...init_js_1.bridge.allocU8a(pubkey));
return init_js_1.bridge.resultU8a();
});
exports.secp256k1Expand = withWasm((wasm, pubkey) => {
wasm.ext_secp_pub_expand(8, ...init_1.bridge.allocU8a(pubkey));
return init_1.bridge.resultU8a();
wasm.ext_secp_pub_expand(8, ...init_js_1.bridge.allocU8a(pubkey));
return init_js_1.bridge.resultU8a();
});
exports.secp256k1Recover = withWasm((wasm, msgHash, sig, recovery) => {
wasm.ext_secp_recover(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(sig), recovery);
return init_1.bridge.resultU8a();
wasm.ext_secp_recover(8, ...init_js_1.bridge.allocU8a(msgHash), ...init_js_1.bridge.allocU8a(sig), recovery);
return init_js_1.bridge.resultU8a();
});
exports.secp256k1Sign = withWasm((wasm, msgHash, seckey) => {
wasm.ext_secp_sign(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(seckey));
return init_1.bridge.resultU8a();
wasm.ext_secp_sign(8, ...init_js_1.bridge.allocU8a(msgHash), ...init_js_1.bridge.allocU8a(seckey));
return init_js_1.bridge.resultU8a();
});
exports.sr25519DeriveKeypairHard = withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_hard(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc));
return init_1.bridge.resultU8a();
wasm.ext_sr_derive_keypair_hard(8, ...init_js_1.bridge.allocU8a(pair), ...init_js_1.bridge.allocU8a(cc));
return init_js_1.bridge.resultU8a();
});
exports.sr25519DeriveKeypairSoft = withWasm((wasm, pair, cc) => {
wasm.ext_sr_derive_keypair_soft(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc));
return init_1.bridge.resultU8a();
wasm.ext_sr_derive_keypair_soft(8, ...init_js_1.bridge.allocU8a(pair), ...init_js_1.bridge.allocU8a(cc));
return init_js_1.bridge.resultU8a();
});
exports.sr25519DerivePublicSoft = withWasm((wasm, pubkey, cc) => {
wasm.ext_sr_derive_public_soft(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(cc));
return init_1.bridge.resultU8a();
wasm.ext_sr_derive_public_soft(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(cc));
return init_js_1.bridge.resultU8a();
});
exports.sr25519KeypairFromSeed = withWasm((wasm, seed) => {
wasm.ext_sr_from_seed(8, ...init_1.bridge.allocU8a(seed));
return init_1.bridge.resultU8a();
wasm.ext_sr_from_seed(8, ...init_js_1.bridge.allocU8a(seed));
return init_js_1.bridge.resultU8a();
});
exports.sr25519Sign = withWasm((wasm, pubkey, secret, message) => {
wasm.ext_sr_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(message));
return init_1.bridge.resultU8a();
wasm.ext_sr_sign(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(secret), ...init_js_1.bridge.allocU8a(message));
return init_js_1.bridge.resultU8a();
});
exports.sr25519Verify = withWasm((wasm, signature, message, pubkey) => {
const ret = wasm.ext_sr_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey));
const ret = wasm.ext_sr_verify(...init_js_1.bridge.allocU8a(signature), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(pubkey));
return ret !== 0;
});
exports.sr25519Agree = withWasm((wasm, pubkey, secret) => {
wasm.ext_sr_agree(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret));
return init_1.bridge.resultU8a();
wasm.ext_sr_agree(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(secret));
return init_js_1.bridge.resultU8a();
});
exports.vrfSign = withWasm((wasm, secret, context, message, extra) => {
wasm.ext_vrf_sign(8, ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra));
return init_1.bridge.resultU8a();
wasm.ext_vrf_sign(8, ...init_js_1.bridge.allocU8a(secret), ...init_js_1.bridge.allocU8a(context), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(extra));
return init_js_1.bridge.resultU8a();
});
exports.vrfVerify = withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
const ret = wasm.ext_vrf_verify(...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra), ...init_1.bridge.allocU8a(outAndProof));
const ret = wasm.ext_vrf_verify(...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(context), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(extra), ...init_js_1.bridge.allocU8a(outAndProof));
return ret !== 0;
});
exports.blake2b = withWasm((wasm, data, key, size) => {
wasm.ext_blake2b(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(key), size);
return init_1.bridge.resultU8a();
wasm.ext_blake2b(8, ...init_js_1.bridge.allocU8a(data), ...init_js_1.bridge.allocU8a(key), size);
return init_js_1.bridge.resultU8a();
});
exports.hmacSha256 = withWasm((wasm, key, data) => {
wasm.ext_hmac_sha256(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
wasm.ext_hmac_sha256(8, ...init_js_1.bridge.allocU8a(key), ...init_js_1.bridge.allocU8a(data));
return init_js_1.bridge.resultU8a();
});
exports.hmacSha512 = withWasm((wasm, key, data) => {
wasm.ext_hmac_sha512(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
wasm.ext_hmac_sha512(8, ...init_js_1.bridge.allocU8a(key), ...init_js_1.bridge.allocU8a(data));
return init_js_1.bridge.resultU8a();
});
exports.keccak256 = withWasm((wasm, data) => {
wasm.ext_keccak256(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
wasm.ext_keccak256(8, ...init_js_1.bridge.allocU8a(data));
return init_js_1.bridge.resultU8a();
});
exports.keccak512 = withWasm((wasm, data) => {
wasm.ext_keccak512(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
wasm.ext_keccak512(8, ...init_js_1.bridge.allocU8a(data));
return init_js_1.bridge.resultU8a();
});
exports.pbkdf2 = withWasm((wasm, data, salt, rounds) => {
wasm.ext_pbkdf2(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(salt), rounds);
return init_1.bridge.resultU8a();
wasm.ext_pbkdf2(8, ...init_js_1.bridge.allocU8a(data), ...init_js_1.bridge.allocU8a(salt), rounds);
return init_js_1.bridge.resultU8a();
});
exports.scrypt = withWasm((wasm, password, salt, log2n, r, p) => {
wasm.ext_scrypt(8, ...init_1.bridge.allocU8a(password), ...init_1.bridge.allocU8a(salt), log2n, r, p);
return init_1.bridge.resultU8a();
wasm.ext_scrypt(8, ...init_js_1.bridge.allocU8a(password), ...init_js_1.bridge.allocU8a(salt), log2n, r, p);
return init_js_1.bridge.resultU8a();
});
exports.sha256 = withWasm((wasm, data) => {
wasm.ext_sha256(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
wasm.ext_sha256(8, ...init_js_1.bridge.allocU8a(data));
return init_js_1.bridge.resultU8a();
});
exports.sha512 = withWasm((wasm, data) => {
wasm.ext_sha512(8, ...init_1.bridge.allocU8a(data));
return init_1.bridge.resultU8a();
wasm.ext_sha512(8, ...init_js_1.bridge.allocU8a(data));
return init_js_1.bridge.resultU8a();
});
exports.twox = withWasm((wasm, data, rounds) => {
wasm.ext_twox(8, ...init_1.bridge.allocU8a(data), rounds);
return init_1.bridge.resultU8a();
wasm.ext_twox(8, ...init_js_1.bridge.allocU8a(data), rounds);
return init_js_1.bridge.resultU8a();
});
function isReady() {
return !!init_1.bridge.wasm;
return !!init_js_1.bridge.wasm;
}

@@ -166,3 +166,3 @@ exports.isReady = isReady;

try {
const wasm = await (0, init_1.initBridge)();
const wasm = await (0, init_js_1.initBridge)();
return !!wasm;

@@ -169,0 +169,0 @@ }

@@ -5,4 +5,4 @@ "use strict";

const util_1 = require("@polkadot/util");
const detectOther_1 = tslib_1.__importDefault(require("./detectOther"));
const packageInfo_1 = require("./packageInfo");
(0, util_1.detectPackage)(packageInfo_1.packageInfo, null, detectOther_1.default);
const detectOther_js_1 = tslib_1.__importDefault(require("./detectOther.js"));
const packageInfo_js_1 = require("./packageInfo.js");
(0, util_1.detectPackage)(packageInfo_js_1.packageInfo, null, detectOther_js_1.default);
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
const tslib_1 = require("tslib");
require("./detectPackage");
tslib_1.__exportStar(require("./bundle"), exports);
require("./detectPackage.js");
tslib_1.__exportStar(require("./bundle.js"), exports);
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const none_1 = require("@polkadot/wasm-crypto-init/cjs/none");
const init_1 = require("./init");
const none_1 = require("@polkadot/wasm-crypto-init/none");
const init_js_1 = require("./init.js");
/**

@@ -16,3 +16,3 @@ * @name initWasm

async function initWasm() {
await (0, init_1.initBridge)(none_1.createWasm);
await (0, init_js_1.initBridge)(none_1.createWasm);
}

@@ -19,0 +19,0 @@ exports.initWasm = initWasm;

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const asm_1 = require("@polkadot/wasm-crypto-init/cjs/asm");
const init_1 = require("./init");
const asm_1 = require("@polkadot/wasm-crypto-init/asm");
const init_js_1 = require("./init.js");
/**

@@ -16,3 +16,3 @@ * @name initWasm

async function initWasm() {
await (0, init_1.initBridge)(asm_1.createWasm);
await (0, init_js_1.initBridge)(asm_1.createWasm);
}

@@ -19,0 +19,0 @@ exports.initWasm = initWasm;

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const wasm_1 = require("@polkadot/wasm-crypto-init/cjs/wasm");
const init_1 = require("./init");
const wasm_1 = require("@polkadot/wasm-crypto-init/wasm");
const init_js_1 = require("./init.js");
/**

@@ -16,3 +16,3 @@ * @name initWasm

async function initWasm() {
await (0, init_1.initBridge)(wasm_1.createWasm);
await (0, init_js_1.initBridge)(wasm_1.createWasm);
}

@@ -19,0 +19,0 @@ exports.initWasm = initWasm;

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.initWasm = void 0;
const both_1 = require("@polkadot/wasm-crypto-init/cjs/both");
const init_1 = require("./init");
const both_1 = require("@polkadot/wasm-crypto-init/both");
const init_js_1 = require("./init.js");
/**

@@ -16,3 +16,3 @@ * @name initWasm

async function initWasm() {
await (0, init_1.initBridge)(both_1.createWasm);
await (0, init_js_1.initBridge)(both_1.createWasm);
}

@@ -19,0 +19,0 @@ exports.initWasm = initWasm;

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.packageInfo = void 0;
exports.packageInfo = { name: '@polkadot/wasm-crypto', path: typeof __dirname === 'string' ? __dirname : 'auto', type: 'cjs', version: '7.0.2' };
exports.packageInfo = { name: '@polkadot/wasm-crypto', path: typeof __dirname === 'string' ? __dirname : 'auto', type: 'cjs', version: '7.0.3' };

@@ -1,2 +0,2 @@

import './detectPackage';
export * from './bundle';
import './detectPackage.js';
export * from './bundle.js';

@@ -31,3 +31,3 @@ {

"type": "module",
"version": "7.0.2",
"version": "7.0.3",
"main": "./cjs/index.js",

@@ -100,7 +100,7 @@ "module": "./index.js",

"dependencies": {
"@polkadot/wasm-bridge": "7.0.2",
"@polkadot/wasm-crypto-asmjs": "7.0.2",
"@polkadot/wasm-crypto-init": "7.0.2",
"@polkadot/wasm-crypto-wasm": "7.0.2",
"@polkadot/wasm-util": "7.0.2",
"@polkadot/wasm-bridge": "7.0.3",
"@polkadot/wasm-crypto-asmjs": "7.0.3",
"@polkadot/wasm-crypto-init": "7.0.3",
"@polkadot/wasm-crypto-wasm": "7.0.3",
"@polkadot/wasm-util": "7.0.3",
"tslib": "^2.5.0"

@@ -107,0 +107,0 @@ },

@@ -1,1 +0,1 @@

export const packageInfo = { name: '@polkadot/wasm-crypto', path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', type: 'esm', version: '7.0.2' };
export const packageInfo = { name: '@polkadot/wasm-crypto', path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', type: 'esm', version: '7.0.3' };

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc