ethereum-cryptography
Advanced tools
Comparing version 0.2.1 to 0.2.2
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.mnemonicToSeedSync = exports.mnemonicToSeed = exports.validateMnemonic = exports.entropyToMnemonic = exports.mnemonicToEntropy = exports.generateMnemonic = void 0; | ||
const pbkdf2_1 = require("@noble/hashes/lib/pbkdf2"); | ||
const sha256_1 = require("@noble/hashes/lib/sha256"); | ||
const sha512_1 = require("@noble/hashes/lib/sha512"); | ||
const utils_1 = require("@noble/hashes/lib/utils"); | ||
const pbkdf2_1 = require("@noble/hashes/pbkdf2"); | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
const sha512_1 = require("@noble/hashes/sha512"); | ||
const utils_1 = require("@noble/hashes/utils"); | ||
const micro_base_1 = require("micro-base"); | ||
@@ -9,0 +9,0 @@ const random_1 = require("../random"); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.blake2b = void 0; | ||
const blake2b_1 = require("@noble/hashes/lib/blake2b"); | ||
const blake2b_1 = require("@noble/hashes/blake2b"); | ||
const utils_1 = require("./utils"); | ||
@@ -6,0 +6,0 @@ const blake2b = (msg, outputLength = 64) => { |
10
hdkey.js
@@ -23,7 +23,7 @@ "use strict"; | ||
exports.HDKey = void 0; | ||
const hmac_1 = require("@noble/hashes/lib/hmac"); | ||
const ripemd160_1 = require("@noble/hashes/lib/ripemd160"); | ||
const sha256_1 = require("@noble/hashes/lib/sha256"); | ||
const sha512_1 = require("@noble/hashes/lib/sha512"); | ||
const utils_1 = require("@noble/hashes/lib/utils"); | ||
const hmac_1 = require("@noble/hashes/hmac"); | ||
const ripemd160_1 = require("@noble/hashes/ripemd160"); | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
const sha512_1 = require("@noble/hashes/sha512"); | ||
const utils_1 = require("@noble/hashes/utils"); | ||
const micro_base_1 = require("micro-base"); | ||
@@ -30,0 +30,0 @@ const secp = __importStar(require("./secp256k1")); |
@@ -23,3 +23,3 @@ "use strict"; | ||
exports.keccak512 = exports.keccak384 = exports.keccak256 = exports.keccak224 = void 0; | ||
const sha3 = __importStar(require("@noble/hashes/lib/sha3")); | ||
const sha3 = __importStar(require("@noble/hashes/sha3")); | ||
const utils_1 = require("./utils"); | ||
@@ -26,0 +26,0 @@ exports.keccak224 = (0, utils_1.wrapHash)(sha3.keccak_224); |
{ | ||
"name": "ethereum-cryptography", | ||
"version": "0.2.1", | ||
"version": "0.2.2", | ||
"description": "All the cryptographic primitives used in Ethereum", | ||
@@ -15,26 +15,4 @@ "contributors": [ | ||
], | ||
"repository": "github:ethereum/js-ethereum-cryptography", | ||
"repository": "https://github.com/ethereum/js-ethereum-cryptography", | ||
"license": "MIT", | ||
"keywords": [ | ||
"ethereum", | ||
"cryptography", | ||
"digital signature", | ||
"hash", | ||
"encryption", | ||
"prng", | ||
"keccak", | ||
"scrypt", | ||
"pbkdf2", | ||
"sha-256", | ||
"ripemd-160", | ||
"blake2b", | ||
"aes", | ||
"advanced encryption standar", | ||
"secp256k1", | ||
"ecdsa", | ||
"bip32", | ||
"hierarchical deterministic keys", | ||
"hdwallet", | ||
"hdkeys" | ||
], | ||
"main": "./index.js", | ||
@@ -51,3 +29,3 @@ "files": [ | ||
"micro-base": "^0.10.0", | ||
"@noble/hashes": "^0.4.4", | ||
"@noble/hashes": "^0.5.1", | ||
"@noble/secp256k1": "^1.3.3" | ||
@@ -102,2 +80,24 @@ }, | ||
}, | ||
"keywords": [ | ||
"ethereum", | ||
"cryptography", | ||
"digital signature", | ||
"hash", | ||
"encryption", | ||
"prng", | ||
"keccak", | ||
"scrypt", | ||
"pbkdf2", | ||
"sha-256", | ||
"ripemd-160", | ||
"blake2b", | ||
"aes", | ||
"advanced encryption standar", | ||
"secp256k1", | ||
"ecdsa", | ||
"bip32", | ||
"hierarchical deterministic keys", | ||
"hdwallet", | ||
"hdkeys" | ||
], | ||
"targets": { | ||
@@ -104,0 +104,0 @@ "parcel_tests": { |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.pbkdf2Sync = exports.pbkdf2 = void 0; | ||
const pbkdf2_1 = require("@noble/hashes/lib/pbkdf2"); | ||
const sha256_1 = require("@noble/hashes/lib/sha256"); | ||
const sha512_1 = require("@noble/hashes/lib/sha512"); | ||
const pbkdf2_1 = require("@noble/hashes/pbkdf2"); | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
const sha512_1 = require("@noble/hashes/sha512"); | ||
const utils_1 = require("./utils"); | ||
@@ -8,0 +8,0 @@ async function pbkdf2(password, salt, iterations, keylen, digest) { |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.ripemd160 = void 0; | ||
const ripemd160_1 = require("@noble/hashes/lib/ripemd160"); | ||
const ripemd160_1 = require("@noble/hashes/ripemd160"); | ||
const utils_1 = require("./utils"); | ||
exports.ripemd160 = (0, utils_1.wrapHash)(ripemd160_1.ripemd160); | ||
//# sourceMappingURL=ripemd160.js.map |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.scryptSync = exports.scrypt = void 0; | ||
const scrypt_1 = require("@noble/hashes/lib/scrypt"); | ||
const scrypt_1 = require("@noble/hashes/scrypt"); | ||
const utils_1 = require("./utils"); | ||
@@ -6,0 +6,0 @@ async function scrypt(password, salt, n, p, r, dklen) { |
@@ -23,3 +23,3 @@ "use strict"; | ||
exports.contextRandomize = exports.ecdh = exports.signatureNormalize = exports.signatureImport = exports.signatureExport = exports.privateKeyTweakMul = exports.publicKeyTweakMul = exports.publicKeyTweakAdd = exports.publicKeyCombine = exports.publicKeyNegate = exports.privateKeyNegate = exports.privateKeyTweakAdd = exports.ecdsaVerify = exports.ecdsaRecover = exports.ecdsaSign = exports.publicKeyConvert = exports.publicKeyVerify = exports.publicKeyCreate = exports.privateKeyVerify = exports.createPrivateKey = exports.createPrivateKeySync = void 0; | ||
const sha256_1 = require("@noble/hashes/lib/sha256"); | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
const secp = __importStar(require("./secp256k1")); | ||
@@ -26,0 +26,0 @@ const utils_1 = require("./utils"); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.CURVE = exports.Signature = exports.Point = exports.utils = exports.getSharedSecret = exports.verify = exports.signSync = exports.sign = exports.getPublicKey = void 0; | ||
const hmac_1 = require("@noble/hashes/lib/hmac"); | ||
const sha256_1 = require("@noble/hashes/lib/sha256"); | ||
const hmac_1 = require("@noble/hashes/hmac"); | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
const secp256k1_1 = require("@noble/secp256k1"); | ||
@@ -7,0 +7,0 @@ var secp256k1_2 = require("@noble/secp256k1"); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.sha256 = void 0; | ||
const sha256_1 = require("@noble/hashes/lib/sha256"); | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
const utils_1 = require("./utils"); | ||
exports.sha256 = (0, utils_1.wrapHash)(sha256_1.sha256); | ||
//# sourceMappingURL=sha256.js.map |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.sha512 = void 0; | ||
const sha512_1 = require("@noble/hashes/lib/sha512"); | ||
const sha512_1 = require("@noble/hashes/sha512"); | ||
const utils_1 = require("./utils"); | ||
exports.sha512 = (0, utils_1.wrapHash)(sha512_1.sha512); | ||
//# sourceMappingURL=sha512.js.map |
@@ -1,5 +0,5 @@ | ||
import { pbkdf2, pbkdf2Async } from "@noble/hashes/lib/pbkdf2"; | ||
import { sha256 } from "@noble/hashes/lib/sha256"; | ||
import { sha512 } from "@noble/hashes/lib/sha512"; | ||
import { assertNumber } from "@noble/hashes/lib/utils"; | ||
import { pbkdf2, pbkdf2Async } from "@noble/hashes/pbkdf2"; | ||
import { sha256 } from "@noble/hashes/sha256"; | ||
import { sha512 } from "@noble/hashes/sha512"; | ||
import { assertNumber } from "@noble/hashes/utils"; | ||
import { utils as baseUtils } from "micro-base"; | ||
@@ -6,0 +6,0 @@ import { getRandomBytesSync } from "../random"; |
@@ -1,2 +0,2 @@ | ||
import { blake2b as _blake2b } from "@noble/hashes/lib/blake2b"; | ||
import { blake2b as _blake2b } from "@noble/hashes/blake2b"; | ||
import { assertBytes } from "./utils"; | ||
@@ -3,0 +3,0 @@ |
@@ -1,6 +0,6 @@ | ||
import { hmac } from "@noble/hashes/lib/hmac"; | ||
import { ripemd160 } from "@noble/hashes/lib/ripemd160"; | ||
import { sha256 } from "@noble/hashes/lib/sha256"; | ||
import { sha512 } from "@noble/hashes/lib/sha512"; | ||
import { bytesToHex } from "@noble/hashes/lib/utils"; | ||
import { hmac } from "@noble/hashes/hmac"; | ||
import { ripemd160 } from "@noble/hashes/ripemd160"; | ||
import { sha256 } from "@noble/hashes/sha256"; | ||
import { sha512 } from "@noble/hashes/sha512"; | ||
import { bytesToHex } from "@noble/hashes/utils"; | ||
import { base58check } from "micro-base"; | ||
@@ -7,0 +7,0 @@ import * as secp from "./secp256k1"; |
@@ -1,2 +0,2 @@ | ||
import * as sha3 from "@noble/hashes/lib/sha3"; | ||
import * as sha3 from "@noble/hashes/sha3"; | ||
import { wrapHash } from "./utils"; | ||
@@ -3,0 +3,0 @@ |
import { | ||
pbkdf2 as _pbkdf2, | ||
pbkdf2Async as _pbkdf2Async | ||
} from "@noble/hashes/lib/pbkdf2"; | ||
import { sha256 } from "@noble/hashes/lib/sha256"; | ||
import { sha512 } from "@noble/hashes/lib/sha512"; | ||
} from "@noble/hashes/pbkdf2"; | ||
import { sha256 } from "@noble/hashes/sha256"; | ||
import { sha512 } from "@noble/hashes/sha512"; | ||
import { assertBytes } from "./utils"; | ||
@@ -8,0 +8,0 @@ |
@@ -1,4 +0,4 @@ | ||
import { ripemd160 as _ripemd160 } from "@noble/hashes/lib/ripemd160"; | ||
import { ripemd160 as _ripemd160 } from "@noble/hashes/ripemd160"; | ||
import { wrapHash } from "./utils"; | ||
export const ripemd160 = wrapHash(_ripemd160); |
import { | ||
scrypt as _scrypt, | ||
scryptAsync as _scryptAsync | ||
} from "@noble/hashes/lib/scrypt"; | ||
} from "@noble/hashes/scrypt"; | ||
import { assertBytes } from "./utils"; | ||
@@ -6,0 +6,0 @@ |
@@ -1,2 +0,2 @@ | ||
import { sha256 } from "@noble/hashes/lib/sha256"; | ||
import { sha256 } from "@noble/hashes/sha256"; | ||
import * as secp from "./secp256k1"; | ||
@@ -3,0 +3,0 @@ import { assertBool, assertBytes, hexToBytes, toHex } from "./utils"; |
@@ -1,3 +0,3 @@ | ||
import { hmac } from "@noble/hashes/lib/hmac"; | ||
import { sha256 } from "@noble/hashes/lib/sha256"; | ||
import { hmac } from "@noble/hashes/hmac"; | ||
import { sha256 } from "@noble/hashes/sha256"; | ||
import { utils as _utils } from "@noble/secp256k1"; | ||
@@ -4,0 +4,0 @@ export { |
@@ -1,4 +0,4 @@ | ||
import { sha256 as _sha256 } from "@noble/hashes/lib/sha256"; | ||
import { sha256 as _sha256 } from "@noble/hashes/sha256"; | ||
import { wrapHash } from "./utils"; | ||
export const sha256 = wrapHash(_sha256); |
@@ -1,4 +0,4 @@ | ||
import { sha512 as _sha512 } from "@noble/hashes/lib/sha512"; | ||
import { sha512 as _sha512 } from "@noble/hashes/sha512"; | ||
import { wrapHash } from "./utils"; | ||
export const sha512 = wrapHash(_sha512); |
// buf.toString('hex') -> toHex(buf) | ||
export { bytesToHex as toHex, createView } from "@noble/hashes/lib/utils"; | ||
export { bytesToHex as toHex, createView } from "@noble/hashes/utils"; | ||
// Buffer.from(hex, 'hex') -> hexToBytes(hex) | ||
@@ -4,0 +4,0 @@ export function hexToBytes(hex: string): Uint8Array { |
@@ -1,2 +0,2 @@ | ||
export { bytesToHex as toHex, createView } from "@noble/hashes/lib/utils"; | ||
export { bytesToHex as toHex, createView } from "@noble/hashes/utils"; | ||
export declare function hexToBytes(hex: string): Uint8Array; | ||
@@ -3,0 +3,0 @@ export declare function utf8ToBytes(s: string): Uint8Array; |
@@ -5,3 +5,3 @@ "use strict"; | ||
// buf.toString('hex') -> toHex(buf) | ||
var utils_1 = require("@noble/hashes/lib/utils"); | ||
var utils_1 = require("@noble/hashes/utils"); | ||
Object.defineProperty(exports, "toHex", { enumerable: true, get: function () { return utils_1.bytesToHex; } }); | ||
@@ -8,0 +8,0 @@ Object.defineProperty(exports, "createView", { enumerable: true, get: function () { return utils_1.createView; } }); |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
No repository
Supply chain riskPackage does not have a linked source code repository. Without this field, a package will have no reference to the location of the source code use to generate the package.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
No repository
Supply chain riskPackage does not have a linked source code repository. Without this field, a package will have no reference to the location of the source code use to generate the package.
Found 1 instance in 1 package
481242
+ Added@noble/hashes@0.5.9(transitive)
- Removed@noble/hashes@0.4.5(transitive)
Updated@noble/hashes@^0.5.1