Comparing version 0.9.10 to 0.9.11
@@ -16,3 +16,3 @@ "use strict"; | ||
const secp256k1_1 = __importDefault(require("../keys/secp256k1")); | ||
const secp256k1_2 = require("secp256k1"); | ||
const secp256k1_2 = __importDefault(require("secp256k1")); | ||
const base64url_1 = __importDefault(require("base64url")); | ||
@@ -30,3 +30,3 @@ const bytes_1 = require("@ethersproject/bytes"); | ||
const b = Buffer.from(key, "hex"); | ||
const pub = (0, secp256k1_2.publicKeyCreate)(b, false); | ||
const pub = secp256k1_2.default.publicKeyCreate(b, false); | ||
super(key, Buffer.from(pub)); | ||
@@ -46,3 +46,3 @@ } | ||
// return ethers.utils.verifyMessage(message, signature) === address; | ||
return (0, secp256k1_2.ecdsaVerify)(signature.length === 65 ? signature.slice(0, -1) : signature, (0, bytes_1.arrayify)((0, hash_1.hashMessage)(message)), typeof pk === "string" ? base64url_1.default.toBuffer(pk) : pk); | ||
return secp256k1_2.default.ecdsaVerify(signature.length === 65 ? signature.slice(0, -1) : signature, (0, bytes_1.arrayify)((0, hash_1.hashMessage)(message)), typeof pk === "string" ? base64url_1.default.toBuffer(pk) : pk); | ||
}); | ||
@@ -49,0 +49,0 @@ } |
@@ -16,3 +16,3 @@ "use strict"; | ||
const base64url_1 = __importDefault(require("base64url")); | ||
const secp256k1_1 = require("secp256k1"); | ||
const secp256k1_1 = __importDefault(require("secp256k1")); | ||
const constants_1 = require("../../constants"); | ||
@@ -41,3 +41,3 @@ const keccak256_1 = __importDefault(require("../keccak256")); | ||
try { | ||
verified = (0, secp256k1_1.ecdsaVerify)(signature, (0, keccak256_1.default)(Buffer.from(message)), p); | ||
verified = secp256k1_1.default.ecdsaVerify(signature, (0, keccak256_1.default)(Buffer.from(message)), p); | ||
// eslint-disable-next-line no-empty | ||
@@ -51,3 +51,3 @@ } | ||
return __awaiter(this, void 0, void 0, function* () { | ||
return (0, secp256k1_1.ecdsaSign)((0, keccak256_1.default)(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
return secp256k1_1.default.ecdsaSign((0, keccak256_1.default)(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
}); | ||
@@ -54,0 +54,0 @@ } |
import Secp256k1 from "../keys/secp256k1.js"; | ||
import { ecdsaVerify, publicKeyCreate } from "secp256k1"; | ||
import secp256k1 from "secp256k1"; | ||
import base64url from "base64url"; | ||
@@ -15,3 +15,3 @@ import { arrayify } from "@ethersproject/bytes"; | ||
const b = Buffer.from(key, "hex"); | ||
const pub = publicKeyCreate(b, false); | ||
const pub = secp256k1.publicKeyCreate(b, false); | ||
super(key, Buffer.from(pub)); | ||
@@ -28,5 +28,5 @@ } | ||
// return ethers.utils.verifyMessage(message, signature) === address; | ||
return ecdsaVerify(signature.length === 65 ? signature.slice(0, -1) : signature, arrayify(hashMessage(message)), typeof pk === "string" ? base64url.toBuffer(pk) : pk); | ||
return secp256k1.ecdsaVerify(signature.length === 65 ? signature.slice(0, -1) : signature, arrayify(hashMessage(message)), typeof pk === "string" ? base64url.toBuffer(pk) : pk); | ||
} | ||
} | ||
//# sourceMappingURL=ethereumSigner.js.map |
import base64url from "base64url"; | ||
import { ecdsaSign, ecdsaVerify } from "secp256k1"; | ||
import secp256k1 from "secp256k1"; | ||
import { SignatureConfig, SIG_CONFIG } from "../../constants.js"; | ||
@@ -27,3 +27,3 @@ import keccak256 from "../keccak256.js"; | ||
try { | ||
verified = ecdsaVerify(signature, keccak256(Buffer.from(message)), p); | ||
verified = secp256k1.ecdsaVerify(signature, keccak256(Buffer.from(message)), p); | ||
// eslint-disable-next-line no-empty | ||
@@ -35,5 +35,5 @@ } | ||
async sign(message) { | ||
return ecdsaSign(keccak256(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
return secp256k1.ecdsaSign(keccak256(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
} | ||
} | ||
//# sourceMappingURL=secp256k1.js.map |
@@ -16,3 +16,3 @@ "use strict"; | ||
const secp256k1_1 = __importDefault(require("../keys/secp256k1")); | ||
const secp256k1_2 = require("secp256k1"); | ||
const secp256k1_2 = __importDefault(require("secp256k1")); | ||
const base64url_1 = __importDefault(require("base64url")); | ||
@@ -30,3 +30,3 @@ const bytes_1 = require("@ethersproject/bytes"); | ||
const b = Buffer.from(key, "hex"); | ||
const pub = (0, secp256k1_2.publicKeyCreate)(b, false); | ||
const pub = secp256k1_2.default.publicKeyCreate(b, false); | ||
super(key, Buffer.from(pub)); | ||
@@ -46,3 +46,3 @@ } | ||
// return ethers.utils.verifyMessage(message, signature) === address; | ||
return (0, secp256k1_2.ecdsaVerify)(signature.length === 65 ? signature.slice(0, -1) : signature, (0, bytes_1.arrayify)((0, hash_1.hashMessage)(message)), typeof pk === "string" ? base64url_1.default.toBuffer(pk) : pk); | ||
return secp256k1_2.default.ecdsaVerify(signature.length === 65 ? signature.slice(0, -1) : signature, (0, bytes_1.arrayify)((0, hash_1.hashMessage)(message)), typeof pk === "string" ? base64url_1.default.toBuffer(pk) : pk); | ||
}); | ||
@@ -49,0 +49,0 @@ } |
@@ -16,3 +16,3 @@ "use strict"; | ||
const base64url_1 = __importDefault(require("base64url")); | ||
const secp256k1_1 = require("secp256k1"); | ||
const secp256k1_1 = __importDefault(require("secp256k1")); | ||
const constants_1 = require("../../constants"); | ||
@@ -41,3 +41,3 @@ const keccak256_1 = __importDefault(require("../keccak256")); | ||
try { | ||
verified = (0, secp256k1_1.ecdsaVerify)(signature, (0, keccak256_1.default)(Buffer.from(message)), p); | ||
verified = secp256k1_1.default.ecdsaVerify(signature, (0, keccak256_1.default)(Buffer.from(message)), p); | ||
// eslint-disable-next-line no-empty | ||
@@ -51,3 +51,3 @@ } | ||
return __awaiter(this, void 0, void 0, function* () { | ||
return (0, secp256k1_1.ecdsaSign)((0, keccak256_1.default)(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
return secp256k1_1.default.ecdsaSign((0, keccak256_1.default)(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
}); | ||
@@ -54,0 +54,0 @@ } |
import Secp256k1 from "../keys/secp256k1.js"; | ||
import { ecdsaVerify, publicKeyCreate } from "secp256k1"; | ||
import secp256k1 from "secp256k1"; | ||
import base64url from "base64url"; | ||
@@ -15,3 +15,3 @@ import { arrayify } from "@ethersproject/bytes"; | ||
const b = Buffer.from(key, "hex"); | ||
const pub = publicKeyCreate(b, false); | ||
const pub = secp256k1.publicKeyCreate(b, false); | ||
super(key, Buffer.from(pub)); | ||
@@ -28,5 +28,5 @@ } | ||
// return ethers.utils.verifyMessage(message, signature) === address; | ||
return ecdsaVerify(signature.length === 65 ? signature.slice(0, -1) : signature, arrayify(hashMessage(message)), typeof pk === "string" ? base64url.toBuffer(pk) : pk); | ||
return secp256k1.ecdsaVerify(signature.length === 65 ? signature.slice(0, -1) : signature, arrayify(hashMessage(message)), typeof pk === "string" ? base64url.toBuffer(pk) : pk); | ||
} | ||
} | ||
//# sourceMappingURL=ethereumSigner.js.map |
import base64url from "base64url"; | ||
import { ecdsaSign, ecdsaVerify } from "secp256k1"; | ||
import secp256k1 from "secp256k1"; | ||
import { SignatureConfig, SIG_CONFIG } from "../../constants.js"; | ||
@@ -27,3 +27,3 @@ import keccak256 from "../keccak256.js"; | ||
try { | ||
verified = ecdsaVerify(signature, keccak256(Buffer.from(message)), p); | ||
verified = secp256k1.ecdsaVerify(signature, keccak256(Buffer.from(message)), p); | ||
// eslint-disable-next-line no-empty | ||
@@ -35,5 +35,5 @@ } | ||
async sign(message) { | ||
return ecdsaSign(keccak256(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
return secp256k1.ecdsaSign(keccak256(Buffer.from(message)), Buffer.from(this.key)).signature; | ||
} | ||
} | ||
//# sourceMappingURL=secp256k1.js.map |
{ | ||
"name": "arbundles", | ||
"version": "0.9.10", | ||
"version": "0.9.11", | ||
"description": "Arweave bundling library", | ||
@@ -5,0 +5,0 @@ "author": "Josh Benaron <joshbenaron@gmail.com>", |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
4991155