@toruslabs/rss-client
Advanced tools
Comparing version 2.0.0-0 to 2.0.0
@@ -61,3 +61,2 @@ /******/ (() => { // webpackBootstrap | ||
ecCurveSecp256k1: () => (/* reexport */ ecCurveSecp256k1), | ||
ecFromKeyType: () => (/* reexport */ ecFromKeyType), | ||
ecPoint: () => (/* reexport */ ecPoint), | ||
@@ -221,13 +220,2 @@ encrypt: () => (/* reexport */ encrypt), | ||
const CURVE_SECP256K1 = new external_elliptic_namespaceObject.ec("secp256k1"); | ||
const CURVE_ED25519 = new external_elliptic_namespaceObject.ec("ed25519"); | ||
function ecFromKeyType() { | ||
let keyType = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : "secp256k1"; | ||
if (keyType === "secp256k1") { | ||
return CURVE_SECP256K1; | ||
} else if (keyType === "ed25519") { | ||
return CURVE_ED25519; | ||
} | ||
throw new Error(`invalid key type: ${keyType}`); | ||
} | ||
async function RSSRound1Handler(body, getTSSShare) { | ||
@@ -247,3 +235,3 @@ const b = body; | ||
} | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -339,3 +327,3 @@ let servers_info; | ||
if (b.round_name !== "rss_round_2") throw new Error("incorrect round name"); | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
for (let i = 0; i < b.data.length; i++) { | ||
@@ -465,3 +453,3 @@ const factorPubs = b.data[i].factor_pubkeys; | ||
} | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -558,3 +546,3 @@ let servers_info; | ||
if (b.round_name !== "rss_round_2") throw new Error("incorrect round name"); | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
for (let i = 0; i < b.data.length; i++) { | ||
@@ -637,2 +625,3 @@ const factorPubs = b.data[i].factor_pubkeys; | ||
defineProperty_default()(this, "keyType", void 0); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
this.keyType = opts.keyType; | ||
@@ -1134,3 +1123,4 @@ this.ecCurve = new external_elliptic_namespaceObject.ec(this.keyType); | ||
} = opts; | ||
const ecCurve = new external_elliptic_namespaceObject.ec(keyType || "secp256k1"); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(keyType); | ||
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex"); | ||
@@ -1137,0 +1127,0 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then(buf => new (external_bn_js_default())(buf)); |
@@ -61,3 +61,2 @@ /******/ (() => { // webpackBootstrap | ||
ecCurveSecp256k1: () => (/* reexport */ ecCurveSecp256k1), | ||
ecFromKeyType: () => (/* reexport */ ecFromKeyType), | ||
ecPoint: () => (/* reexport */ ecPoint), | ||
@@ -221,13 +220,2 @@ encrypt: () => (/* reexport */ encrypt), | ||
const CURVE_SECP256K1 = new external_elliptic_namespaceObject.ec("secp256k1"); | ||
const CURVE_ED25519 = new external_elliptic_namespaceObject.ec("ed25519"); | ||
function ecFromKeyType() { | ||
let keyType = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : "secp256k1"; | ||
if (keyType === "secp256k1") { | ||
return CURVE_SECP256K1; | ||
} else if (keyType === "ed25519") { | ||
return CURVE_ED25519; | ||
} | ||
throw new Error(`invalid key type: ${keyType}`); | ||
} | ||
async function RSSRound1Handler(body, getTSSShare) { | ||
@@ -247,3 +235,3 @@ const b = body; | ||
} | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -339,3 +327,3 @@ let servers_info; | ||
if (b.round_name !== "rss_round_2") throw new Error("incorrect round name"); | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
for (let i = 0; i < b.data.length; i++) { | ||
@@ -465,3 +453,3 @@ const factorPubs = b.data[i].factor_pubkeys; | ||
} | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -558,3 +546,3 @@ let servers_info; | ||
if (b.round_name !== "rss_round_2") throw new Error("incorrect round name"); | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type); | ||
for (let i = 0; i < b.data.length; i++) { | ||
@@ -637,2 +625,3 @@ const factorPubs = b.data[i].factor_pubkeys; | ||
defineProperty_default()(this, "keyType", void 0); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
this.keyType = opts.keyType; | ||
@@ -1134,3 +1123,4 @@ this.ecCurve = new external_elliptic_namespaceObject.ec(this.keyType); | ||
} = opts; | ||
const ecCurve = new external_elliptic_namespaceObject.ec(keyType || "secp256k1"); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
const ecCurve = new external_elliptic_namespaceObject.ec(keyType); | ||
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex"); | ||
@@ -1137,0 +1127,0 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then(buf => new (external_bn_js_default())(buf)); |
@@ -134,13 +134,2 @@ import _defineProperty from '@babel/runtime/helpers/defineProperty'; | ||
const CURVE_SECP256K1 = new ec("secp256k1"); | ||
const CURVE_ED25519 = new ec("ed25519"); | ||
function ecFromKeyType() { | ||
let keyType = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : "secp256k1"; | ||
if (keyType === "secp256k1") { | ||
return CURVE_SECP256K1; | ||
} else if (keyType === "ed25519") { | ||
return CURVE_ED25519; | ||
} | ||
throw new Error(`invalid key type: ${keyType}`); | ||
} | ||
async function RSSRound1Handler(body, getTSSShare) { | ||
@@ -160,3 +149,3 @@ const b = body; | ||
} | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new ec(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -252,3 +241,3 @@ let servers_info; | ||
if (b.round_name !== "rss_round_2") throw new Error("incorrect round name"); | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new ec(b.key_type); | ||
for (let i = 0; i < b.data.length; i++) { | ||
@@ -378,3 +367,3 @@ const factorPubs = b.data[i].factor_pubkeys; | ||
} | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new ec(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -471,3 +460,3 @@ let servers_info; | ||
if (b.round_name !== "rss_round_2") throw new Error("incorrect round name"); | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new ec(b.key_type); | ||
for (let i = 0; i < b.data.length; i++) { | ||
@@ -539,2 +528,3 @@ const factorPubs = b.data[i].factor_pubkeys; | ||
_defineProperty(this, "keyType", void 0); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
this.keyType = opts.keyType; | ||
@@ -1036,3 +1026,4 @@ this.ecCurve = new ec(this.keyType); | ||
} = opts; | ||
const ecCurve = new ec(keyType || "secp256k1"); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
const ecCurve = new ec(keyType); | ||
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex"); | ||
@@ -1054,2 +1045,2 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then(buf => new BN(buf)); | ||
export { MockServer, RSSClient, RSSRound1Handler, RSSRound2Handler, decrypt, dotProduct, ecCurveSecp256k1, ecFromKeyType, ecPoint, encrypt, generatePolynomial, getEndpoint, getLagrangeCoeff, getShare, hexPoint, lagrangeInterpolation, postEndpoint, randomSelection, recover }; | ||
export { MockServer, RSSClient, RSSRound1Handler, RSSRound2Handler, decrypt, dotProduct, ecCurveSecp256k1, ecPoint, encrypt, generatePolynomial, getEndpoint, getLagrangeCoeff, getShare, hexPoint, lagrangeInterpolation, postEndpoint, randomSelection, recover }; |
import BN from "bn.js"; | ||
import { ec as EC } from "elliptic"; | ||
import { ServersInfo } from "./rss"; | ||
import { KeyType, ServersInfo } from "./rss"; | ||
import { EncryptedMessage, PointHex } from "./utils"; | ||
@@ -15,3 +14,3 @@ type RSSRound1Request = { | ||
auth: unknown; | ||
key_type: string; | ||
key_type: KeyType; | ||
}; | ||
@@ -41,3 +40,3 @@ type RSSRound1ResponseData = { | ||
data: RSSRound2RequestData[]; | ||
key_type: string; | ||
key_type: KeyType; | ||
}; | ||
@@ -51,3 +50,2 @@ type RSSRound2ResponseData = { | ||
}; | ||
export declare function ecFromKeyType(keyType?: string): EC; | ||
export declare function RSSRound1Handler(body: RSSRound1Request, getTSSShare: (label: string) => Promise<BN>): Promise<RSSRound1Response>; | ||
@@ -54,0 +52,0 @@ export declare function RSSRound2Handler(body: RSSRound2Request, getPrivKey: () => Promise<BN>): Promise<RSSRound2Response>; |
@@ -1,2 +0,1 @@ | ||
/// <reference types="node" /> | ||
import BN from "bn.js"; | ||
@@ -3,0 +2,0 @@ import { curve, ec as EC } from "elliptic"; |
{ | ||
"name": "@toruslabs/rss-client", | ||
"version": "2.0.0-0", | ||
"version": "2.0.0", | ||
"description": "RSS Client", | ||
"main": "dist/rssClient.cjs.js", | ||
"module": "dist/rssClient.esm.js", | ||
"main": "dist/lib.cjs/index.js", | ||
"module": "dist/lib.esm/index.js", | ||
"unpkg": "dist/rssClient.umd.min.js", | ||
@@ -29,30 +29,30 @@ "jsdelivr": "dist/rssClient.umd.min.js", | ||
"dependencies": { | ||
"@toruslabs/eccrypto": "^4.0.0", | ||
"@toruslabs/http-helpers": "^5.0.0", | ||
"@toruslabs/eccrypto": "^5.0.4", | ||
"@toruslabs/http-helpers": "^7.0.0", | ||
"bn.js": "^5.2.1", | ||
"elliptic": "^6.5.4", | ||
"elliptic": "^6.5.6", | ||
"fetch": "^1.1.0", | ||
"loglevel": "^1.8.1", | ||
"web3-eth-contract": "^4.1.0", | ||
"web3-utils": "^4.0.6" | ||
"loglevel": "^1.9.1", | ||
"web3-eth-contract": "^4.6.0", | ||
"web3-utils": "^4.3.1" | ||
}, | ||
"devDependencies": { | ||
"@babel/register": "^7.22.15", | ||
"@rollup/plugin-replace": "^5.0.2", | ||
"@toruslabs/config": "^2.0.2", | ||
"@toruslabs/eslint-config-typescript": "^3.0.1", | ||
"@toruslabs/torus-scripts": "^5.0.5", | ||
"@types/elliptic": "^6.4.15", | ||
"@types/mocha": "^10.0.2", | ||
"@babel/register": "^7.24.6", | ||
"@rollup/plugin-replace": "^5.0.7", | ||
"@toruslabs/config": "^2.2.0", | ||
"@toruslabs/eslint-config-typescript": "^3.3.3", | ||
"@toruslabs/torus-scripts": "^6.1.1", | ||
"@types/elliptic": "^6.4.18", | ||
"@types/mocha": "^10.0.7", | ||
"assert": "^2.1.0", | ||
"cross-env": "^7.0.3", | ||
"dotenv": "^16.3.1", | ||
"dotenv": "^16.4.5", | ||
"eslint": "^8.50.0", | ||
"husky": "^8.0.3", | ||
"lint-staged": "^14.0.1", | ||
"mocha": "^10.2.0", | ||
"prettier": "^3.0.3", | ||
"rimraf": "^5.0.5", | ||
"ts-node": "^10.9.1", | ||
"typescript": "^5.2.2" | ||
"husky": "^9.1.4", | ||
"lint-staged": "^15.2.8", | ||
"mocha": "^10.7.0", | ||
"prettier": "^3.3.3", | ||
"rimraf": "^6.0.1", | ||
"ts-node": "^10.9.2", | ||
"typescript": "^5.5.4" | ||
}, | ||
@@ -59,0 +59,0 @@ "lint-staged": { |
@@ -5,3 +5,3 @@ /* eslint-disable camelcase */ | ||
import { ServersInfo } from "./rss"; | ||
import { KeyType, ServersInfo } from "./rss"; | ||
import { | ||
@@ -35,3 +35,3 @@ decrypt, | ||
auth: unknown; | ||
key_type: string; | ||
key_type: KeyType; | ||
}; | ||
@@ -65,3 +65,3 @@ | ||
data: RSSRound2RequestData[]; | ||
key_type: string; | ||
key_type: KeyType; | ||
}; | ||
@@ -78,14 +78,2 @@ | ||
const CURVE_SECP256K1 = new EC("secp256k1"); | ||
const CURVE_ED25519 = new EC("ed25519"); | ||
export function ecFromKeyType(keyType = "secp256k1"): EC { | ||
if (keyType === "secp256k1") { | ||
return CURVE_SECP256K1; | ||
} else if (keyType === "ed25519") { | ||
return CURVE_ED25519; | ||
} | ||
throw new Error(`invalid key type: ${keyType}`); | ||
} | ||
export async function RSSRound1Handler(body: RSSRound1Request, getTSSShare: (label: string) => Promise<BN>): Promise<RSSRound1Response> { | ||
@@ -106,3 +94,3 @@ const b = body; | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new EC(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -222,3 +210,3 @@ | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new EC(b.key_type); | ||
@@ -360,3 +348,3 @@ for (let i = 0; i < b.data.length; i++) { | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new EC(b.key_type); | ||
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate(); | ||
@@ -476,3 +464,3 @@ | ||
const ecCurve = ecFromKeyType(b.key_type); | ||
const ecCurve = new EC(b.key_type); | ||
@@ -479,0 +467,0 @@ for (let i = 0; i < b.data.length; i++) { |
@@ -160,2 +160,3 @@ import { CustomOptions, Data, get, post } from "@toruslabs/http-helpers"; | ||
constructor(opts: RSSClientOptions) { | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
this.keyType = opts.keyType; | ||
@@ -662,3 +663,4 @@ this.ecCurve = new EC(this.keyType); | ||
const { factorKey, serverEncs, userEnc, selectedServers, keyType } = opts; | ||
const ecCurve = new EC(keyType || "secp256k1"); | ||
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported"); | ||
const ecCurve = new EC(keyType); | ||
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex"); | ||
@@ -665,0 +667,0 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then((buf) => new BN(buf)); |
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
New author
Supply chain riskA new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Found 1 instance in 1 package
No v1
QualityPackage is not semver >=1. This means it is not stable and does not support ^ ranges.
Found 1 instance in 1 package
474342
24
6601
0
1
+ Added@toruslabs/eccrypto@5.0.4(transitive)
+ Added@toruslabs/http-helpers@7.0.0(transitive)
+ Addeddeepmerge@4.3.1(transitive)
- Removed@toruslabs/eccrypto@4.0.0(transitive)
- Removed@toruslabs/http-helpers@5.0.0(transitive)
- Removedlodash.merge@4.6.2(transitive)
Updated@toruslabs/eccrypto@^5.0.4
Updatedelliptic@^6.5.6
Updatedloglevel@^1.9.1
Updatedweb3-eth-contract@^4.6.0
Updatedweb3-utils@^4.3.1