Socket
Socket
Sign inDemoInstall

@toruslabs/rss-client

Package Overview
Dependencies
Maintainers
5
Versions
11
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@toruslabs/rss-client - npm Package Compare versions

Comparing version 2.0.0-0 to 2.0.0

dist/lib.cjs/index.js

24

dist/rssClient-node.js

@@ -61,3 +61,2 @@ /******/ (() => { // webpackBootstrap

ecCurveSecp256k1: () => (/* reexport */ ecCurveSecp256k1),
ecFromKeyType: () => (/* reexport */ ecFromKeyType),
ecPoint: () => (/* reexport */ ecPoint),

@@ -221,13 +220,2 @@ encrypt: () => (/* reexport */ encrypt),

const CURVE_SECP256K1 = new external_elliptic_namespaceObject.ec("secp256k1");
const CURVE_ED25519 = new external_elliptic_namespaceObject.ec("ed25519");
function ecFromKeyType() {
let keyType = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : "secp256k1";
if (keyType === "secp256k1") {
return CURVE_SECP256K1;
} else if (keyType === "ed25519") {
return CURVE_ED25519;
}
throw new Error(`invalid key type: ${keyType}`);
}
async function RSSRound1Handler(body, getTSSShare) {

@@ -247,3 +235,3 @@ const b = body;

}
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -339,3 +327,3 @@ let servers_info;

if (b.round_name !== "rss_round_2") throw new Error("incorrect round name");
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
for (let i = 0; i < b.data.length; i++) {

@@ -465,3 +453,3 @@ const factorPubs = b.data[i].factor_pubkeys;

}
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -558,3 +546,3 @@ let servers_info;

if (b.round_name !== "rss_round_2") throw new Error("incorrect round name");
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
for (let i = 0; i < b.data.length; i++) {

@@ -637,2 +625,3 @@ const factorPubs = b.data[i].factor_pubkeys;

defineProperty_default()(this, "keyType", void 0);
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
this.keyType = opts.keyType;

@@ -1134,3 +1123,4 @@ this.ecCurve = new external_elliptic_namespaceObject.ec(this.keyType);

} = opts;
const ecCurve = new external_elliptic_namespaceObject.ec(keyType || "secp256k1");
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
const ecCurve = new external_elliptic_namespaceObject.ec(keyType);
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex");

@@ -1137,0 +1127,0 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then(buf => new (external_bn_js_default())(buf));

@@ -61,3 +61,2 @@ /******/ (() => { // webpackBootstrap

ecCurveSecp256k1: () => (/* reexport */ ecCurveSecp256k1),
ecFromKeyType: () => (/* reexport */ ecFromKeyType),
ecPoint: () => (/* reexport */ ecPoint),

@@ -221,13 +220,2 @@ encrypt: () => (/* reexport */ encrypt),

const CURVE_SECP256K1 = new external_elliptic_namespaceObject.ec("secp256k1");
const CURVE_ED25519 = new external_elliptic_namespaceObject.ec("ed25519");
function ecFromKeyType() {
let keyType = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : "secp256k1";
if (keyType === "secp256k1") {
return CURVE_SECP256K1;
} else if (keyType === "ed25519") {
return CURVE_ED25519;
}
throw new Error(`invalid key type: ${keyType}`);
}
async function RSSRound1Handler(body, getTSSShare) {

@@ -247,3 +235,3 @@ const b = body;

}
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -339,3 +327,3 @@ let servers_info;

if (b.round_name !== "rss_round_2") throw new Error("incorrect round name");
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
for (let i = 0; i < b.data.length; i++) {

@@ -465,3 +453,3 @@ const factorPubs = b.data[i].factor_pubkeys;

}
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -558,3 +546,3 @@ let servers_info;

if (b.round_name !== "rss_round_2") throw new Error("incorrect round name");
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new external_elliptic_namespaceObject.ec(b.key_type);
for (let i = 0; i < b.data.length; i++) {

@@ -637,2 +625,3 @@ const factorPubs = b.data[i].factor_pubkeys;

defineProperty_default()(this, "keyType", void 0);
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
this.keyType = opts.keyType;

@@ -1134,3 +1123,4 @@ this.ecCurve = new external_elliptic_namespaceObject.ec(this.keyType);

} = opts;
const ecCurve = new external_elliptic_namespaceObject.ec(keyType || "secp256k1");
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
const ecCurve = new external_elliptic_namespaceObject.ec(keyType);
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex");

@@ -1137,0 +1127,0 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then(buf => new (external_bn_js_default())(buf));

@@ -134,13 +134,2 @@ import _defineProperty from '@babel/runtime/helpers/defineProperty';

const CURVE_SECP256K1 = new ec("secp256k1");
const CURVE_ED25519 = new ec("ed25519");
function ecFromKeyType() {
let keyType = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : "secp256k1";
if (keyType === "secp256k1") {
return CURVE_SECP256K1;
} else if (keyType === "ed25519") {
return CURVE_ED25519;
}
throw new Error(`invalid key type: ${keyType}`);
}
async function RSSRound1Handler(body, getTSSShare) {

@@ -160,3 +149,3 @@ const b = body;

}
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new ec(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -252,3 +241,3 @@ let servers_info;

if (b.round_name !== "rss_round_2") throw new Error("incorrect round name");
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new ec(b.key_type);
for (let i = 0; i < b.data.length; i++) {

@@ -378,3 +367,3 @@ const factorPubs = b.data[i].factor_pubkeys;

}
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new ec(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -471,3 +460,3 @@ let servers_info;

if (b.round_name !== "rss_round_2") throw new Error("incorrect round name");
const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new ec(b.key_type);
for (let i = 0; i < b.data.length; i++) {

@@ -539,2 +528,3 @@ const factorPubs = b.data[i].factor_pubkeys;

_defineProperty(this, "keyType", void 0);
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
this.keyType = opts.keyType;

@@ -1036,3 +1026,4 @@ this.ecCurve = new ec(this.keyType);

} = opts;
const ecCurve = new ec(keyType || "secp256k1");
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
const ecCurve = new ec(keyType);
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex");

@@ -1054,2 +1045,2 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then(buf => new BN(buf));

export { MockServer, RSSClient, RSSRound1Handler, RSSRound2Handler, decrypt, dotProduct, ecCurveSecp256k1, ecFromKeyType, ecPoint, encrypt, generatePolynomial, getEndpoint, getLagrangeCoeff, getShare, hexPoint, lagrangeInterpolation, postEndpoint, randomSelection, recover };
export { MockServer, RSSClient, RSSRound1Handler, RSSRound2Handler, decrypt, dotProduct, ecCurveSecp256k1, ecPoint, encrypt, generatePolynomial, getEndpoint, getLagrangeCoeff, getShare, hexPoint, lagrangeInterpolation, postEndpoint, randomSelection, recover };
import BN from "bn.js";
import { ec as EC } from "elliptic";
import { ServersInfo } from "./rss";
import { KeyType, ServersInfo } from "./rss";
import { EncryptedMessage, PointHex } from "./utils";

@@ -15,3 +14,3 @@ type RSSRound1Request = {

auth: unknown;
key_type: string;
key_type: KeyType;
};

@@ -41,3 +40,3 @@ type RSSRound1ResponseData = {

data: RSSRound2RequestData[];
key_type: string;
key_type: KeyType;
};

@@ -51,3 +50,2 @@ type RSSRound2ResponseData = {

};
export declare function ecFromKeyType(keyType?: string): EC;
export declare function RSSRound1Handler(body: RSSRound1Request, getTSSShare: (label: string) => Promise<BN>): Promise<RSSRound1Response>;

@@ -54,0 +52,0 @@ export declare function RSSRound2Handler(body: RSSRound2Request, getPrivKey: () => Promise<BN>): Promise<RSSRound2Response>;

@@ -1,2 +0,1 @@

/// <reference types="node" />
import BN from "bn.js";

@@ -3,0 +2,0 @@ import { curve, ec as EC } from "elliptic";

{
"name": "@toruslabs/rss-client",
"version": "2.0.0-0",
"version": "2.0.0",
"description": "RSS Client",
"main": "dist/rssClient.cjs.js",
"module": "dist/rssClient.esm.js",
"main": "dist/lib.cjs/index.js",
"module": "dist/lib.esm/index.js",
"unpkg": "dist/rssClient.umd.min.js",

@@ -29,30 +29,30 @@ "jsdelivr": "dist/rssClient.umd.min.js",

"dependencies": {
"@toruslabs/eccrypto": "^4.0.0",
"@toruslabs/http-helpers": "^5.0.0",
"@toruslabs/eccrypto": "^5.0.4",
"@toruslabs/http-helpers": "^7.0.0",
"bn.js": "^5.2.1",
"elliptic": "^6.5.4",
"elliptic": "^6.5.6",
"fetch": "^1.1.0",
"loglevel": "^1.8.1",
"web3-eth-contract": "^4.1.0",
"web3-utils": "^4.0.6"
"loglevel": "^1.9.1",
"web3-eth-contract": "^4.6.0",
"web3-utils": "^4.3.1"
},
"devDependencies": {
"@babel/register": "^7.22.15",
"@rollup/plugin-replace": "^5.0.2",
"@toruslabs/config": "^2.0.2",
"@toruslabs/eslint-config-typescript": "^3.0.1",
"@toruslabs/torus-scripts": "^5.0.5",
"@types/elliptic": "^6.4.15",
"@types/mocha": "^10.0.2",
"@babel/register": "^7.24.6",
"@rollup/plugin-replace": "^5.0.7",
"@toruslabs/config": "^2.2.0",
"@toruslabs/eslint-config-typescript": "^3.3.3",
"@toruslabs/torus-scripts": "^6.1.1",
"@types/elliptic": "^6.4.18",
"@types/mocha": "^10.0.7",
"assert": "^2.1.0",
"cross-env": "^7.0.3",
"dotenv": "^16.3.1",
"dotenv": "^16.4.5",
"eslint": "^8.50.0",
"husky": "^8.0.3",
"lint-staged": "^14.0.1",
"mocha": "^10.2.0",
"prettier": "^3.0.3",
"rimraf": "^5.0.5",
"ts-node": "^10.9.1",
"typescript": "^5.2.2"
"husky": "^9.1.4",
"lint-staged": "^15.2.8",
"mocha": "^10.7.0",
"prettier": "^3.3.3",
"rimraf": "^6.0.1",
"ts-node": "^10.9.2",
"typescript": "^5.5.4"
},

@@ -59,0 +59,0 @@ "lint-staged": {

@@ -5,3 +5,3 @@ /* eslint-disable camelcase */

import { ServersInfo } from "./rss";
import { KeyType, ServersInfo } from "./rss";
import {

@@ -35,3 +35,3 @@ decrypt,

auth: unknown;
key_type: string;
key_type: KeyType;
};

@@ -65,3 +65,3 @@

data: RSSRound2RequestData[];
key_type: string;
key_type: KeyType;
};

@@ -78,14 +78,2 @@

const CURVE_SECP256K1 = new EC("secp256k1");
const CURVE_ED25519 = new EC("ed25519");
export function ecFromKeyType(keyType = "secp256k1"): EC {
if (keyType === "secp256k1") {
return CURVE_SECP256K1;
} else if (keyType === "ed25519") {
return CURVE_ED25519;
}
throw new Error(`invalid key type: ${keyType}`);
}
export async function RSSRound1Handler(body: RSSRound1Request, getTSSShare: (label: string) => Promise<BN>): Promise<RSSRound1Response> {

@@ -106,3 +94,3 @@ const b = body;

const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new EC(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -222,3 +210,3 @@

const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new EC(b.key_type);

@@ -360,3 +348,3 @@ for (let i = 0; i < b.data.length; i++) {

const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new EC(b.key_type);
const genRandomScalar = () => ecCurve.genKeyPair().getPrivate();

@@ -476,3 +464,3 @@

const ecCurve = ecFromKeyType(b.key_type);
const ecCurve = new EC(b.key_type);

@@ -479,0 +467,0 @@ for (let i = 0; i < b.data.length; i++) {

@@ -160,2 +160,3 @@ import { CustomOptions, Data, get, post } from "@toruslabs/http-helpers";

constructor(opts: RSSClientOptions) {
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
this.keyType = opts.keyType;

@@ -662,3 +663,4 @@ this.ecCurve = new EC(this.keyType);

const { factorKey, serverEncs, userEnc, selectedServers, keyType } = opts;
const ecCurve = new EC(keyType || "secp256k1");
if (opts.keyType !== "secp256k1" && opts.keyType !== "ed25519") throw new Error("Invalid keyType, only secp256k1 or ed25519 is supported");
const ecCurve = new EC(keyType);
const factorKeyBuf = Buffer.from(factorKey.toString(16, 64), "hex");

@@ -665,0 +667,0 @@ const prom1 = decrypt(factorKeyBuf, userEnc).then((buf) => new BN(buf));

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc