diff --git a/dist/secp256k1-adapter.js b/dist/secp256k1-adapter.js index e4d053a3a828f07046b360f5990a8fcbfcc5a92d..fdc14f61d8718e9514d8a81bbb7b4e9d58132432 100644 --- a/dist/secp256k1-adapter.js +++ b/dist/secp256k1-adapter.js @@ -2,7 +2,7 @@ var secp256k1 = require('ethereum-cryptography/secp256k1'); -var secp256k1v3 = require('./secp256k1-lib/index'); +function getSecp256k1 () { return require('./secp256k1-lib/index'); } var der = require('./secp256k1-lib/der'); /** @@ -28,6 +28,7 @@ var privateKeyVerify = function privateKeyVerify(privateKey) { * @return {boolean} */ var privateKeyExport = function privateKeyExport(privateKey, compressed) { + var secp256k1v3 = getSecp256k1(); // privateKeyExport method is not part of secp256k1 v4 package // this implementation is based on v3 if (privateKey.length !== 32) { @@ -77,7 +78,7 @@ var privateKeyModInverse = function privateKeyModInverse(privateKey) { if (privateKey.length !== 32) { throw new Error('private key length is invalid'); } - + var secp256k1v3 = getSecp256k1(); return Buffer.from(secp256k1v3.privateKeyModInverse(Uint8Array.from(privateKey))); }; @@ -223,6 +224,7 @@ var signatureImportLax = function signatureImportLax(signature) { if (signature.length === 0) { throw new RangeError('signature length is invalid'); } + var secp256k1v3 = getSecp256k1(); var sigObj = der.signatureImportLax(signature); if (sigObj === null) { @@ -351,6 +353,7 @@ var ecdhUnsafe = function ecdhUnsafe(publicKey, privateKey, compressed) { if (privateKey.length !== 32) { throw new RangeError('private key length is invalid'); } + var secp256k1v3 = getSecp256k1(); return Buffer.from(secp256k1v3.ecdhUnsafe(Uint8Array.from(publicKey), Uint8Array.from(privateKey), compressed)); };