ethereum-cryptography
Advanced tools
Comparing version 2.2.0 to 2.2.1
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.decrypt = exports.encrypt = void 0; | ||
exports.encrypt = encrypt; | ||
exports.decrypt = decrypt; | ||
const crypto_1 = require("@noble/hashes/crypto"); | ||
@@ -59,3 +60,2 @@ const utils_js_1 = require("./utils.js"); | ||
} | ||
exports.encrypt = encrypt; | ||
async function getPadding(cypherText, key, iv, mode) { | ||
@@ -99,2 +99,1 @@ const lastBlock = cypherText.slice(-16); | ||
} | ||
exports.decrypt = decrypt; |
{ | ||
"name": "ethereum-cryptography", | ||
"version": "2.2.0", | ||
"version": "2.2.1", | ||
"description": "All the cryptographic primitives used in Ethereum", | ||
@@ -18,3 +18,3 @@ "repository": "https://github.com/ethereum/js-ethereum-cryptography", | ||
"dependencies": { | ||
"@noble/curves": "1.4.0", | ||
"@noble/curves": "1.4.2", | ||
"@noble/hashes": "1.4.0", | ||
@@ -329,3 +329,3 @@ "@scure/bip32": "1.4.0", | ||
"ts-node": "10.9.1", | ||
"typescript": "5.0.2", | ||
"typescript": "5.5.2", | ||
"webpack": "5.76.0", | ||
@@ -332,0 +332,0 @@ "webpack-cli": "4.10.0" |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.pbkdf2Sync = exports.pbkdf2 = void 0; | ||
exports.pbkdf2 = pbkdf2; | ||
exports.pbkdf2Sync = pbkdf2Sync; | ||
const pbkdf2_1 = require("@noble/hashes/pbkdf2"); | ||
@@ -19,3 +20,2 @@ const sha256_1 = require("@noble/hashes/sha256"); | ||
} | ||
exports.pbkdf2 = pbkdf2; | ||
function pbkdf2Sync(password, salt, iterations, keylen, digest) { | ||
@@ -32,2 +32,1 @@ if (!["sha256", "sha512"].includes(digest)) { | ||
} | ||
exports.pbkdf2Sync = pbkdf2Sync; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.getRandomBytes = exports.getRandomBytesSync = void 0; | ||
exports.getRandomBytesSync = getRandomBytesSync; | ||
exports.getRandomBytes = getRandomBytes; | ||
const utils_1 = require("@noble/hashes/utils"); | ||
@@ -8,6 +9,4 @@ function getRandomBytesSync(bytes) { | ||
} | ||
exports.getRandomBytesSync = getRandomBytesSync; | ||
async function getRandomBytes(bytes) { | ||
return (0, utils_1.randomBytes)(bytes); | ||
} | ||
exports.getRandomBytes = getRandomBytes; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.scryptSync = exports.scrypt = void 0; | ||
exports.scrypt = scrypt; | ||
exports.scryptSync = scryptSync; | ||
const scrypt_1 = require("@noble/hashes/scrypt"); | ||
@@ -11,3 +12,2 @@ const utils_js_1 = require("./utils.js"); | ||
} | ||
exports.scrypt = scrypt; | ||
function scryptSync(password, salt, n, p, r, dkLen, onProgress) { | ||
@@ -18,2 +18,1 @@ (0, utils_js_1.assertBytes)(password); | ||
} | ||
exports.scryptSync = scryptSync; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.contextRandomize = exports.ecdh = exports.signatureNormalize = exports.signatureImport = exports.signatureExport = exports.privateKeyTweakMul = exports.publicKeyTweakMul = exports.publicKeyTweakAdd = exports.publicKeyCombine = exports.publicKeyNegate = exports.privateKeyNegate = exports.privateKeyTweakAdd = exports.ecdsaVerify = exports.ecdsaRecover = exports.ecdsaSign = exports.publicKeyConvert = exports.publicKeyVerify = exports.publicKeyCreate = exports.privateKeyVerify = exports.createPrivateKey = exports.createPrivateKeySync = void 0; | ||
exports.createPrivateKeySync = createPrivateKeySync; | ||
exports.createPrivateKey = createPrivateKey; | ||
exports.privateKeyVerify = privateKeyVerify; | ||
exports.publicKeyCreate = publicKeyCreate; | ||
exports.publicKeyVerify = publicKeyVerify; | ||
exports.publicKeyConvert = publicKeyConvert; | ||
exports.ecdsaSign = ecdsaSign; | ||
exports.ecdsaRecover = ecdsaRecover; | ||
exports.ecdsaVerify = ecdsaVerify; | ||
exports.privateKeyTweakAdd = privateKeyTweakAdd; | ||
exports.privateKeyNegate = privateKeyNegate; | ||
exports.publicKeyNegate = publicKeyNegate; | ||
exports.publicKeyCombine = publicKeyCombine; | ||
exports.publicKeyTweakAdd = publicKeyTweakAdd; | ||
exports.publicKeyTweakMul = publicKeyTweakMul; | ||
exports.privateKeyTweakMul = privateKeyTweakMul; | ||
exports.signatureExport = signatureExport; | ||
exports.signatureImport = signatureImport; | ||
exports.signatureNormalize = signatureNormalize; | ||
exports.ecdh = ecdh; | ||
exports.contextRandomize = contextRandomize; | ||
const sha256_1 = require("@noble/hashes/sha256"); | ||
@@ -39,7 +59,5 @@ const modular_1 = require("@noble/curves/abstract/modular"); | ||
} | ||
exports.createPrivateKeySync = createPrivateKeySync; | ||
async function createPrivateKey() { | ||
return createPrivateKeySync(); | ||
} | ||
exports.createPrivateKey = createPrivateKey; | ||
function privateKeyVerify(privateKey) { | ||
@@ -49,3 +67,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32); | ||
} | ||
exports.privateKeyVerify = privateKeyVerify; | ||
function publicKeyCreate(privateKey, compressed = true, out) { | ||
@@ -57,3 +74,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32); | ||
} | ||
exports.publicKeyCreate = publicKeyCreate; | ||
function publicKeyVerify(publicKey) { | ||
@@ -69,3 +85,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65); | ||
} | ||
exports.publicKeyVerify = publicKeyVerify; | ||
function publicKeyConvert(publicKey, compressed = true, out) { | ||
@@ -77,3 +92,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65); | ||
} | ||
exports.publicKeyConvert = publicKeyConvert; | ||
function ecdsaSign(msgHash, privateKey, options = { noncefn: undefined, data: undefined }, out) { | ||
@@ -94,3 +108,2 @@ (0, utils_js_1.assertBytes)(msgHash, 32); | ||
} | ||
exports.ecdsaSign = ecdsaSign; | ||
function ecdsaRecover(signature, recid, msgHash, compressed = true, out) { | ||
@@ -103,3 +116,2 @@ (0, utils_js_1.assertBytes)(msgHash, 32); | ||
} | ||
exports.ecdsaRecover = ecdsaRecover; | ||
function ecdsaVerify(signature, msgHash, publicKey) { | ||
@@ -126,3 +138,2 @@ (0, utils_js_1.assertBytes)(signature, 64); | ||
} | ||
exports.ecdsaVerify = ecdsaVerify; | ||
function privateKeyTweakAdd(privateKey, tweak) { | ||
@@ -148,3 +159,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32); | ||
} | ||
exports.privateKeyTweakAdd = privateKeyTweakAdd; | ||
function privateKeyNegate(privateKey) { | ||
@@ -156,3 +166,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32); | ||
} | ||
exports.privateKeyNegate = privateKeyNegate; | ||
function publicKeyNegate(publicKey, compressed = true, out) { | ||
@@ -164,3 +173,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65); | ||
} | ||
exports.publicKeyNegate = publicKeyNegate; | ||
function publicKeyCombine(publicKeys, compressed = true, out) { | ||
@@ -183,3 +191,2 @@ if (!Array.isArray(publicKeys) || !publicKeys.length) { | ||
} | ||
exports.publicKeyCombine = publicKeyCombine; | ||
function publicKeyTweakAdd(publicKey, tweak, compressed = true, out) { | ||
@@ -197,3 +204,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65); | ||
} | ||
exports.publicKeyTweakAdd = publicKeyTweakAdd; | ||
function publicKeyTweakMul(publicKey, tweak, compressed = true, out) { | ||
@@ -213,3 +219,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65); | ||
} | ||
exports.publicKeyTweakMul = publicKeyTweakMul; | ||
function privateKeyTweakMul(privateKey, tweak) { | ||
@@ -229,3 +234,2 @@ (0, utils_js_1.assertBytes)(privateKey, 32); | ||
} | ||
exports.privateKeyTweakMul = privateKeyTweakMul; | ||
// internal -> DER | ||
@@ -236,3 +240,2 @@ function signatureExport(signature, out) { | ||
} | ||
exports.signatureExport = signatureExport; | ||
// DER -> internal | ||
@@ -244,3 +247,2 @@ function signatureImport(signature, out) { | ||
} | ||
exports.signatureImport = signatureImport; | ||
function signatureNormalize(signature) { | ||
@@ -253,3 +255,2 @@ const res = getSignature(signature); | ||
} | ||
exports.signatureNormalize = signatureNormalize; | ||
function ecdh(publicKey, privateKey, options = {}, out) { | ||
@@ -289,3 +290,2 @@ (0, utils_js_1.assertBytes)(publicKey, 33, 65); | ||
} | ||
exports.ecdh = ecdh; | ||
function contextRandomize(seed) { | ||
@@ -297,2 +297,1 @@ if (seed !== null) { | ||
} | ||
exports.contextRandomize = contextRandomize; |
10
utils.js
@@ -6,3 +6,7 @@ "use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.crypto = exports.wrapHash = exports.equalsBytes = exports.hexToBytes = exports.bytesToUtf8 = exports.utf8ToBytes = exports.createView = exports.concatBytes = exports.toHex = exports.bytesToHex = exports.assertBytes = exports.assertBool = void 0; | ||
exports.crypto = exports.utf8ToBytes = exports.createView = exports.concatBytes = exports.toHex = exports.bytesToHex = exports.assertBytes = exports.assertBool = void 0; | ||
exports.bytesToUtf8 = bytesToUtf8; | ||
exports.hexToBytes = hexToBytes; | ||
exports.equalsBytes = equalsBytes; | ||
exports.wrapHash = wrapHash; | ||
const _assert_1 = __importDefault(require("@noble/hashes/_assert")); | ||
@@ -27,3 +31,2 @@ const utils_1 = require("@noble/hashes/utils"); | ||
} | ||
exports.bytesToUtf8 = bytesToUtf8; | ||
function hexToBytes(data) { | ||
@@ -33,3 +36,2 @@ const sliced = data.startsWith("0x") ? data.substring(2) : data; | ||
} | ||
exports.hexToBytes = hexToBytes; | ||
// buf.equals(buf2) -> equalsBytes(buf, buf2) | ||
@@ -47,3 +49,2 @@ function equalsBytes(a, b) { | ||
} | ||
exports.equalsBytes = equalsBytes; | ||
// Internal utils | ||
@@ -56,3 +57,2 @@ function wrapHash(hash) { | ||
} | ||
exports.wrapHash = wrapHash; | ||
// TODO(v3): switch away from node crypto, remove this unnecessary variable. | ||
@@ -59,0 +59,0 @@ exports.crypto = (() => { |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
83700
1171
+ Added@noble/curves@1.4.2(transitive)
- Removed@noble/curves@1.4.0(transitive)
Updated@noble/curves@1.4.2