Sha256: 29e7352366dba275d6146b94a486c136579981ad1a75be3358abf44d669241aa
Contents?: true
Size: 1.12 KB
Versions: 62
Compression:
Stored size: 1.12 KB
Contents
var rng = require('./rng') function error () { var m = [].slice.call(arguments).join(' ') throw new Error([ m, 'we accept pull requests', 'http://github.com/dominictarr/crypto-browserify' ].join('\n')) } exports.createHash = require('./create-hash') exports.createHmac = require('./create-hmac') exports.randomBytes = function(size, callback) { if (callback && callback.call) { try { callback.call(this, undefined, new Buffer(rng(size))) } catch (err) { callback(err) } } else { return new Buffer(rng(size)) } } function each(a, f) { for(var i in a) f(a[i], i) } exports.getHashes = function () { return ['sha1', 'sha256', 'sha512', 'md5', 'rmd160'] } var p = require('./pbkdf2')(exports) exports.pbkdf2 = p.pbkdf2 exports.pbkdf2Sync = p.pbkdf2Sync require('browserify-aes/inject')(exports, module.exports); // the least I can do is make error messages for the rest of the node.js/crypto api. each(['createCredentials' , 'createSign' , 'createVerify' , 'createDiffieHellman' ], function (name) { exports[name] = function () { error('sorry,', name, 'is not implemented yet') } })
Version data entries
62 entries across 62 versions & 1 rubygems