| 'use strict' |
| |
| exports.randomBytes = exports.rng = exports.pseudoRandomBytes = exports.prng = require('randombytes') |
| exports.createHash = exports.Hash = require('create-hash') |
| exports.createHmac = exports.Hmac = require('create-hmac') |
| |
| var algos = require('browserify-sign/algos') |
| var algoKeys = Object.keys(algos) |
| var hashes = ['sha1', 'sha224', 'sha256', 'sha384', 'sha512', 'md5', 'rmd160'].concat(algoKeys) |
| exports.getHashes = function () { |
| return hashes |
| } |
| |
| var p = require('pbkdf2') |
| exports.pbkdf2 = p.pbkdf2 |
| exports.pbkdf2Sync = p.pbkdf2Sync |
| |
| var aes = require('browserify-cipher') |
| |
| exports.Cipher = aes.Cipher |
| exports.createCipher = aes.createCipher |
| exports.Cipheriv = aes.Cipheriv |
| exports.createCipheriv = aes.createCipheriv |
| exports.Decipher = aes.Decipher |
| exports.createDecipher = aes.createDecipher |
| exports.Decipheriv = aes.Decipheriv |
| exports.createDecipheriv = aes.createDecipheriv |
| exports.getCiphers = aes.getCiphers |
| exports.listCiphers = aes.listCiphers |
| |
| var dh = require('diffie-hellman') |
| |
| exports.DiffieHellmanGroup = dh.DiffieHellmanGroup |
| exports.createDiffieHellmanGroup = dh.createDiffieHellmanGroup |
| exports.getDiffieHellman = dh.getDiffieHellman |
| exports.createDiffieHellman = dh.createDiffieHellman |
| exports.DiffieHellman = dh.DiffieHellman |
| |
| var sign = require('browserify-sign') |
| |
| exports.createSign = sign.createSign |
| exports.Sign = sign.Sign |
| exports.createVerify = sign.createVerify |
| exports.Verify = sign.Verify |
| |
| exports.createECDH = require('create-ecdh') |
| |
| var publicEncrypt = require('public-encrypt') |
| |
| exports.publicEncrypt = publicEncrypt.publicEncrypt |
| exports.privateEncrypt = publicEncrypt.privateEncrypt |
| exports.publicDecrypt = publicEncrypt.publicDecrypt |
| exports.privateDecrypt = publicEncrypt.privateDecrypt |
| |
| // the least I can do is make error messages for the rest of the node.js/crypto api. |
| // ;[ |
| // 'createCredentials' |
| // ].forEach(function (name) { |
| // exports[name] = function () { |
| // throw new Error([ |
| // 'sorry, ' + name + ' is not implemented yet', |
| // 'we accept pull requests', |
| // 'https://github.com/crypto-browserify/crypto-browserify' |
| // ].join('\n')) |
| // } |
| // }) |
| |
| var rf = require('randomfill') |
| |
| exports.randomFill = rf.randomFill |
| exports.randomFillSync = rf.randomFillSync |
| |
| exports.createCredentials = function () { |
| throw new Error([ |
| 'sorry, createCredentials is not implemented yet', |
| 'we accept pull requests', |
| 'https://github.com/crypto-browserify/crypto-browserify' |
| ].join('\n')) |
| } |
| |
| exports.constants = { |
| 'DH_CHECK_P_NOT_SAFE_PRIME': 2, |
| 'DH_CHECK_P_NOT_PRIME': 1, |
| 'DH_UNABLE_TO_CHECK_GENERATOR': 4, |
| 'DH_NOT_SUITABLE_GENERATOR': 8, |
| 'NPN_ENABLED': 1, |
| 'ALPN_ENABLED': 1, |
| 'RSA_PKCS1_PADDING': 1, |
| 'RSA_SSLV23_PADDING': 2, |
| 'RSA_NO_PADDING': 3, |
| 'RSA_PKCS1_OAEP_PADDING': 4, |
| 'RSA_X931_PADDING': 5, |
| 'RSA_PKCS1_PSS_PADDING': 6, |
| 'POINT_CONVERSION_COMPRESSED': 2, |
| 'POINT_CONVERSION_UNCOMPRESSED': 4, |
| 'POINT_CONVERSION_HYBRID': 6 |
| } |