@polkadot/wasm-crypto
Advanced tools
Comparing version 7.0.2 to 7.0.3
@@ -1,3 +0,3 @@ | ||
import { bridge } from './init'; | ||
export { packageInfo } from './packageInfo'; | ||
import { bridge } from './init.js'; | ||
export { packageInfo } from './packageInfo.js'; | ||
export { bridge }; | ||
@@ -4,0 +4,0 @@ export declare const bip39Generate: (words: 12 | 15 | 18 | 21 | 24) => string; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.waitReady = exports.isReady = exports.twox = exports.sha512 = exports.sha256 = exports.scrypt = exports.pbkdf2 = exports.keccak512 = exports.keccak256 = exports.hmacSha512 = exports.hmacSha256 = exports.blake2b = exports.vrfVerify = exports.vrfSign = exports.sr25519Agree = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1Expand = exports.secp256k1Compress = exports.secp256k1FromSeed = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = exports.bridge = exports.packageInfo = void 0; | ||
const init_1 = require("./init"); | ||
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_1.bridge; } }); | ||
var packageInfo_1 = require("./packageInfo"); | ||
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_1.packageInfo; } }); | ||
const init_js_1 = require("./init.js"); | ||
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_js_1.bridge; } }); | ||
var packageInfo_js_1 = require("./packageInfo.js"); | ||
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_js_1.packageInfo; } }); | ||
/** | ||
@@ -24,6 +24,6 @@ * @internal | ||
return (...params) => { | ||
if (!init_1.bridge.wasm) { | ||
if (!init_js_1.bridge.wasm) { | ||
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @polkadot/wasm-crypto (or cryptoWaitReady() from @polkadot/util-crypto) before attempting to use WASM-only interfaces.'); | ||
} | ||
return fn(init_1.bridge.wasm, ...params); | ||
return fn(init_js_1.bridge.wasm, ...params); | ||
}; | ||
@@ -33,130 +33,130 @@ } | ||
wasm.ext_bip39_generate(8, words); | ||
return init_1.bridge.resultString(); | ||
return init_js_1.bridge.resultString(); | ||
}); | ||
exports.bip39ToEntropy = withWasm((wasm, phrase) => { | ||
wasm.ext_bip39_to_entropy(8, ...init_1.bridge.allocString(phrase)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_bip39_to_entropy(8, ...init_js_1.bridge.allocString(phrase)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.bip39ToMiniSecret = withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_mini_secret(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_bip39_to_mini_secret(8, ...init_js_1.bridge.allocString(phrase), ...init_js_1.bridge.allocString(password)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.bip39ToSeed = withWasm((wasm, phrase, password) => { | ||
wasm.ext_bip39_to_seed(8, ...init_1.bridge.allocString(phrase), ...init_1.bridge.allocString(password)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_bip39_to_seed(8, ...init_js_1.bridge.allocString(phrase), ...init_js_1.bridge.allocString(password)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.bip39Validate = withWasm((wasm, phrase) => { | ||
const ret = wasm.ext_bip39_validate(...init_1.bridge.allocString(phrase)); | ||
const ret = wasm.ext_bip39_validate(...init_js_1.bridge.allocString(phrase)); | ||
return ret !== 0; | ||
}); | ||
exports.ed25519KeypairFromSeed = withWasm((wasm, seed) => { | ||
wasm.ext_ed_from_seed(8, ...init_1.bridge.allocU8a(seed)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_ed_from_seed(8, ...init_js_1.bridge.allocU8a(seed)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.ed25519Sign = withWasm((wasm, pubkey, seckey, message) => { | ||
wasm.ext_ed_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(seckey), ...init_1.bridge.allocU8a(message)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_ed_sign(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(seckey), ...init_js_1.bridge.allocU8a(message)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.ed25519Verify = withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_ed_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey)); | ||
const ret = wasm.ext_ed_verify(...init_js_1.bridge.allocU8a(signature), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
}); | ||
exports.secp256k1FromSeed = withWasm((wasm, seckey) => { | ||
wasm.ext_secp_from_seed(8, ...init_1.bridge.allocU8a(seckey)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_secp_from_seed(8, ...init_js_1.bridge.allocU8a(seckey)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Compress = withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_compress(8, ...init_1.bridge.allocU8a(pubkey)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_secp_pub_compress(8, ...init_js_1.bridge.allocU8a(pubkey)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Expand = withWasm((wasm, pubkey) => { | ||
wasm.ext_secp_pub_expand(8, ...init_1.bridge.allocU8a(pubkey)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_secp_pub_expand(8, ...init_js_1.bridge.allocU8a(pubkey)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Recover = withWasm((wasm, msgHash, sig, recovery) => { | ||
wasm.ext_secp_recover(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(sig), recovery); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_secp_recover(8, ...init_js_1.bridge.allocU8a(msgHash), ...init_js_1.bridge.allocU8a(sig), recovery); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.secp256k1Sign = withWasm((wasm, msgHash, seckey) => { | ||
wasm.ext_secp_sign(8, ...init_1.bridge.allocU8a(msgHash), ...init_1.bridge.allocU8a(seckey)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_secp_sign(8, ...init_js_1.bridge.allocU8a(msgHash), ...init_js_1.bridge.allocU8a(seckey)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519DeriveKeypairHard = withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_hard(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sr_derive_keypair_hard(8, ...init_js_1.bridge.allocU8a(pair), ...init_js_1.bridge.allocU8a(cc)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519DeriveKeypairSoft = withWasm((wasm, pair, cc) => { | ||
wasm.ext_sr_derive_keypair_soft(8, ...init_1.bridge.allocU8a(pair), ...init_1.bridge.allocU8a(cc)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sr_derive_keypair_soft(8, ...init_js_1.bridge.allocU8a(pair), ...init_js_1.bridge.allocU8a(cc)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519DerivePublicSoft = withWasm((wasm, pubkey, cc) => { | ||
wasm.ext_sr_derive_public_soft(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(cc)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sr_derive_public_soft(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(cc)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519KeypairFromSeed = withWasm((wasm, seed) => { | ||
wasm.ext_sr_from_seed(8, ...init_1.bridge.allocU8a(seed)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sr_from_seed(8, ...init_js_1.bridge.allocU8a(seed)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519Sign = withWasm((wasm, pubkey, secret, message) => { | ||
wasm.ext_sr_sign(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(message)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sr_sign(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(secret), ...init_js_1.bridge.allocU8a(message)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sr25519Verify = withWasm((wasm, signature, message, pubkey) => { | ||
const ret = wasm.ext_sr_verify(...init_1.bridge.allocU8a(signature), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(pubkey)); | ||
const ret = wasm.ext_sr_verify(...init_js_1.bridge.allocU8a(signature), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(pubkey)); | ||
return ret !== 0; | ||
}); | ||
exports.sr25519Agree = withWasm((wasm, pubkey, secret) => { | ||
wasm.ext_sr_agree(8, ...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(secret)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sr_agree(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(secret)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.vrfSign = withWasm((wasm, secret, context, message, extra) => { | ||
wasm.ext_vrf_sign(8, ...init_1.bridge.allocU8a(secret), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_vrf_sign(8, ...init_js_1.bridge.allocU8a(secret), ...init_js_1.bridge.allocU8a(context), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(extra)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.vrfVerify = withWasm((wasm, pubkey, context, message, extra, outAndProof) => { | ||
const ret = wasm.ext_vrf_verify(...init_1.bridge.allocU8a(pubkey), ...init_1.bridge.allocU8a(context), ...init_1.bridge.allocU8a(message), ...init_1.bridge.allocU8a(extra), ...init_1.bridge.allocU8a(outAndProof)); | ||
const ret = wasm.ext_vrf_verify(...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(context), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(extra), ...init_js_1.bridge.allocU8a(outAndProof)); | ||
return ret !== 0; | ||
}); | ||
exports.blake2b = withWasm((wasm, data, key, size) => { | ||
wasm.ext_blake2b(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(key), size); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_blake2b(8, ...init_js_1.bridge.allocU8a(data), ...init_js_1.bridge.allocU8a(key), size); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.hmacSha256 = withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha256(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_hmac_sha256(8, ...init_js_1.bridge.allocU8a(key), ...init_js_1.bridge.allocU8a(data)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.hmacSha512 = withWasm((wasm, key, data) => { | ||
wasm.ext_hmac_sha512(8, ...init_1.bridge.allocU8a(key), ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_hmac_sha512(8, ...init_js_1.bridge.allocU8a(key), ...init_js_1.bridge.allocU8a(data)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.keccak256 = withWasm((wasm, data) => { | ||
wasm.ext_keccak256(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_keccak256(8, ...init_js_1.bridge.allocU8a(data)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.keccak512 = withWasm((wasm, data) => { | ||
wasm.ext_keccak512(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_keccak512(8, ...init_js_1.bridge.allocU8a(data)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.pbkdf2 = withWasm((wasm, data, salt, rounds) => { | ||
wasm.ext_pbkdf2(8, ...init_1.bridge.allocU8a(data), ...init_1.bridge.allocU8a(salt), rounds); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_pbkdf2(8, ...init_js_1.bridge.allocU8a(data), ...init_js_1.bridge.allocU8a(salt), rounds); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.scrypt = withWasm((wasm, password, salt, log2n, r, p) => { | ||
wasm.ext_scrypt(8, ...init_1.bridge.allocU8a(password), ...init_1.bridge.allocU8a(salt), log2n, r, p); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_scrypt(8, ...init_js_1.bridge.allocU8a(password), ...init_js_1.bridge.allocU8a(salt), log2n, r, p); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sha256 = withWasm((wasm, data) => { | ||
wasm.ext_sha256(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sha256(8, ...init_js_1.bridge.allocU8a(data)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.sha512 = withWasm((wasm, data) => { | ||
wasm.ext_sha512(8, ...init_1.bridge.allocU8a(data)); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_sha512(8, ...init_js_1.bridge.allocU8a(data)); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
exports.twox = withWasm((wasm, data, rounds) => { | ||
wasm.ext_twox(8, ...init_1.bridge.allocU8a(data), rounds); | ||
return init_1.bridge.resultU8a(); | ||
wasm.ext_twox(8, ...init_js_1.bridge.allocU8a(data), rounds); | ||
return init_js_1.bridge.resultU8a(); | ||
}); | ||
function isReady() { | ||
return !!init_1.bridge.wasm; | ||
return !!init_js_1.bridge.wasm; | ||
} | ||
@@ -166,3 +166,3 @@ exports.isReady = isReady; | ||
try { | ||
const wasm = await (0, init_1.initBridge)(); | ||
const wasm = await (0, init_js_1.initBridge)(); | ||
return !!wasm; | ||
@@ -169,0 +169,0 @@ } |
@@ -5,4 +5,4 @@ "use strict"; | ||
const util_1 = require("@polkadot/util"); | ||
const detectOther_1 = tslib_1.__importDefault(require("./detectOther")); | ||
const packageInfo_1 = require("./packageInfo"); | ||
(0, util_1.detectPackage)(packageInfo_1.packageInfo, null, detectOther_1.default); | ||
const detectOther_js_1 = tslib_1.__importDefault(require("./detectOther.js")); | ||
const packageInfo_js_1 = require("./packageInfo.js"); | ||
(0, util_1.detectPackage)(packageInfo_js_1.packageInfo, null, detectOther_js_1.default); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
const tslib_1 = require("tslib"); | ||
require("./detectPackage"); | ||
tslib_1.__exportStar(require("./bundle"), exports); | ||
require("./detectPackage.js"); | ||
tslib_1.__exportStar(require("./bundle.js"), exports); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const none_1 = require("@polkadot/wasm-crypto-init/cjs/none"); | ||
const init_1 = require("./init"); | ||
const none_1 = require("@polkadot/wasm-crypto-init/none"); | ||
const init_js_1 = require("./init.js"); | ||
/** | ||
@@ -16,3 +16,3 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, init_1.initBridge)(none_1.createWasm); | ||
await (0, init_js_1.initBridge)(none_1.createWasm); | ||
} | ||
@@ -19,0 +19,0 @@ exports.initWasm = initWasm; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const asm_1 = require("@polkadot/wasm-crypto-init/cjs/asm"); | ||
const init_1 = require("./init"); | ||
const asm_1 = require("@polkadot/wasm-crypto-init/asm"); | ||
const init_js_1 = require("./init.js"); | ||
/** | ||
@@ -16,3 +16,3 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, init_1.initBridge)(asm_1.createWasm); | ||
await (0, init_js_1.initBridge)(asm_1.createWasm); | ||
} | ||
@@ -19,0 +19,0 @@ exports.initWasm = initWasm; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const wasm_1 = require("@polkadot/wasm-crypto-init/cjs/wasm"); | ||
const init_1 = require("./init"); | ||
const wasm_1 = require("@polkadot/wasm-crypto-init/wasm"); | ||
const init_js_1 = require("./init.js"); | ||
/** | ||
@@ -16,3 +16,3 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, init_1.initBridge)(wasm_1.createWasm); | ||
await (0, init_js_1.initBridge)(wasm_1.createWasm); | ||
} | ||
@@ -19,0 +19,0 @@ exports.initWasm = initWasm; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.initWasm = void 0; | ||
const both_1 = require("@polkadot/wasm-crypto-init/cjs/both"); | ||
const init_1 = require("./init"); | ||
const both_1 = require("@polkadot/wasm-crypto-init/both"); | ||
const init_js_1 = require("./init.js"); | ||
/** | ||
@@ -16,3 +16,3 @@ * @name initWasm | ||
async function initWasm() { | ||
await (0, init_1.initBridge)(both_1.createWasm); | ||
await (0, init_js_1.initBridge)(both_1.createWasm); | ||
} | ||
@@ -19,0 +19,0 @@ exports.initWasm = initWasm; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.packageInfo = void 0; | ||
exports.packageInfo = { name: '@polkadot/wasm-crypto', path: typeof __dirname === 'string' ? __dirname : 'auto', type: 'cjs', version: '7.0.2' }; | ||
exports.packageInfo = { name: '@polkadot/wasm-crypto', path: typeof __dirname === 'string' ? __dirname : 'auto', type: 'cjs', version: '7.0.3' }; |
@@ -1,2 +0,2 @@ | ||
import './detectPackage'; | ||
export * from './bundle'; | ||
import './detectPackage.js'; | ||
export * from './bundle.js'; |
@@ -31,3 +31,3 @@ { | ||
"type": "module", | ||
"version": "7.0.2", | ||
"version": "7.0.3", | ||
"main": "./cjs/index.js", | ||
@@ -100,7 +100,7 @@ "module": "./index.js", | ||
"dependencies": { | ||
"@polkadot/wasm-bridge": "7.0.2", | ||
"@polkadot/wasm-crypto-asmjs": "7.0.2", | ||
"@polkadot/wasm-crypto-init": "7.0.2", | ||
"@polkadot/wasm-crypto-wasm": "7.0.2", | ||
"@polkadot/wasm-util": "7.0.2", | ||
"@polkadot/wasm-bridge": "7.0.3", | ||
"@polkadot/wasm-crypto-asmjs": "7.0.3", | ||
"@polkadot/wasm-crypto-init": "7.0.3", | ||
"@polkadot/wasm-crypto-wasm": "7.0.3", | ||
"@polkadot/wasm-util": "7.0.3", | ||
"tslib": "^2.5.0" | ||
@@ -107,0 +107,0 @@ }, |
@@ -1,1 +0,1 @@ | ||
export const packageInfo = { name: '@polkadot/wasm-crypto', path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', type: 'esm', version: '7.0.2' }; | ||
export const packageInfo = { name: '@polkadot/wasm-crypto', path: (import.meta && import.meta.url) ? new URL(import.meta.url).pathname.substring(0, new URL(import.meta.url).pathname.lastIndexOf('/') + 1) : 'auto', type: 'esm', version: '7.0.3' }; |
Sorry, the diff of this file is too big to display
304312
2219
+ Added@polkadot/wasm-bridge@7.0.3(transitive)
+ Added@polkadot/wasm-crypto-asmjs@7.0.3(transitive)
+ Added@polkadot/wasm-crypto-init@7.0.3(transitive)
+ Added@polkadot/wasm-crypto-wasm@7.0.3(transitive)
+ Added@polkadot/wasm-util@7.0.3(transitive)
- Removed@polkadot/wasm-bridge@7.0.2(transitive)
- Removed@polkadot/wasm-crypto-asmjs@7.0.2(transitive)
- Removed@polkadot/wasm-crypto-init@7.0.2(transitive)
- Removed@polkadot/wasm-crypto-wasm@7.0.2(transitive)
- Removed@polkadot/wasm-util@7.0.2(transitive)
Updated@polkadot/wasm-bridge@7.0.3
Updated@polkadot/wasm-util@7.0.3