Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@radixdlt/crypto

Package Overview
Dependencies
Maintainers
2
Versions
75
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@radixdlt/crypto - npm Package Compare versions

Comparing version 1.0.43 to 1.0.45

dist/encryption/encryptedMessage.d.ts

16

CHANGELOG.md

@@ -6,2 +6,18 @@ # Change Log

## [1.0.45](https://github.com/radixdlt/radixdlt-javascript/compare/@radixdlt/crypto@1.0.44...@radixdlt/crypto@1.0.45) (2021-06-28)
**Note:** Version bump only for package @radixdlt/crypto
## [1.0.44](https://github.com/radixdlt/radixdlt-javascript/compare/@radixdlt/crypto@1.0.43...@radixdlt/crypto@1.0.44) (2021-06-28)
**Note:** Version bump only for package @radixdlt/crypto
## [1.0.43](https://github.com/radixdlt/radixdlt-javascript/compare/@radixdlt/crypto@1.0.42...@radixdlt/crypto@1.0.43) (2021-06-26)

@@ -8,0 +24,0 @@

2

dist/encryption/message.js

@@ -88,4 +88,4 @@ "use strict";

isPlaintext,
isEncrypted
isEncrypted,
};
//# sourceMappingURL=message.js.map
{
"name": "@radixdlt/crypto",
"version": "1.0.43",
"version": "1.0.45",
"description": "Cryptographic primitives such as digests (hashing) and Elliptic Curve Cryptography (ECC) methods such as key generation, signing and verify.",

@@ -38,4 +38,4 @@ "keywords": [

"dependencies": {
"@radixdlt/data-formats": "^1.0.30",
"@radixdlt/primitives": "^1.0.34",
"@radixdlt/data-formats": "1.0.30",
"@radixdlt/primitives": "^1.0.35",
"@radixdlt/uint256": "1.1.0",

@@ -56,3 +56,3 @@ "@radixdlt/util": "1.0.29",

},
"gitHead": "7c7dbbbc17cfd3cc84d7efbf13a45e9029f644b2"
"gitHead": "243475b39055c594f8a417293615345b23a574e4"
}

@@ -29,5 +29,7 @@ import {

const isPlaintext = (rawHex: string) => parseInt(rawHex.slice(0, 2)) === MessageType.PLAINTEXT
const isPlaintext = (rawHex: string) =>
parseInt(rawHex.slice(0, 2)) === MessageType.PLAINTEXT
const isEncrypted = (rawHex: string) => parseInt(rawHex.slice(0, 2)) === MessageType.ENCRYPTED
const isEncrypted = (rawHex: string) =>
parseInt(rawHex.slice(0, 2)) === MessageType.ENCRYPTED

@@ -152,3 +154,3 @@ const __validateEncryptedMessageMaxLength: (

isPlaintext,
isEncrypted
isEncrypted,
}

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc