Comparing version 3.3.0 to 3.3.1
50
API.md
@@ -26,4 +26,6 @@ # API Reference (v3.x) | ||
#####`.privateKeyVerify(Buffer privateKey)` -> `Boolean` | ||
<hr> | ||
##### .privateKeyVerify(Buffer privateKey) -> Boolean | ||
Verify an ECDSA *privateKey*. | ||
@@ -33,3 +35,3 @@ | ||
#####`.privateKeyExport(Buffer privateKey [, Boolean compressed = true])` -> `Buffer` | ||
##### .privateKeyExport(Buffer privateKey [, Boolean compressed = true]) -> Buffer | ||
@@ -40,3 +42,3 @@ Export a *privateKey* in DER format. | ||
#####`.privateKeyImport(Buffer privateKey)` -> `Buffer` | ||
##### .privateKeyImport(Buffer privateKey) -> Buffer | ||
@@ -47,3 +49,3 @@ Import a *privateKey* in DER format. | ||
#####`.privateKeyTweakAdd(Buffer privateKey, Buffer tweak)` -> `Buffer` | ||
##### .privateKeyTweakAdd(Buffer privateKey, Buffer tweak) -> Buffer | ||
@@ -54,3 +56,3 @@ Tweak a *privateKey* by adding *tweak* to it. | ||
#####`.privateKeyTweakMul(Buffer privateKey, Buffer tweak)` -> `Buffer` | ||
##### .privateKeyTweakMul(Buffer privateKey, Buffer tweak) -> Buffer | ||
@@ -61,3 +63,3 @@ Tweak a *privateKey* by multiplying it by a *tweak*. | ||
#####`.publicKeyCreate(Buffer privateKey [, Boolean compressed = true])` -> `Buffer` | ||
##### .publicKeyCreate(Buffer privateKey [, Boolean compressed = true]) -> Buffer | ||
@@ -68,3 +70,3 @@ Compute the public key for a *privateKey*. | ||
#####`.publicKeyConvert(Buffer publicKey [, Boolean compressed = true])` -> `Buffer` | ||
##### .publicKeyConvert(Buffer publicKey [, Boolean compressed = true]) -> Buffer | ||
@@ -75,3 +77,3 @@ Convert a *publicKey* to *compressed* or *uncompressed* form. | ||
#####`.publicKeyVerify(Buffer publicKey)` -> `Boolean` | ||
##### .publicKeyVerify(Buffer publicKey) -> Boolean | ||
@@ -82,3 +84,3 @@ Verify an ECDSA *publicKey*. | ||
#####`.publicKeyTweakAdd(Buffer publicKey, Buffer tweak [, Boolean compressed = true])` -> `Buffer` | ||
##### .publicKeyTweakAdd(Buffer publicKey, Buffer tweak [, Boolean compressed = true]) -> Buffer | ||
@@ -89,3 +91,3 @@ Tweak a *publicKey* by adding *tweak* times the generator to it. | ||
#####`.publicKeyTweakMul(Buffer publicKey, Buffer tweak [, Boolean compressed = true])` -> `Buffer` | ||
##### .publicKeyTweakMul(Buffer publicKey, Buffer tweak [, Boolean compressed = true]) -> Buffer | ||
@@ -96,3 +98,3 @@ Tweak a *publicKey* by multiplying it by a *tweak* value. | ||
#####`.publicKeyCombine(Array<Buffer> publicKeys [, Boolean compressed = true])` -> `Buffer` | ||
##### .publicKeyCombine(Array<Buffer> publicKeys [, Boolean compressed = true]) -> Buffer | ||
@@ -103,3 +105,3 @@ Add a given *publicKeys* together. | ||
#####`.signatureNormalize(Buffer signature)` -> `Buffer` | ||
##### .signatureNormalize(Buffer signature) -> Buffer | ||
@@ -110,3 +112,3 @@ Convert a *signature* to a normalized lower-S form. | ||
#####`.signatureExport(Buffer signature)` -> `Buffer` | ||
##### .signatureExport(Buffer signature) -> Buffer | ||
@@ -117,3 +119,3 @@ Serialize an ECDSA *signature* in DER format. | ||
#####`.signatureImport(Buffer signature)` -> `Buffer` | ||
##### .signatureImport(Buffer signature) -> Buffer | ||
@@ -124,3 +126,3 @@ Parse a DER ECDSA *signature* (follow by [BIP66](https://github.com/bitcoin/bips/blob/master/bip-0066.mediawiki)). | ||
#####`.signatureImportLax(Buffer signature)` -> `Buffer` | ||
##### .signatureImportLax(Buffer signature) -> Buffer | ||
@@ -131,3 +133,3 @@ Same as [signatureImport](#signatureimportbuffer-signature---buffer) but not follow by [BIP66](https://github.com/bitcoin/bips/blob/master/bip-0066.mediawiki). | ||
#####`.sign(Buffer message, Buffer privateKey [, Object options])` -> `{signature: Buffer, recovery: number}` | ||
##### .sign(Buffer message, Buffer privateKey [, Object options]) -> {signature: Buffer, recovery: number} | ||
@@ -143,10 +145,12 @@ Create an ECDSA signature. Always return low-S signature. | ||
######Option: `Function noncefn` | ||
###### Option: `Function noncefn` | ||
Nonce generator. By default it is [rfc6979](https://tools.ietf.org/html/rfc6979). | ||
Function signature: `noncefn(Buffer message, Buffer privateKey, ?Buffer algo, ?Buffer data, Number attempt)` -> `Buffer` | ||
Function signature: | ||
######Option: `Buffer data` | ||
##### noncefn(Buffer message, Buffer privateKey, ?Buffer algo, ?Buffer data, Number attempt) -> Buffer | ||
###### Option: `Buffer data` | ||
Additional data for [noncefn](#option-function-noncefn) (RFC 6979 3.6) (32 bytes). By default is `null`. | ||
@@ -156,3 +160,3 @@ | ||
#####`.verify(Buffer message, Buffer signature, Buffer publicKey)` -> `Boolean` | ||
##### .verify(Buffer message, Buffer signature, Buffer publicKey) -> Boolean | ||
@@ -172,3 +176,3 @@ Verify an ECDSA signature. | ||
#####`.recover(Buffer message, Buffer signature, Number recovery [, Boolean compressed = true])` -> `Buffer` | ||
##### .recover(Buffer message, Buffer signature, Number recovery [, Boolean compressed = true]) -> Buffer | ||
@@ -179,3 +183,3 @@ Recover an ECDSA public key from a signature. | ||
#####`.ecdh(Buffer publicKey, Buffer privateKey)` -> `Buffer` | ||
##### .ecdh(Buffer publicKey, Buffer privateKey) -> Buffer | ||
@@ -186,4 +190,4 @@ Compute an EC Diffie-Hellman secret and applied sha256 to compressed public key. | ||
#####`.ecdhUnsafe(Buffer publicKey, Buffer privateKey [, Boolean compressed = true])` -> `Buffer` | ||
##### .ecdhUnsafe(Buffer publicKey, Buffer privateKey [, Boolean compressed = true]) -> Buffer | ||
Compute an EC Diffie-Hellman secret and return public key as result. |
@@ -53,7 +53,2 @@ 'use strict' | ||
var ZERO_BUFFER_32 = Buffer.from([ | ||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 | ||
]) | ||
exports.privateKeyExport = function (privateKey, publicKey, compressed) { | ||
@@ -118,4 +113,4 @@ var result = Buffer.from(compressed ? EC_PRIVKEY_EXPORT_DER_COMPRESSED : EC_PRIVKEY_EXPORT_DER_UNCOMPRESSED) | ||
exports.signatureImport = function (sig) { | ||
var r = Buffer.from(ZERO_BUFFER_32) | ||
var s = Buffer.from(ZERO_BUFFER_32) | ||
var r = Buffer.alloc(32, 0) | ||
var s = Buffer.alloc(32, 0) | ||
@@ -139,4 +134,4 @@ try { | ||
exports.signatureImportLax = function (sig) { | ||
var r = Buffer.from(ZERO_BUFFER_32) | ||
var s = Buffer.from(ZERO_BUFFER_32) | ||
var r = Buffer.alloc(32, 0) | ||
var s = Buffer.alloc(32, 0) | ||
@@ -143,0 +138,0 @@ var length = sig.length |
{ | ||
"name": "secp256k1", | ||
"version": "3.3.0", | ||
"version": "3.3.1", | ||
"description": "This module provides native bindings to ecdsa secp256k1 functions", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
121
928184
2265