@ocap/mcrypto
Advanced tools
Comparing version 1.18.51 to 1.18.52
"use strict"; | ||
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { | ||
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } | ||
return new (P || (P = Promise))(function (resolve, reject) { | ||
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } | ||
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } | ||
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } | ||
step((generator = generator.apply(thisArg, _arguments || [])).next()); | ||
}); | ||
}; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
@@ -22,30 +13,22 @@ exports.RSABrowserCrypter = void 0; | ||
class RSABrowserCrypter { | ||
genKeyPair(length = 2048) { | ||
return __awaiter(this, void 0, void 0, function* () { | ||
return crypto.generateKey({ | ||
name: RSA_ALGORITHM, | ||
modulusLength: length, | ||
publicExponent: new Uint8Array([1, 0, 1]), | ||
hash: 'SHA-256', | ||
}, true, ['encrypt', 'decrypt']); | ||
}); | ||
async genKeyPair(length = 2048) { | ||
return crypto.generateKey({ | ||
name: RSA_ALGORITHM, | ||
modulusLength: length, | ||
publicExponent: new Uint8Array([1, 0, 1]), | ||
hash: 'SHA-256', | ||
}, true, ['encrypt', 'decrypt']); | ||
} | ||
formatPublicKey(key) { | ||
return __awaiter(this, void 0, void 0, function* () { | ||
const exported = yield crypto.exportKey('spki', key); | ||
const base64 = window.btoa(ab2str(exported)); | ||
return `-----BEGIN PUBLIC KEY-----\n${base64}\n-----END PUBLIC KEY-----`; | ||
}); | ||
async formatPublicKey(key) { | ||
const exported = await crypto.exportKey('spki', key); | ||
const base64 = window.btoa(ab2str(exported)); | ||
return `-----BEGIN PUBLIC KEY-----\n${base64}\n-----END PUBLIC KEY-----`; | ||
} | ||
encrypt(message, key) { | ||
return __awaiter(this, void 0, void 0, function* () { | ||
const encrypted = yield crypto.encrypt({ name: RSA_ALGORITHM }, key, new TextEncoder().encode(message)); | ||
return (0, util_1.toBase58)(new Uint8Array(encrypted)); | ||
}); | ||
async encrypt(message, key) { | ||
const encrypted = await crypto.encrypt({ name: RSA_ALGORITHM }, key, new TextEncoder().encode(message)); | ||
return (0, util_1.toBase58)(new Uint8Array(encrypted)); | ||
} | ||
decrypt(message, key) { | ||
return __awaiter(this, void 0, void 0, function* () { | ||
const decrypted = yield crypto.decrypt({ name: RSA_ALGORITHM }, key, (0, util_1.fromBase58)(message)); | ||
return Buffer.from(new Uint8Array(decrypted)).toString('utf8'); | ||
}); | ||
async decrypt(message, key) { | ||
const decrypted = await crypto.decrypt({ name: RSA_ALGORITHM }, key, (0, util_1.fromBase58)(message)); | ||
return Buffer.from(new Uint8Array(decrypted)).toString('utf8'); | ||
} | ||
@@ -52,0 +35,0 @@ } |
{ | ||
"name": "@ocap/mcrypto", | ||
"version": "1.18.51", | ||
"version": "1.18.52", | ||
"description": "Crypto lib that provides signer,crypter,hasher interface", | ||
@@ -59,3 +59,3 @@ "keywords": [ | ||
"dependencies": { | ||
"@ocap/util": "1.18.51", | ||
"@ocap/util": "1.18.52", | ||
"bn.js": "5.2.1", | ||
@@ -76,3 +76,3 @@ "crypto-js": "^4.1.1", | ||
}, | ||
"gitHead": "cbe5db2a6951ade1e813990421ec4c1f757eeaf8" | ||
"gitHead": "96239c70a503c2a045dbef508c3086251dee7ce5" | ||
} |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
47254
1222
+ Added@ocap/util@1.18.52(transitive)
- Removed@ocap/util@1.18.51(transitive)
Updated@ocap/util@1.18.52