Security News
The Unpaid Backbone of Open Source: Solo Maintainers Face Increasing Security Demands
Solo open source maintainers face burnout and security challenges, with 60% unpaid and 60% considering quitting.
js-crypto-hash
Advanced tools
WARNING: At this time this solution should be considered suitable for research and experimentation, further code and security review is needed before utilization in a production application.
This library is designed to be 'universal' as a hash function module, i.e., it works both on most browsers and on Node.js just by importing from npm/source code. Note that in the design principle, the library fully utilizes native APIs like WebCrypto API to accelerate its operation if available.
At your project directory, do either one of the following.
$ npm install --save js-crypto-hash // npm
$ yarn add js-crypto-hash // yarn
$ git clone https://github.com/junkurihara/js-crypto-hash.git
Then you should import the package as follows.
import hash from 'js-crypto-hash'; // for npm
import hash from 'js-crypto-hash/dist/index.js'; // for github
const msg = ...; // Uint8Array of arbitrary length
const hash = 'SHA-256';
hmac.compute(msg, hash).then( (digest) => {
// now you get a hash of msg in Uint8Array
});
Licensed under the MIT license, see LICENSE
file.
FAQs
Universal Module for Hash Function in JavaScript
We found that js-crypto-hash demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Solo open source maintainers face burnout and security challenges, with 60% unpaid and 60% considering quitting.
Security News
License exceptions modify the terms of open source licenses, impacting how software can be used, modified, and distributed. Developers should be aware of the legal implications of these exceptions.
Security News
A developer is accusing Tencent of violating the GPL by modifying a Python utility and changing its license to BSD, highlighting the importance of copyleft compliance.