Socket
Socket
Sign inDemoInstall

secp256k1

Package Overview
Dependencies
Maintainers
1
Versions
59
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

secp256k1 - npm Package Compare versions

Comparing version 3.3.0 to 3.3.1

src/secp256k1-src/.git

50

API.md

@@ -26,4 +26,6 @@ # API Reference (v3.x)

#####`.privateKeyVerify(Buffer privateKey)` -> `Boolean`
<hr>
##### .privateKeyVerify(Buffer privateKey) -> Boolean
Verify an ECDSA *privateKey*.

@@ -33,3 +35,3 @@

#####`.privateKeyExport(Buffer privateKey [, Boolean compressed = true])` -> `Buffer`
##### .privateKeyExport(Buffer privateKey [, Boolean compressed = true]) -> Buffer

@@ -40,3 +42,3 @@ Export a *privateKey* in DER format.

#####`.privateKeyImport(Buffer privateKey)` -> `Buffer`
##### .privateKeyImport(Buffer privateKey) -> Buffer

@@ -47,3 +49,3 @@ Import a *privateKey* in DER format.

#####`.privateKeyTweakAdd(Buffer privateKey, Buffer tweak)` -> `Buffer`
##### .privateKeyTweakAdd(Buffer privateKey, Buffer tweak) -> Buffer

@@ -54,3 +56,3 @@ Tweak a *privateKey* by adding *tweak* to it.

#####`.privateKeyTweakMul(Buffer privateKey, Buffer tweak)` -> `Buffer`
##### .privateKeyTweakMul(Buffer privateKey, Buffer tweak) -> Buffer

@@ -61,3 +63,3 @@ Tweak a *privateKey* by multiplying it by a *tweak*.

#####`.publicKeyCreate(Buffer privateKey [, Boolean compressed = true])` -> `Buffer`
##### .publicKeyCreate(Buffer privateKey [, Boolean compressed = true]) -> Buffer

@@ -68,3 +70,3 @@ Compute the public key for a *privateKey*.

#####`.publicKeyConvert(Buffer publicKey [, Boolean compressed = true])` -> `Buffer`
##### .publicKeyConvert(Buffer publicKey [, Boolean compressed = true]) -> Buffer

@@ -75,3 +77,3 @@ Convert a *publicKey* to *compressed* or *uncompressed* form.

#####`.publicKeyVerify(Buffer publicKey)` -> `Boolean`
##### .publicKeyVerify(Buffer publicKey) -> Boolean

@@ -82,3 +84,3 @@ Verify an ECDSA *publicKey*.

#####`.publicKeyTweakAdd(Buffer publicKey, Buffer tweak [, Boolean compressed = true])` -> `Buffer`
##### .publicKeyTweakAdd(Buffer publicKey, Buffer tweak [, Boolean compressed = true]) -> Buffer

@@ -89,3 +91,3 @@ Tweak a *publicKey* by adding *tweak* times the generator to it.

#####`.publicKeyTweakMul(Buffer publicKey, Buffer tweak [, Boolean compressed = true])` -> `Buffer`
##### .publicKeyTweakMul(Buffer publicKey, Buffer tweak [, Boolean compressed = true]) -> Buffer

@@ -96,3 +98,3 @@ Tweak a *publicKey* by multiplying it by a *tweak* value.

#####`.publicKeyCombine(Array<Buffer> publicKeys [, Boolean compressed = true])` -> `Buffer`
##### .publicKeyCombine(Array<Buffer> publicKeys [, Boolean compressed = true]) -> Buffer

@@ -103,3 +105,3 @@ Add a given *publicKeys* together.

#####`.signatureNormalize(Buffer signature)` -> `Buffer`
##### .signatureNormalize(Buffer signature) -> Buffer

@@ -110,3 +112,3 @@ Convert a *signature* to a normalized lower-S form.

#####`.signatureExport(Buffer signature)` -> `Buffer`
##### .signatureExport(Buffer signature) -> Buffer

@@ -117,3 +119,3 @@ Serialize an ECDSA *signature* in DER format.

#####`.signatureImport(Buffer signature)` -> `Buffer`
##### .signatureImport(Buffer signature) -> Buffer

@@ -124,3 +126,3 @@ Parse a DER ECDSA *signature* (follow by [BIP66](https://github.com/bitcoin/bips/blob/master/bip-0066.mediawiki)).

#####`.signatureImportLax(Buffer signature)` -> `Buffer`
##### .signatureImportLax(Buffer signature) -> Buffer

@@ -131,3 +133,3 @@ Same as [signatureImport](#signatureimportbuffer-signature---buffer) but not follow by [BIP66](https://github.com/bitcoin/bips/blob/master/bip-0066.mediawiki).

#####`.sign(Buffer message, Buffer privateKey [, Object options])` -> `{signature: Buffer, recovery: number}`
##### .sign(Buffer message, Buffer privateKey [, Object options]) -> {signature: Buffer, recovery: number}

@@ -143,10 +145,12 @@ Create an ECDSA signature. Always return low-S signature.

######Option: `Function noncefn`
###### Option: `Function noncefn`
Nonce generator. By default it is [rfc6979](https://tools.ietf.org/html/rfc6979).
Function signature: `noncefn(Buffer message, Buffer privateKey, ?Buffer algo, ?Buffer data, Number attempt)` -> `Buffer`
Function signature:
######Option: `Buffer data`
##### noncefn(Buffer message, Buffer privateKey, ?Buffer algo, ?Buffer data, Number attempt) -> Buffer
###### Option: `Buffer data`
Additional data for [noncefn](#option-function-noncefn) (RFC 6979 3.6) (32 bytes). By default is `null`.

@@ -156,3 +160,3 @@

#####`.verify(Buffer message, Buffer signature, Buffer publicKey)` -> `Boolean`
##### .verify(Buffer message, Buffer signature, Buffer publicKey) -> Boolean

@@ -172,3 +176,3 @@ Verify an ECDSA signature.

#####`.recover(Buffer message, Buffer signature, Number recovery [, Boolean compressed = true])` -> `Buffer`
##### .recover(Buffer message, Buffer signature, Number recovery [, Boolean compressed = true]) -> Buffer

@@ -179,3 +183,3 @@ Recover an ECDSA public key from a signature.

#####`.ecdh(Buffer publicKey, Buffer privateKey)` -> `Buffer`
##### .ecdh(Buffer publicKey, Buffer privateKey) -> Buffer

@@ -186,4 +190,4 @@ Compute an EC Diffie-Hellman secret and applied sha256 to compressed public key.

#####`.ecdhUnsafe(Buffer publicKey, Buffer privateKey [, Boolean compressed = true])` -> `Buffer`
##### .ecdhUnsafe(Buffer publicKey, Buffer privateKey [, Boolean compressed = true]) -> Buffer
Compute an EC Diffie-Hellman secret and return public key as result.

@@ -53,7 +53,2 @@ 'use strict'

var ZERO_BUFFER_32 = Buffer.from([
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
])
exports.privateKeyExport = function (privateKey, publicKey, compressed) {

@@ -118,4 +113,4 @@ var result = Buffer.from(compressed ? EC_PRIVKEY_EXPORT_DER_COMPRESSED : EC_PRIVKEY_EXPORT_DER_UNCOMPRESSED)

exports.signatureImport = function (sig) {
var r = Buffer.from(ZERO_BUFFER_32)
var s = Buffer.from(ZERO_BUFFER_32)
var r = Buffer.alloc(32, 0)
var s = Buffer.alloc(32, 0)

@@ -139,4 +134,4 @@ try {

exports.signatureImportLax = function (sig) {
var r = Buffer.from(ZERO_BUFFER_32)
var s = Buffer.from(ZERO_BUFFER_32)
var r = Buffer.alloc(32, 0)
var s = Buffer.alloc(32, 0)

@@ -143,0 +138,0 @@ var length = sig.length

{
"name": "secp256k1",
"version": "3.3.0",
"version": "3.3.1",
"description": "This module provides native bindings to ecdsa secp256k1 functions",

@@ -5,0 +5,0 @@ "keywords": [

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc