Socket
Socket
Sign inDemoInstall

ethereum-cryptography

Package Overview
Dependencies
Maintainers
0
Versions
33
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

ethereum-cryptography - npm Package Compare versions

Comparing version 2.2.0 to 2.2.1

5

aes.js
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.decrypt = exports.encrypt = void 0;
exports.encrypt = encrypt;
exports.decrypt = decrypt;
const crypto_1 = require("@noble/hashes/crypto");

@@ -59,3 +60,2 @@ const utils_js_1 = require("./utils.js");

}
exports.encrypt = encrypt;
async function getPadding(cypherText, key, iv, mode) {

@@ -99,2 +99,1 @@ const lastBlock = cypherText.slice(-16);

}
exports.decrypt = decrypt;

6

package.json
{
"name": "ethereum-cryptography",
"version": "2.2.0",
"version": "2.2.1",
"description": "All the cryptographic primitives used in Ethereum",

@@ -18,3 +18,3 @@ "repository": "https://github.com/ethereum/js-ethereum-cryptography",

"dependencies": {
"@noble/curves": "1.4.0",
"@noble/curves": "1.4.2",
"@noble/hashes": "1.4.0",

@@ -329,3 +329,3 @@ "@scure/bip32": "1.4.0",

"ts-node": "10.9.1",
"typescript": "5.0.2",
"typescript": "5.5.2",
"webpack": "5.76.0",

@@ -332,0 +332,0 @@ "webpack-cli": "4.10.0"

"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.pbkdf2Sync = exports.pbkdf2 = void 0;
exports.pbkdf2 = pbkdf2;
exports.pbkdf2Sync = pbkdf2Sync;
const pbkdf2_1 = require("@noble/hashes/pbkdf2");

@@ -19,3 +20,2 @@ const sha256_1 = require("@noble/hashes/sha256");

}
exports.pbkdf2 = pbkdf2;
function pbkdf2Sync(password, salt, iterations, keylen, digest) {

@@ -32,2 +32,1 @@ if (!["sha256", "sha512"].includes(digest)) {

}
exports.pbkdf2Sync = pbkdf2Sync;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.getRandomBytes = exports.getRandomBytesSync = void 0;
exports.getRandomBytesSync = getRandomBytesSync;
exports.getRandomBytes = getRandomBytes;
const utils_1 = require("@noble/hashes/utils");

@@ -8,6 +9,4 @@ function getRandomBytesSync(bytes) {

}
exports.getRandomBytesSync = getRandomBytesSync;
async function getRandomBytes(bytes) {
return (0, utils_1.randomBytes)(bytes);
}
exports.getRandomBytes = getRandomBytes;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.scryptSync = exports.scrypt = void 0;
exports.scrypt = scrypt;
exports.scryptSync = scryptSync;
const scrypt_1 = require("@noble/hashes/scrypt");

@@ -11,3 +12,2 @@ const utils_js_1 = require("./utils.js");

}
exports.scrypt = scrypt;
function scryptSync(password, salt, n, p, r, dkLen, onProgress) {

@@ -18,2 +18,1 @@ (0, utils_js_1.assertBytes)(password);

}
exports.scryptSync = scryptSync;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.contextRandomize = exports.ecdh = exports.signatureNormalize = exports.signatureImport = exports.signatureExport = exports.privateKeyTweakMul = exports.publicKeyTweakMul = exports.publicKeyTweakAdd = exports.publicKeyCombine = exports.publicKeyNegate = exports.privateKeyNegate = exports.privateKeyTweakAdd = exports.ecdsaVerify = exports.ecdsaRecover = exports.ecdsaSign = exports.publicKeyConvert = exports.publicKeyVerify = exports.publicKeyCreate = exports.privateKeyVerify = exports.createPrivateKey = exports.createPrivateKeySync = void 0;
exports.createPrivateKeySync = createPrivateKeySync;
exports.createPrivateKey = createPrivateKey;
exports.privateKeyVerify = privateKeyVerify;
exports.publicKeyCreate = publicKeyCreate;
exports.publicKeyVerify = publicKeyVerify;
exports.publicKeyConvert = publicKeyConvert;
exports.ecdsaSign = ecdsaSign;
exports.ecdsaRecover = ecdsaRecover;
exports.ecdsaVerify = ecdsaVerify;
exports.privateKeyTweakAdd = privateKeyTweakAdd;
exports.privateKeyNegate = privateKeyNegate;
exports.publicKeyNegate = publicKeyNegate;
exports.publicKeyCombine = publicKeyCombine;
exports.publicKeyTweakAdd = publicKeyTweakAdd;
exports.publicKeyTweakMul = publicKeyTweakMul;
exports.privateKeyTweakMul = privateKeyTweakMul;
exports.signatureExport = signatureExport;
exports.signatureImport = signatureImport;
exports.signatureNormalize = signatureNormalize;
exports.ecdh = ecdh;
exports.contextRandomize = contextRandomize;
const sha256_1 = require("@noble/hashes/sha256");

@@ -39,7 +59,5 @@ const modular_1 = require("@noble/curves/abstract/modular");

}
exports.createPrivateKeySync = createPrivateKeySync;
async function createPrivateKey() {
return createPrivateKeySync();
}
exports.createPrivateKey = createPrivateKey;
function privateKeyVerify(privateKey) {

@@ -49,3 +67,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32);

}
exports.privateKeyVerify = privateKeyVerify;
function publicKeyCreate(privateKey, compressed = true, out) {

@@ -57,3 +74,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32);

}
exports.publicKeyCreate = publicKeyCreate;
function publicKeyVerify(publicKey) {

@@ -69,3 +85,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65);

}
exports.publicKeyVerify = publicKeyVerify;
function publicKeyConvert(publicKey, compressed = true, out) {

@@ -77,3 +92,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65);

}
exports.publicKeyConvert = publicKeyConvert;
function ecdsaSign(msgHash, privateKey, options = { noncefn: undefined, data: undefined }, out) {

@@ -94,3 +108,2 @@ (0, utils_js_1.assertBytes)(msgHash, 32);

}
exports.ecdsaSign = ecdsaSign;
function ecdsaRecover(signature, recid, msgHash, compressed = true, out) {

@@ -103,3 +116,2 @@ (0, utils_js_1.assertBytes)(msgHash, 32);

}
exports.ecdsaRecover = ecdsaRecover;
function ecdsaVerify(signature, msgHash, publicKey) {

@@ -126,3 +138,2 @@ (0, utils_js_1.assertBytes)(signature, 64);

}
exports.ecdsaVerify = ecdsaVerify;
function privateKeyTweakAdd(privateKey, tweak) {

@@ -148,3 +159,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32);

}
exports.privateKeyTweakAdd = privateKeyTweakAdd;
function privateKeyNegate(privateKey) {

@@ -156,3 +166,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32);

}
exports.privateKeyNegate = privateKeyNegate;
function publicKeyNegate(publicKey, compressed = true, out) {

@@ -164,3 +173,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65);

}
exports.publicKeyNegate = publicKeyNegate;
function publicKeyCombine(publicKeys, compressed = true, out) {

@@ -183,3 +191,2 @@ if (!Array.isArray(publicKeys) || !publicKeys.length) {

}
exports.publicKeyCombine = publicKeyCombine;
function publicKeyTweakAdd(publicKey, tweak, compressed = true, out) {

@@ -197,3 +204,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65);

}
exports.publicKeyTweakAdd = publicKeyTweakAdd;
function publicKeyTweakMul(publicKey, tweak, compressed = true, out) {

@@ -213,3 +219,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65);

}
exports.publicKeyTweakMul = publicKeyTweakMul;
function privateKeyTweakMul(privateKey, tweak) {

@@ -229,3 +234,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32);

}
exports.privateKeyTweakMul = privateKeyTweakMul;
// internal -> DER

@@ -236,3 +240,2 @@ function signatureExport(signature, out) {

}
exports.signatureExport = signatureExport;
// DER -> internal

@@ -244,3 +247,2 @@ function signatureImport(signature, out) {

}
exports.signatureImport = signatureImport;
function signatureNormalize(signature) {

@@ -253,3 +255,2 @@ const res = getSignature(signature);

}
exports.signatureNormalize = signatureNormalize;
function ecdh(publicKey, privateKey, options = {}, out) {

@@ -289,3 +290,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65);

}
exports.ecdh = ecdh;
function contextRandomize(seed) {

@@ -297,2 +297,1 @@ if (seed !== null) {

}
exports.contextRandomize = contextRandomize;

@@ -6,3 +6,7 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.crypto = exports.wrapHash = exports.equalsBytes = exports.hexToBytes = exports.bytesToUtf8 = exports.utf8ToBytes = exports.createView = exports.concatBytes = exports.toHex = exports.bytesToHex = exports.assertBytes = exports.assertBool = void 0;
exports.crypto = exports.utf8ToBytes = exports.createView = exports.concatBytes = exports.toHex = exports.bytesToHex = exports.assertBytes = exports.assertBool = void 0;
exports.bytesToUtf8 = bytesToUtf8;
exports.hexToBytes = hexToBytes;
exports.equalsBytes = equalsBytes;
exports.wrapHash = wrapHash;
const _assert_1 = __importDefault(require("@noble/hashes/_assert"));

@@ -27,3 +31,2 @@ const utils_1 = require("@noble/hashes/utils");

}
exports.bytesToUtf8 = bytesToUtf8;
function hexToBytes(data) {

@@ -33,3 +36,2 @@ const sliced = data.startsWith("0x") ? data.substring(2) : data;

}
exports.hexToBytes = hexToBytes;
// buf.equals(buf2) -> equalsBytes(buf, buf2)

@@ -47,3 +49,2 @@ function equalsBytes(a, b) {

}
exports.equalsBytes = equalsBytes;
// Internal utils

@@ -56,3 +57,2 @@ function wrapHash(hash) {

}
exports.wrapHash = wrapHash;
// TODO(v3): switch away from node crypto, remove this unnecessary variable.

@@ -59,0 +59,0 @@ exports.crypto = (() => {

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc