@dxos/crypto 0.8.3 → 0.8.4-main.1da679c

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dxos/crypto",
3
- "version": "0.8.3",
3
+ "version": "0.8.4-main.1da679c",
4
4
  "description": "Basic cross-platform crypto utils.",
5
5
  "homepage": "https://dxos.org",
6
6
  "bugs": "https://github.com/dxos/dxos/issues",
@@ -9,21 +9,20 @@
9
9
  "sideEffects": true,
10
10
  "type": "module",
11
11
  "imports": {
12
- "#hypercore-crypto": {
13
- "workerd": "./hypercore-crypto-stub.mjs",
14
- "default": "hypercore-crypto"
12
+ "#subtle": {
13
+ "types": "./vendor/subtle.d.ts",
14
+ "node": "./vendor/subtle-node.mjs",
15
+ "browser": "./vendor/subtle-browser.mjs"
15
16
  }
16
17
  },
17
18
  "exports": {
18
19
  ".": {
20
+ "source": "./src/index.ts",
19
21
  "types": "./dist/types/src/index.d.ts",
20
22
  "browser": "./dist/lib/browser/index.mjs",
21
23
  "node": "./dist/lib/node-esm/index.mjs"
22
24
  }
23
25
  },
24
- "browser": {
25
- "./src/subtle.ts": "./src/browser/subtle.ts"
26
- },
27
26
  "types": "dist/types/src/index.d.ts",
28
27
  "typesVersions": {
29
28
  "*": {}
@@ -31,13 +30,13 @@
31
30
  "files": [
32
31
  "dist",
33
32
  "src",
34
- "./hypercore-crypto-stub.mjs"
33
+ "vendor"
35
34
  ],
36
35
  "dependencies": {
37
- "hypercore-crypto": "^2.3.0",
38
- "@dxos/invariant": "0.8.3",
39
- "@dxos/keys": "0.8.3",
40
- "@dxos/node-std": "0.8.3"
36
+ "@dxos/invariant": "0.8.4-main.1da679c",
37
+ "@dxos/node-std": "0.8.4-main.1da679c",
38
+ "@dxos/keys": "0.8.4-main.1da679c",
39
+ "@dxos/vendor-hypercore": "0.8.4-main.1da679c"
41
40
  },
42
41
  "devDependencies": {},
43
42
  "publishConfig": {
package/src/index.ts CHANGED
@@ -2,9 +2,9 @@
2
2
  // Copyright 2020 DXOS.org
3
3
  //
4
4
 
5
+ export * from '#subtle';
5
6
  export * from './keys';
6
- export * from './signer';
7
- export * from './subtle';
7
+ export type * from './signer';
8
+ export * from './uuid';
8
9
  export * from './validator';
9
10
  export * from './verify';
10
- export * from './uuid';
package/src/keys.test.ts CHANGED
@@ -2,7 +2,7 @@
2
2
  // Copyright 2020 DXOS.org
3
3
  //
4
4
 
5
- import { describe, test, expect } from 'vitest';
5
+ import { describe, expect, test } from 'vitest';
6
6
 
7
7
  import { createId, createKeyPair, randomBytes, sign, verify } from './keys';
8
8
 
package/src/keys.ts CHANGED
@@ -3,9 +3,8 @@
3
3
  //
4
4
 
5
5
  import { invariant } from '@dxos/invariant';
6
- import { type KeyPair, PublicKey, type PublicKeyLike, PUBLIC_KEY_LENGTH, SECRET_KEY_LENGTH } from '@dxos/keys';
7
-
8
- import crypto from '#hypercore-crypto';
6
+ import { type KeyPair, PUBLIC_KEY_LENGTH, PublicKey, type PublicKeyLike, SECRET_KEY_LENGTH } from '@dxos/keys';
7
+ import crypto from '@dxos/vendor-hypercore/hypercore-crypto';
9
8
 
10
9
  export const SIGNATURE_LENGTH = 64;
11
10
 
package/src/uuid.ts CHANGED
@@ -2,7 +2,7 @@
2
2
  // Copyright 2024 DXOS.org
3
3
  //
4
4
 
5
- import { webcrypto } from './subtle';
5
+ import { webcrypto } from '#subtle';
6
6
 
7
7
  export const randomUUID = (): string => {
8
8
  return webcrypto.randomUUID();
package/src/validator.ts CHANGED
@@ -3,8 +3,7 @@
3
3
  //
4
4
 
5
5
  import { PublicKey } from '@dxos/keys';
6
-
7
- import { verify } from '#hypercore-crypto';
6
+ import { verify } from '@dxos/vendor-hypercore/hypercore-crypto';
8
7
 
9
8
  /**
10
9
  * Generator for signature validation function.
package/src/verify.ts CHANGED
@@ -4,7 +4,7 @@
4
4
 
5
5
  import { type PublicKey } from '@dxos/keys';
6
6
 
7
- import { subtleCrypto } from './subtle';
7
+ import { subtleCrypto } from '#subtle';
8
8
 
9
9
  /**
10
10
  * Verify a signature with the given key.
@@ -18,7 +18,9 @@ export const verifySignature = async (
18
18
  let publicKey!: CryptoKey;
19
19
 
20
20
  try {
21
- publicKey = await subtleCrypto.importKey('raw', key.asUint8Array(), algorithm, true, ['verify']);
21
+ publicKey = await subtleCrypto.importKey('raw', key.asUint8Array() as Uint8Array<ArrayBuffer>, algorithm, true, [
22
+ 'verify',
23
+ ]);
22
24
  } catch {
23
25
  return false;
24
26
  }
@@ -29,7 +31,7 @@ export const verifySignature = async (
29
31
  hash: 'SHA-256',
30
32
  },
31
33
  publicKey,
32
- signature,
33
- message,
34
+ signature as Uint8Array<ArrayBuffer>,
35
+ message as Uint8Array<ArrayBuffer>,
34
36
  );
35
37
  };
@@ -0,0 +1,3 @@
1
+ export const subtleCrypto: SubtleCrypto;
2
+
3
+ export const webcrypto: Crypto;
@@ -1,166 +0,0 @@
1
- "use strict";
2
- var __create = Object.create;
3
- var __defProp = Object.defineProperty;
4
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
- var __getOwnPropNames = Object.getOwnPropertyNames;
6
- var __getProtoOf = Object.getPrototypeOf;
7
- var __hasOwnProp = Object.prototype.hasOwnProperty;
8
- var __export = (target, all) => {
9
- for (var name in all)
10
- __defProp(target, name, { get: all[name], enumerable: true });
11
- };
12
- var __copyProps = (to, from, except, desc) => {
13
- if (from && typeof from === "object" || typeof from === "function") {
14
- for (let key of __getOwnPropNames(from))
15
- if (!__hasOwnProp.call(to, key) && key !== except)
16
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
- }
18
- return to;
19
- };
20
- var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
- // If the importer is in node compatibility mode or this is not an ESM
22
- // file that has been converted to a CommonJS file using a Babel-
23
- // compatible transform (i.e. "__esModule" has not been set), then set
24
- // "default" to the CommonJS "module.exports" for node compatibility.
25
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
- mod
27
- ));
28
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
- var node_exports = {};
30
- __export(node_exports, {
31
- SIGNATURE_LENGTH: () => SIGNATURE_LENGTH,
32
- createId: () => createId,
33
- createKeyPair: () => createKeyPair,
34
- discoveryKey: () => discoveryKey,
35
- getSignatureValidator: () => getSignatureValidator,
36
- randomBytes: () => randomBytes,
37
- randomUUID: () => randomUUID,
38
- sign: () => sign,
39
- subtleCrypto: () => subtleCrypto,
40
- validateKeyPair: () => validateKeyPair,
41
- verify: () => verify,
42
- verifySignature: () => verifySignature,
43
- webcrypto: () => webcrypto2
44
- });
45
- module.exports = __toCommonJS(node_exports);
46
- var import_invariant = require("@dxos/invariant");
47
- var import_keys = require("@dxos/keys");
48
- var import_hypercore_crypto = __toESM(require("#hypercore-crypto"));
49
- var nodeCrypto = __toESM(require("node:crypto"));
50
- var import_keys2 = require("@dxos/keys");
51
- var import_hypercore_crypto2 = require("#hypercore-crypto");
52
- var __dxlog_file = "/home/runner/work/dxos/dxos/packages/common/crypto/src/keys.ts";
53
- var SIGNATURE_LENGTH = 64;
54
- var createId = () => import_keys.PublicKey.stringify(randomBytes(32));
55
- var createKeyPair = (seed) => {
56
- if (seed) {
57
- (0, import_invariant.invariant)(seed.length >= 32, "Seedphrase too sort. Expecting length of 32.", {
58
- F: __dxlog_file,
59
- L: 20,
60
- S: void 0,
61
- A: [
62
- "seed.length >= 32",
63
- "'Seedphrase too sort. Expecting length of 32.'"
64
- ]
65
- });
66
- return import_hypercore_crypto.default.keyPair(seed.slice(0, 32));
67
- }
68
- return import_hypercore_crypto.default.keyPair();
69
- };
70
- var validateKeyPair = (publicKey, secretKey) => import_hypercore_crypto.default.validateKeyPair({
71
- publicKey: publicKey.asBuffer(),
72
- secretKey
73
- });
74
- var discoveryKey = (key) => import_hypercore_crypto.default.discoveryKey(import_keys.PublicKey.from(key).asBuffer().slice(1));
75
- var randomBytes = (length = 32) => import_hypercore_crypto.default.randomBytes(length);
76
- var sign = (message, secretKey) => {
77
- (0, import_invariant.invariant)(Buffer.isBuffer(message), void 0, {
78
- F: __dxlog_file,
79
- L: 50,
80
- S: void 0,
81
- A: [
82
- "Buffer.isBuffer(message)",
83
- ""
84
- ]
85
- });
86
- (0, import_invariant.invariant)(Buffer.isBuffer(secretKey) && secretKey.length === import_keys.SECRET_KEY_LENGTH, void 0, {
87
- F: __dxlog_file,
88
- L: 51,
89
- S: void 0,
90
- A: [
91
- "Buffer.isBuffer(secretKey) && secretKey.length === SECRET_KEY_LENGTH",
92
- ""
93
- ]
94
- });
95
- return import_hypercore_crypto.default.sign(message, secretKey);
96
- };
97
- var verify = (message, signature, publicKey) => {
98
- (0, import_invariant.invariant)(Buffer.isBuffer(message), void 0, {
99
- F: __dxlog_file,
100
- L: 64,
101
- S: void 0,
102
- A: [
103
- "Buffer.isBuffer(message)",
104
- ""
105
- ]
106
- });
107
- (0, import_invariant.invariant)(Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH, void 0, {
108
- F: __dxlog_file,
109
- L: 65,
110
- S: void 0,
111
- A: [
112
- "Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH",
113
- ""
114
- ]
115
- });
116
- (0, import_invariant.invariant)(Buffer.isBuffer(publicKey) && publicKey.length === import_keys.PUBLIC_KEY_LENGTH, void 0, {
117
- F: __dxlog_file,
118
- L: 66,
119
- S: void 0,
120
- A: [
121
- "Buffer.isBuffer(publicKey) && publicKey.length === PUBLIC_KEY_LENGTH",
122
- ""
123
- ]
124
- });
125
- return import_hypercore_crypto.default.verify(message, signature, publicKey);
126
- };
127
- var subtleCrypto = nodeCrypto.webcrypto.subtle;
128
- var webcrypto2 = nodeCrypto.webcrypto;
129
- var getSignatureValidator = (publicKey) => (message, signature) => (0, import_hypercore_crypto2.verify)(message, signature, import_keys2.PublicKey.bufferize(publicKey));
130
- var verifySignature = async (key, message, signature, algorithm = {
131
- name: "ECDSA",
132
- namedCurve: "P-256"
133
- }) => {
134
- let publicKey;
135
- try {
136
- publicKey = await subtleCrypto.importKey("raw", key.asUint8Array(), algorithm, true, [
137
- "verify"
138
- ]);
139
- } catch {
140
- return false;
141
- }
142
- return subtleCrypto.verify({
143
- name: algorithm.name,
144
- hash: "SHA-256"
145
- }, publicKey, signature, message);
146
- };
147
- var randomUUID = () => {
148
- return webcrypto2.randomUUID();
149
- };
150
- // Annotate the CommonJS export names for ESM import in node:
151
- 0 && (module.exports = {
152
- SIGNATURE_LENGTH,
153
- createId,
154
- createKeyPair,
155
- discoveryKey,
156
- getSignatureValidator,
157
- randomBytes,
158
- randomUUID,
159
- sign,
160
- subtleCrypto,
161
- validateKeyPair,
162
- verify,
163
- verifySignature,
164
- webcrypto
165
- });
166
- //# sourceMappingURL=index.cjs.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../src/keys.ts", "../../../src/subtle.ts", "../../../src/validator.ts", "../../../src/verify.ts", "../../../src/uuid.ts"],
4
- "sourcesContent": ["//\n// Copyright 2020 DXOS.org\n//\n\nimport { invariant } from '@dxos/invariant';\nimport { type KeyPair, PublicKey, type PublicKeyLike, PUBLIC_KEY_LENGTH, SECRET_KEY_LENGTH } from '@dxos/keys';\n\nimport crypto from '#hypercore-crypto';\n\nexport const SIGNATURE_LENGTH = 64;\n\n/**\n * @deprecated\n */\n// TODO(burdon): Remove.\nexport const createId = (): string => PublicKey.stringify(randomBytes(32));\n\nexport const createKeyPair = (seed?: Buffer): KeyPair => {\n if (seed) {\n invariant(seed.length >= 32, 'Seedphrase too sort. Expecting length of 32.');\n return crypto.keyPair(seed.slice(0, 32));\n }\n\n // TODO(burdon): Enable seed for debugging.\n return crypto.keyPair();\n};\n\n// TODO(burdon): Buffer.\nexport const validateKeyPair = (publicKey: PublicKey, secretKey: Buffer) =>\n crypto.validateKeyPair({ publicKey: publicKey.asBuffer(), secretKey });\n\n// TODO(dmaretskyi): Slicing because webcrypto keys are too long.\nexport const discoveryKey = (key: PublicKeyLike): Buffer =>\n crypto.discoveryKey(PublicKey.from(key).asBuffer().slice(1));\n\n/**\n * Return random bytes of length.\n * @param [length=32]\n * @return {Buffer}\n */\nexport const randomBytes = (length = 32): Buffer => crypto.randomBytes(length);\n\n/**\n * Sign the contents of message with secret_key\n * @param {Buffer} message\n * @param {Buffer} secretKey\n * @returns {Buffer} signature\n */\nexport const sign = (message: Buffer, secretKey: Buffer): Buffer => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(secretKey) && secretKey.length === SECRET_KEY_LENGTH);\n\n return crypto.sign(message, secretKey);\n};\n\n/**\n * Verifies the signature against the message and public_key.\n * @param {Buffer} message\n * @param {Buffer} publicKey\n * @param {Buffer} signature\n * @return {boolean}\n */\nexport const verify = (message: Buffer, signature: Buffer, publicKey: Buffer): boolean => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH);\n invariant(Buffer.isBuffer(publicKey) && publicKey.length === PUBLIC_KEY_LENGTH);\n\n return crypto.verify(message, signature, publicKey);\n};\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport * as nodeCrypto from 'node:crypto';\n\nexport const subtleCrypto = nodeCrypto.webcrypto.subtle;\n\nexport const webcrypto = nodeCrypto.webcrypto;\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { PublicKey } from '@dxos/keys';\n\nimport { verify } from '#hypercore-crypto';\n\n/**\n * Generator for signature validation function.\n * @param {String} publicKey\n */\nexport const getSignatureValidator = (publicKey: string) => (message: Buffer, signature: Buffer) =>\n verify(message, signature, PublicKey.bufferize(publicKey));\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type PublicKey } from '@dxos/keys';\n\nimport { subtleCrypto } from './subtle';\n\n/**\n * Verify a signature with the given key.\n */\nexport const verifySignature = async (\n key: PublicKey,\n message: Uint8Array,\n signature: Uint8Array,\n algorithm: { name: string; namedCurve?: string } = { name: 'ECDSA', namedCurve: 'P-256' },\n): Promise<boolean> => {\n let publicKey!: CryptoKey;\n\n try {\n publicKey = await subtleCrypto.importKey('raw', key.asUint8Array(), algorithm, true, ['verify']);\n } catch {\n return false;\n }\n\n return subtleCrypto.verify(\n {\n name: algorithm.name,\n hash: 'SHA-256',\n },\n publicKey,\n signature,\n message,\n );\n};\n", "//\n// Copyright 2024 DXOS.org\n//\n\nimport { webcrypto } from './subtle';\n\nexport const randomUUID = (): string => {\n return webcrypto.randomUUID();\n};\n"],
5
- "mappings": ";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAIA,uBAA0B;AAC1B,kBAAkG;AAElG,8BAAmB;ACHnB,iBAA4B;ACA5B,IAAAA,eAA0B;AAE1B,IAAAC,2BAAuB;;AFGhB,IAAMC,mBAAmB;AAMzB,IAAMC,WAAW,MAAcC,sBAAUC,UAAUC,YAAY,EAAA,CAAA;AAE/D,IAAMC,gBAAgB,CAACC,SAAAA;AAC5B,MAAIA,MAAM;AACRC,oCAAUD,KAAKE,UAAU,IAAI,gDAAA;;;;;;;;;AAC7B,WAAOC,wBAAAA,QAAOC,QAAQJ,KAAKK,MAAM,GAAG,EAAA,CAAA;EACtC;AAGA,SAAOF,wBAAAA,QAAOC,QAAO;AACvB;AAGO,IAAME,kBAAkB,CAACC,WAAsBC,cACpDL,wBAAAA,QAAOG,gBAAgB;EAAEC,WAAWA,UAAUE,SAAQ;EAAID;AAAU,CAAA;AAG/D,IAAME,eAAe,CAACC,QAC3BR,wBAAAA,QAAOO,aAAad,sBAAUgB,KAAKD,GAAAA,EAAKF,SAAQ,EAAGJ,MAAM,CAAA,CAAA;AAOpD,IAAMP,cAAc,CAACI,SAAS,OAAeC,wBAAAA,QAAOL,YAAYI,MAAAA;AAQhE,IAAMW,OAAO,CAACC,SAAiBN,cAAAA;AACpCP,kCAAUc,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1Bb,kCAAUc,OAAOC,SAASR,SAAAA,KAAcA,UAAUN,WAAWe,+BAAAA,QAAAA;;;;;;;;;AAE7D,SAAOd,wBAAAA,QAAOU,KAAKC,SAASN,SAAAA;AAC9B;AASO,IAAMU,SAAS,CAACJ,SAAiBK,WAAmBZ,cAAAA;AACzDN,kCAAUc,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1Bb,kCAAUc,OAAOC,SAASG,SAAAA,KAAcA,UAAUjB,WAAWR,kBAAAA,QAAAA;;;;;;;;;AAC7DO,kCAAUc,OAAOC,SAAST,SAAAA,KAAcA,UAAUL,WAAWkB,+BAAAA,QAAAA;;;;;;;;;AAE7D,SAAOjB,wBAAAA,QAAOe,OAAOJ,SAASK,WAAWZ,SAAAA;AAC3C;AC9DO,IAAMc,eAA0BC,WAAAA,UAAUC;AAE1C,IAAMD,aAAuBA,WAAAA;ACI7B,IAAME,wBAAwB,CAACjB,cAAsB,CAACO,SAAiBK,kBAC5ED,yBAAAA,QAAOJ,SAASK,WAAWvB,aAAAA,UAAU6B,UAAUlB,SAAAA,CAAAA;ACF1C,IAAMmB,kBAAkB,OAC7Bf,KACAG,SACAK,WACAQ,YAAmD;EAAEC,MAAM;EAASC,YAAY;AAAQ,MAAC;AAEzF,MAAItB;AAEJ,MAAI;AACFA,gBAAY,MAAMc,aAAaS,UAAU,OAAOnB,IAAIoB,aAAY,GAAIJ,WAAW,MAAM;MAAC;KAAS;EACjG,QAAQ;AACN,WAAO;EACT;AAEA,SAAON,aAAaH,OAClB;IACEU,MAAMD,UAAUC;IAChBI,MAAM;EACR,GACAzB,WACAY,WACAL,OAAAA;AAEJ;AC5BO,IAAMmB,aAAa,MAAA;AACxB,SAAOX,WAAUW,WAAU;AAC7B;",
6
- "names": ["import_keys", "import_hypercore_crypto", "SIGNATURE_LENGTH", "createId", "PublicKey", "stringify", "randomBytes", "createKeyPair", "seed", "invariant", "length", "crypto", "keyPair", "slice", "validateKeyPair", "publicKey", "secretKey", "asBuffer", "discoveryKey", "key", "from", "sign", "message", "Buffer", "isBuffer", "SECRET_KEY_LENGTH", "verify", "signature", "PUBLIC_KEY_LENGTH", "subtleCrypto", "webcrypto", "subtle", "getSignatureValidator", "bufferize", "verifySignature", "algorithm", "name", "namedCurve", "importKey", "asUint8Array", "hash", "randomUUID"]
7
- }
@@ -1 +0,0 @@
1
- {"inputs":{"packages/common/crypto/src/keys.ts":{"bytes":8293,"imports":[{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"packages/common/crypto/src/signer.ts":{"bytes":778,"imports":[],"format":"esm"},"packages/common/crypto/src/subtle.ts":{"bytes":946,"imports":[{"path":"node:crypto","kind":"import-statement","external":true}],"format":"esm"},"packages/common/crypto/src/validator.ts":{"bytes":1483,"imports":[{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"packages/common/crypto/src/verify.ts":{"bytes":2537,"imports":[{"path":"packages/common/crypto/src/subtle.ts","kind":"import-statement","original":"./subtle"}],"format":"esm"},"packages/common/crypto/src/uuid.ts":{"bytes":785,"imports":[{"path":"packages/common/crypto/src/subtle.ts","kind":"import-statement","original":"./subtle"}],"format":"esm"},"packages/common/crypto/src/index.ts":{"bytes":873,"imports":[{"path":"packages/common/crypto/src/keys.ts","kind":"import-statement","original":"./keys"},{"path":"packages/common/crypto/src/signer.ts","kind":"import-statement","original":"./signer"},{"path":"packages/common/crypto/src/subtle.ts","kind":"import-statement","original":"./subtle"},{"path":"packages/common/crypto/src/validator.ts","kind":"import-statement","original":"./validator"},{"path":"packages/common/crypto/src/verify.ts","kind":"import-statement","original":"./verify"},{"path":"packages/common/crypto/src/uuid.ts","kind":"import-statement","original":"./uuid"}],"format":"esm"}},"outputs":{"packages/common/crypto/dist/lib/node/index.cjs.map":{"imports":[],"exports":[],"inputs":{},"bytes":6211},"packages/common/crypto/dist/lib/node/index.cjs":{"imports":[{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true},{"path":"node:crypto","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"exports":["SIGNATURE_LENGTH","createId","createKeyPair","discoveryKey","getSignatureValidator","randomBytes","randomUUID","sign","subtleCrypto","validateKeyPair","verify","verifySignature","webcrypto"],"entryPoint":"packages/common/crypto/src/index.ts","inputs":{"packages/common/crypto/src/keys.ts":{"bytesInOutput":2233},"packages/common/crypto/src/index.ts":{"bytesInOutput":0},"packages/common/crypto/src/subtle.ts":{"bytesInOutput":130},"packages/common/crypto/src/validator.ts":{"bytesInOutput":238},"packages/common/crypto/src/verify.ts":{"bytesInOutput":405},"packages/common/crypto/src/uuid.ts":{"bytesInOutput":62}},"bytes":3535}}}
@@ -1,3 +0,0 @@
1
- export declare const subtleCrypto: SubtleCrypto;
2
- export declare const webcrypto: Crypto;
3
- //# sourceMappingURL=subtle.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"subtle.d.ts","sourceRoot":"","sources":["../../../../src/browser/subtle.ts"],"names":[],"mappings":"AAMA,eAAO,MAAM,YAAY,cAAgB,CAAC;AAE1C,eAAO,MAAM,SAAS,QAAS,CAAC"}
@@ -1,4 +0,0 @@
1
- import * as nodeCrypto from 'node:crypto';
2
- export declare const subtleCrypto: nodeCrypto.webcrypto.SubtleCrypto;
3
- export declare const webcrypto: nodeCrypto.webcrypto.Crypto;
4
- //# sourceMappingURL=subtle.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"subtle.d.ts","sourceRoot":"","sources":["../../../src/subtle.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,UAAU,MAAM,aAAa,CAAC;AAE1C,eAAO,MAAM,YAAY,mCAA8B,CAAC;AAExD,eAAO,MAAM,SAAS,6BAAuB,CAAC"}
@@ -1,11 +0,0 @@
1
- //
2
- // Copyright 2024 DXOS.org
3
- //
4
-
5
- export {};
6
-
7
- export const verify = () => {
8
- throw new Error('hypercore-crypto is not available on this platform');
9
- };
10
-
11
- export default {};
package/src/shims.d.ts DELETED
@@ -1,6 +0,0 @@
1
- //
2
- // Copyright 2024 DXOS.org
3
- //
4
-
5
- // https://nodejs.org/api/packages.html#imports
6
- declare module '#hypercore-crypto';
File without changes