+4
-0
@@ -0,1 +1,5 @@ | ||
| 0.4.0 / 2014-09-24 | ||
| ------------------ | ||
| - dropped `sha512` dependency and upgraded to crypto-browserify that supports sha512 | ||
| 0.3.1 / 2014-07-11 | ||
@@ -2,0 +6,0 @@ ------------------ |
+2
-4
@@ -8,5 +8,3 @@ var assert = require('assert') | ||
| var Point = ecurve.Point | ||
| var sha512 = require('sha512') | ||
| module.exports = HDKey | ||
@@ -122,3 +120,3 @@ | ||
| var I = sha512.hmac(this.chainCode).finalize(data) | ||
| var I = crypto.createHmac('sha512', this.chainCode).update(data).digest() | ||
| var IL = I.slice(0, 32) | ||
@@ -166,3 +164,3 @@ var IR = I.slice(32) | ||
| HDKey.fromMasterSeed = function(seedBuffer, versions) { | ||
| var I = sha512.hmac(MASTER_SECRET).finalize(seedBuffer) | ||
| var I = crypto.createHmac('sha512', MASTER_SECRET).update(seedBuffer).digest() | ||
| var IL = I.slice(0, 32) | ||
@@ -169,0 +167,0 @@ var IR = I.slice(32) |
+3
-7
| { | ||
| "name": "hdkey", | ||
| "version": "0.3.1", | ||
| "version": "0.4.0", | ||
| "description": "Bitcoin BIP32 hierarchical deterministic keys", | ||
@@ -29,7 +29,6 @@ "main": "lib/hdkey.js", | ||
| "secure-random": "^1.0.0", | ||
| "mochify": "^0.9.3", | ||
| "crypto-browserify": "^2.1.8" | ||
| "mochify": "^1.1.2", | ||
| "crypto-browserify": "^3.2.4" | ||
| }, | ||
| "dependencies": { | ||
| "sha512": "0.0.1", | ||
| "bigi": "^1.1.0", | ||
@@ -43,6 +42,3 @@ "ecurve": "^1.0.0", | ||
| "coveralls": "npm run-script coverage && node ./node_modules/.bin/coveralls < coverage/lcov.info" | ||
| }, | ||
| "browser": { | ||
| "crypto": "crypto-browserify" | ||
| } | ||
| } |
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
20125
0.3%3
-25%0
-100%357
-0.28%- Removed
- Removed