libp2p-crypto
Advanced tools
Comparing version 0.10.0 to 0.10.2
@@ -25,3 +25,4 @@ 'use strict' | ||
suite.on('cycle', (event) => console.log(String(event.target))) | ||
.run({async: true}) | ||
suite | ||
.on('cycle', (event) => console.log(String(event.target))) | ||
.run({async: true}) |
@@ -25,4 +25,5 @@ 'use strict' | ||
suite.on('cycle', (event) => console.log(String(event.target))) | ||
.run({async: true}) | ||
suite | ||
.on('cycle', (event) => console.log(String(event.target))) | ||
.run({async: true}) | ||
}) | ||
@@ -29,0 +30,0 @@ |
@@ -40,3 +40,4 @@ 'use strict' | ||
suite.on('cycle', (event) => console.log(String(event.target))) | ||
.run({async: true}) | ||
suite | ||
.on('cycle', (event) => console.log(String(event.target))) | ||
.run({async: true}) |
@@ -0,1 +1,26 @@ | ||
<a name="0.10.2"></a> | ||
## [0.10.2](https://github.com/libp2p/js-libp2p-crypto/compare/v0.10.1...v0.10.2) (2017-09-06) | ||
### Bug Fixes | ||
* use regular protocol-buffers until protobufjs is fixed ([#109](https://github.com/libp2p/js-libp2p-crypto/issues/109)) ([957fdd3](https://github.com/libp2p/js-libp2p-crypto/commit/957fdd3)) | ||
### Features | ||
* **deps:** upgrade to aegir@12 and browserify-aes@1.0.8 ([83257bc](https://github.com/libp2p/js-libp2p-crypto/commit/83257bc)) | ||
<a name="0.10.1"></a> | ||
## [0.10.1](https://github.com/libp2p/js-libp2p-crypto/compare/v0.10.0...v0.10.1) (2017-09-05) | ||
### Bug Fixes | ||
* switch to protobufjs ([#107](https://github.com/libp2p/js-libp2p-crypto/issues/107)) ([dc2793f](https://github.com/libp2p/js-libp2p-crypto/commit/dc2793f)) | ||
<a name="0.10.0"></a> | ||
@@ -2,0 +27,0 @@ # [0.10.0](https://github.com/libp2p/js-libp2p-crypto/compare/v0.9.4...v0.10.0) (2017-09-03) |
{ | ||
"name": "libp2p-crypto", | ||
"version": "0.10.0", | ||
"version": "0.10.2", | ||
"description": "Crypto primitives for libp2p", | ||
@@ -13,12 +13,12 @@ "main": "src/index.js", | ||
"scripts": { | ||
"lint": "aegir-lint", | ||
"build": "aegir-build", | ||
"test": "aegir-test", | ||
"test:node": "aegir-test --env node", | ||
"test:browser": "aegir-test --env browser", | ||
"release": "aegir-release", | ||
"release-minor": "aegir-release --type minor", | ||
"release-major": "aegir-release --type major", | ||
"coverage": "aegir-coverage", | ||
"coverage-publish": "aegir-coverage publish" | ||
"lint": "aegir lint", | ||
"build": "aegir build", | ||
"build-proto": "pbjs --wrap commonjs --target static-module src/keys/keys.proto > src/keys/keys.proto.js", | ||
"test": "aegir test", | ||
"test:node": "aegir test -t node", | ||
"test:browser": "aegir test -t browser -t webworker", | ||
"release": "aegir release", | ||
"release-minor": "aegir release --type minor", | ||
"release-major": "aegir release --type major", | ||
"coverage": "aegir coverage --ignore src/keys/keys.proto.js" | ||
}, | ||
@@ -36,3 +36,3 @@ "keywords": [ | ||
"async": "^2.5.0", | ||
"browserify-aes": "^1.0.6", | ||
"browserify-aes": "^1.0.8", | ||
"keypair": "^1.0.1", | ||
@@ -44,3 +44,2 @@ "libp2p-crypto-secp256k1": "~0.2.2", | ||
"rsa-pem-to-jwk": "^1.1.3", | ||
"safe-buffer": "^5.1.1", | ||
"tweetnacl": "^1.0.0", | ||
@@ -50,3 +49,3 @@ "webcrypto-shim": "github:dignifiedquire/webcrypto-shim#master" | ||
"devDependencies": { | ||
"aegir": "^11.0.2", | ||
"aegir": "^12.0.5", | ||
"benchmark": "^2.1.4", | ||
@@ -85,2 +84,2 @@ "chai": "^4.1.2", | ||
] | ||
} | ||
} |
'use strict' | ||
const nodeify = require('../nodeify') | ||
const Buffer = require('safe-buffer').Buffer | ||
@@ -6,0 +5,0 @@ const crypto = require('../webcrypto.js')() |
@@ -6,3 +6,2 @@ 'use strict' | ||
const BN = require('asn1.js').bignum | ||
const Buffer = require('safe-buffer').Buffer | ||
@@ -9,0 +8,0 @@ const util = require('../util') |
@@ -5,3 +5,2 @@ 'use strict' | ||
const protobuf = require('protocol-buffers') | ||
const Buffer = require('safe-buffer').Buffer | ||
@@ -8,0 +7,0 @@ const crypto = require('./ed25519') |
@@ -5,3 +5,2 @@ 'use strict' | ||
const setImmediate = require('async/setImmediate') | ||
const Buffer = require('safe-buffer').Buffer | ||
@@ -8,0 +7,0 @@ exports.publicKeyLength = nacl.sign.publicKeyLength |
@@ -53,11 +53,12 @@ 'use strict' | ||
const decoded = keysPBM.PublicKey.decode(buf) | ||
const data = decoded.Data | ||
switch (decoded.Type) { | ||
case keysPBM.KeyType.RSA: | ||
return supportedKeys.rsa.unmarshalRsaPublicKey(decoded.Data) | ||
return supportedKeys.rsa.unmarshalRsaPublicKey(data) | ||
case keysPBM.KeyType.Ed25519: | ||
return supportedKeys.ed25519.unmarshalEd25519PublicKey(decoded.Data) | ||
return supportedKeys.ed25519.unmarshalEd25519PublicKey(data) | ||
case keysPBM.KeyType.Secp256k1: | ||
if (supportedKeys.secp256k1) { | ||
return supportedKeys.secp256k1.unmarshalSecp256k1PublicKey(decoded.Data) | ||
return supportedKeys.secp256k1.unmarshalSecp256k1PublicKey(data) | ||
} else { | ||
@@ -85,11 +86,12 @@ throw new Error('secp256k1 support requires libp2p-crypto-secp256k1 package') | ||
const decoded = keysPBM.PrivateKey.decode(buf) | ||
const data = decoded.Data | ||
switch (decoded.Type) { | ||
case keysPBM.KeyType.RSA: | ||
return supportedKeys.rsa.unmarshalRsaPrivateKey(decoded.Data, callback) | ||
return supportedKeys.rsa.unmarshalRsaPrivateKey(data, callback) | ||
case keysPBM.KeyType.Ed25519: | ||
return supportedKeys.ed25519.unmarshalEd25519PrivateKey(decoded.Data, callback) | ||
return supportedKeys.ed25519.unmarshalEd25519PrivateKey(data, callback) | ||
case keysPBM.KeyType.Secp256k1: | ||
if (supportedKeys.secp256k1) { | ||
return supportedKeys.secp256k1.unmarshalSecp256k1PrivateKey(decoded.Data, callback) | ||
return supportedKeys.secp256k1.unmarshalSecp256k1PrivateKey(data, callback) | ||
} else { | ||
@@ -96,0 +98,0 @@ return callback(new Error('secp256k1 support requires libp2p-crypto-secp256k1 package')) |
'use strict' | ||
const whilst = require('async/whilst') | ||
const Buffer = require('safe-buffer').Buffer | ||
const hmac = require('../hmac') | ||
@@ -6,0 +5,0 @@ |
@@ -8,3 +8,2 @@ 'use strict' | ||
} | ||
message PublicKey { | ||
@@ -14,6 +13,5 @@ required KeyType Type = 1; | ||
} | ||
message PrivateKey { | ||
required KeyType Type = 1; | ||
required bytes Data = 2; | ||
}` | ||
}` |
'use strict' | ||
const nodeify = require('../nodeify') | ||
const Buffer = require('safe-buffer').Buffer | ||
@@ -21,7 +20,7 @@ const webcrypto = require('../webcrypto.js')() | ||
) | ||
.then(exportKey) | ||
.then((keys) => ({ | ||
privateKey: keys[0], | ||
publicKey: keys[1] | ||
})), callback) | ||
.then(exportKey) | ||
.then((keys) => ({ | ||
privateKey: keys[0], | ||
publicKey: keys[1] | ||
})), callback) | ||
} | ||
@@ -28,0 +27,0 @@ |
'use strict' | ||
const BN = require('asn1.js').bignum | ||
const Buffer = require('safe-buffer').Buffer | ||
@@ -14,4 +13,4 @@ // Convert a BN.js instance to a base64 encoded string without padding | ||
.replace(/(=*)$/, '') // Remove any trailing '='s | ||
.replace(/\+/g, '-') // 62nd char of encoding | ||
.replace(/\//g, '_') // 63rd char of encoding | ||
.replace(/\+/g, '-') // 62nd char of encoding | ||
.replace(/\//g, '_') // 63rd char of encoding | ||
} | ||
@@ -18,0 +17,0 @@ |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
2221288
11
39
24295
- Removedsafe-buffer@^5.1.1
Updatedbrowserify-aes@^1.0.8