crypto-browserify
Advanced tools
Comparing version 3.9.11 to 3.9.12
29
index.js
@@ -5,11 +5,2 @@ 'use strict'; | ||
function error () { | ||
var m = [].slice.call(arguments).join(' ') | ||
throw new Error([ | ||
m, | ||
'we accept pull requests', | ||
'http://github.com/dominictarr/crypto-browserify' | ||
].join('\n')) | ||
} | ||
exports.createHash = exports.Hash = require('create-hash') | ||
@@ -19,6 +10,2 @@ | ||
function each(a, f) { | ||
for(var i in a) | ||
f(a[i], i) | ||
} | ||
var hashes = ['sha1', 'sha224', 'sha256', 'sha384', 'sha512', 'md5', 'rmd160'].concat(Object.keys(require('browserify-sign/algos'))) | ||
@@ -29,3 +16,3 @@ exports.getHashes = function () { | ||
var p = require('./pbkdf2')(exports) | ||
var p = require('pbkdf2-compat') | ||
exports.pbkdf2 = p.pbkdf2 | ||
@@ -66,8 +53,14 @@ exports.pbkdf2Sync = p.pbkdf2Sync | ||
// the least I can do is make error messages for the rest of the node.js/crypto api. | ||
each([ | ||
'createCredentials' | ||
], function (name) { | ||
[ | ||
'createCredentials', | ||
'privateEncrypt', | ||
'publicDecrypt' | ||
].forEach(function (name) { | ||
exports[name] = function () { | ||
error('sorry,', name, 'is not implemented yet') | ||
throw new Error([ | ||
'sorry, ' + name + ' is not implemented yet', | ||
'we accept pull requests', | ||
'https://github.com/crypto-browserify/crypto-browserify' | ||
].join('\n')); | ||
} | ||
}) |
@@ -5,3 +5,3 @@ { | ||
"description": "implementation of crypto for the browser", | ||
"version": "3.9.11", | ||
"version": "3.9.12", | ||
"homepage": "https://github.com/crypto-browserify/crypto-browserify", | ||
@@ -27,3 +27,3 @@ "repository": { | ||
"inherits": "^2.0.1", | ||
"pbkdf2-compat": "2.0.1", | ||
"pbkdf2-compat": "^3.0.1", | ||
"public-encrypt": "1.1.2", | ||
@@ -30,0 +30,0 @@ "randombytes": "^2.0.0" |
var tape = require('tape') | ||
var pbkdf2Sync = require('../').pbkdf2Sync | ||
var crypto = require('pbkdf2-compat/browser') | ||
@@ -12,3 +12,3 @@ var vectors = require('hash-test-vectors/pbkdf2') | ||
var key = pbkdf2Sync(input.password, input.salt, input.iterations, input.length) | ||
var key = crypto.pbkdf2Sync(input.password, input.salt, input.iterations, input.length) | ||
@@ -15,0 +15,0 @@ if(key.toString('hex') !== input.sha1) |
46579
19
1007
+ Addedpbkdf2-compat@3.0.2(transitive)
- Removedpbkdf2-compat@2.0.1(transitive)
Updatedpbkdf2-compat@^3.0.1