From 9fb022f2f38728e2177780fe5879dc2639d51587 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ant=C3=B3nio=20Conselheiro?= Date: Wed, 14 Feb 2024 06:19:56 -0300 Subject: [PATCH] =?UTF-8?q?removendo=20testes=20que=20faziam=20compara?= =?UTF-8?q?=C3=A7=C3=A3o=20com=20encrypted=20uris=20gerados=20pelo=20crypt?= =?UTF-8?q?ojs=20pois=20acredito=20que=20usam=20MD5=20como=20gerador=20de?= =?UTF-8?q?=20hash=20padr=C3=A3o=20para=20KDF,=20e=20MD5=20n=C3=A3o=20?= =?UTF-8?q?=C3=A9=20suportado=20pela=20biblioteca=20@noble/hashes,=20uma?= =?UTF-8?q?=20acredito=20SHA2seja=20por56=20=C3=A9=20considerado=20m=20pel?= =?UTF-8?q?a=20@noble/ciphers,=20a=20gera=C3=A7=C3=A3o=20de=20hashs=20de?= =?UTF-8?q?=20KDF=20nela=20=C3=A9=20feita=20com=20SHA256?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../test-report/result.js | 2 +- .../test-report/result.js | 2 +- packages/ciphers/aes.test.ts | 10 ---------- packages/ciphers/hashes/index.ts | 13 +------------ packages/ciphers/hashes/keccak_224.ts | 4 ---- packages/ciphers/hashes/keccak_256.ts | 4 ---- packages/ciphers/hashes/keccak_384.ts | 5 ----- packages/ciphers/hashes/keccak_512.ts | 5 ----- packages/ciphers/hashes/sha384.ts | 4 ---- packages/ciphers/hashes/sha3_224.ts | 4 ---- packages/ciphers/hashes/sha3_256.ts | 4 ---- packages/ciphers/hashes/sha3_384.ts | 4 ---- packages/ciphers/hashes/sha3_512.ts | 4 ---- packages/ciphers/hashes/sha512.ts | 4 ---- packages/ciphers/hashes/sha512_256.ts | 4 ---- 15 files changed, 3 insertions(+), 70 deletions(-) delete mode 100644 packages/ciphers/hashes/keccak_224.ts delete mode 100644 packages/ciphers/hashes/keccak_256.ts delete mode 100644 packages/ciphers/hashes/keccak_384.ts delete mode 100644 packages/ciphers/hashes/keccak_512.ts delete mode 100644 packages/ciphers/hashes/sha384.ts delete mode 100644 packages/ciphers/hashes/sha3_224.ts delete mode 100644 packages/ciphers/hashes/sha3_256.ts delete mode 100644 packages/ciphers/hashes/sha3_384.ts delete mode 100644 packages/ciphers/hashes/sha3_512.ts delete mode 100644 packages/ciphers/hashes/sha512.ts delete mode 100644 packages/ciphers/hashes/sha512_256.ts diff --git a/docs/ciphers/jest-html-reporters-attach/test-report/result.js b/docs/ciphers/jest-html-reporters-attach/test-report/result.js index 052d009..864a0b5 100644 --- a/docs/ciphers/jest-html-reporters-attach/test-report/result.js +++ b/docs/ciphers/jest-html-reporters-attach/test-report/result.js @@ -1 +1 @@ -window.jest_html_reporters_callback__({"numFailedTestSuites":2,"numFailedTests":2,"numPassedTestSuites":1,"numPassedTests":8,"numPendingTestSuites":0,"numPendingTests":22,"numRuntimeErrorTestSuites":0,"numTodoTests":0,"numTotalTestSuites":3,"numTotalTests":32,"startTime":1707825745814,"success":false,"testResults":[{"numFailingTests":1,"numPassingTests":0,"numPendingTests":12,"numTodoTests":0,"perfStats":{"end":1707825755735,"runtime":9037,"slow":true,"start":1707825746698},"testFilePath":"/encrypted-uri/packages/ciphers/kdf.test.ts","failureMessage":"\u001b[1m\u001b[31m \u001b[1m● \u001b[22m\u001b[1mkdf failure flow › [1] overriding kdf config with wrong default values\u001b[39m\u001b[22m\n\n \u001b[2mexpect(\u001b[22m\u001b[31mreceived\u001b[39m\u001b[2m).\u001b[22mnot\u001b[2m.\u001b[22mtoEqual\u001b[2m(\u001b[22m\u001b[32mexpected\u001b[39m\u001b[2m) // deep equality\u001b[22m\n\n Expected: not \u001b[32m\"mensagem secreta, favor não ler em voz alta\"\u001b[39m\n\u001b[2m\u001b[22m\n\u001b[2m \u001b[0m \u001b[90m 256 |\u001b[39m derivateKeyLength\u001b[33m:\u001b[39m \u001b[35m32\u001b[39m\u001b[0m\u001b[22m\n\u001b[2m \u001b[0m \u001b[90m 257 |\u001b[39m })\u001b[33m;\u001b[39m\u001b[0m\u001b[22m\n\u001b[2m \u001b[0m\u001b[31m\u001b[1m>\u001b[22m\u001b[2m\u001b[39m\u001b[90m 258 |\u001b[39m expect(decrypted)\u001b[33m.\u001b[39mnot\u001b[33m.\u001b[39mtoEqual(originalMessage)\u001b[33m;\u001b[39m\u001b[0m\u001b[22m\n\u001b[2m \u001b[0m \u001b[90m |\u001b[39m \u001b[31m\u001b[1m^\u001b[22m\u001b[2m\u001b[39m\u001b[0m\u001b[22m\n\u001b[2m \u001b[0m \u001b[90m 259 |\u001b[39m })\u001b[33m;\u001b[39m\u001b[0m\u001b[22m\n\u001b[2m \u001b[0m \u001b[90m 260 |\u001b[39m })\u001b[33m;\u001b[39m\u001b[0m\u001b[22m\n\u001b[2m\u001b[22m\n\u001b[2m \u001b[2mat Object. (\u001b[22m\u001b[2m\u001b[0m\u001b[36mkdf.test.ts\u001b[39m\u001b[0m\u001b[2m:258:27)\u001b[22m\u001b[2m\u001b[22m\n","testResults":[{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [2] kdf include all parameters including default","status":"pending","title":"[2] kdf include all parameters including default"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [3] kdf with hasher sha512","status":"pending","title":"[3] kdf with hasher sha512"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [4] kdf with hasher sha512_256","status":"pending","title":"[4] kdf with hasher sha512_256"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [5] kdf with hasher sha384","status":"pending","title":"[5] kdf with hasher sha384"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [6] kdf with hasher sha3_512","status":"pending","title":"[6] kdf with hasher sha3_512"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [7] kdf with hasher sha3_384","status":"pending","title":"[7] kdf with hasher sha3_384"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [8] kdf with hasher sha3_256","status":"pending","title":"[8] kdf with hasher sha3_256"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [9] kdf with hasher sha3_224","status":"pending","title":"[9] kdf with hasher sha3_224"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [10] kdf with hasher keccak_512","status":"pending","title":"[10] kdf with hasher keccak_512"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [11] kdf with hasher keccak_384","status":"pending","title":"[11] kdf with hasher keccak_384"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [12] kdf with hasher keccak_256","status":"pending","title":"[12] kdf with hasher keccak_256"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [13] kdf with hasher keccak_224","status":"pending","title":"[13] kdf with hasher keccak_224"},{"ancestorTitles":["kdf failure flow"],"duration":85,"failureMessages":["Error: \u001b[2mexpect(\u001b[22m\u001b[31mreceived\u001b[39m\u001b[2m).\u001b[22mnot\u001b[2m.\u001b[22mtoEqual\u001b[2m(\u001b[22m\u001b[32mexpected\u001b[39m\u001b[2m) // deep equality\u001b[22m\n\nExpected: not \u001b[32m\"mensagem secreta, favor não ler em voz alta\"\u001b[39m\n\n at Object. (/encrypted-uri/packages/ciphers/kdf.test.ts:258:27)"],"fullName":"kdf failure flow [1] overriding kdf config with wrong default values","status":"failed","title":"[1] overriding kdf config with wrong default values"}]},{"numFailingTests":1,"numPassingTests":5,"numPendingTests":0,"numTodoTests":0,"perfStats":{"end":1707825756082,"runtime":9396,"slow":true,"start":1707825746686},"testFilePath":"/encrypted-uri/packages/ciphers/aes.test.ts","failureMessage":"\u001b[1m\u001b[31m \u001b[1m● \u001b[22m\u001b[1msuccess flow aes › cbc generated from other implementation with the same algorithm type and params\u001b[39m\u001b[22m\n\n OperationError: The operation failed for an operation-specific reason\n\u001b[2m\u001b[22m\n\u001b[2m\u001b[22m\n","testResults":[{"ancestorTitles":["success flow aes"],"duration":103,"failureMessages":[],"fullName":"success flow aes cbc","status":"passed","title":"cbc"},{"ancestorTitles":["success flow aes"],"duration":6,"failureMessages":["OperationError: The operation failed for an operation-specific reason\n at new DOMException (node:internal/per_context/domexception:53:5)\n at __node_internal_ (node:internal/util:695:10)\n at AESCipherJob.onDone (node:internal/crypto/util:420:19)"],"fullName":"success flow aes cbc generated from other implementation with the same algorithm type and params","status":"failed","title":"cbc generated from other implementation with the same algorithm type and params"},{"ancestorTitles":["success flow aes"],"duration":13,"failureMessages":[],"fullName":"success flow aes ctr","status":"passed","title":"ctr"},{"ancestorTitles":["success flow aes"],"duration":13,"failureMessages":[],"fullName":"success flow aes ecb","status":"passed","title":"ecb"},{"ancestorTitles":["success flow aes"],"duration":12,"failureMessages":[],"fullName":"success flow aes gcm","status":"passed","title":"gcm"},{"ancestorTitles":["success flow aes"],"duration":19,"failureMessages":[],"fullName":"success flow aes siv","status":"passed","title":"siv"}]},{"numFailingTests":0,"numPassingTests":3,"numPendingTests":10,"numTodoTests":0,"perfStats":{"end":1707825756850,"runtime":10161,"slow":true,"start":1707825746689},"testFilePath":"/encrypted-uri/packages/ciphers/params.test.ts","failureMessage":null,"testResults":[{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [3] kdf with hasher sha512","status":"pending","title":"[3] kdf with hasher sha512"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [4] kdf with hasher sha512_256","status":"pending","title":"[4] kdf with hasher sha512_256"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [5] kdf with hasher sha384","status":"pending","title":"[5] kdf with hasher sha384"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [6] kdf with hasher sha3_512","status":"pending","title":"[6] kdf with hasher sha3_512"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [7] kdf with hasher sha3_384","status":"pending","title":"[7] kdf with hasher sha3_384"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [8] kdf with hasher sha3_256","status":"pending","title":"[8] kdf with hasher sha3_256"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [9] kdf with hasher sha3_224","status":"pending","title":"[9] kdf with hasher sha3_224"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [10] kdf with hasher keccak_512","status":"pending","title":"[10] kdf with hasher keccak_512"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [11] kdf with hasher keccak_384","status":"pending","title":"[11] kdf with hasher keccak_384"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [12] kdf with hasher keccak_256","status":"pending","title":"[12] kdf with hasher keccak_256"},{"ancestorTitles":["checking if params are correctly encoded"],"duration":57,"failureMessages":[],"fullName":"checking if params are correctly encoded [1] overriding default values in decrypt","status":"passed","title":"[1] overriding default values in decrypt"},{"ancestorTitles":["checking if params are correctly encoded"],"duration":17,"failureMessages":[],"fullName":"checking if params are correctly encoded [2] kdf include all parameters including default","status":"passed","title":"[2] kdf include all parameters including default"},{"ancestorTitles":["checking if params are correctly encoded"],"duration":9,"failureMessages":[],"fullName":"checking if params are correctly encoded [3] kdf with algorithm not set","status":"passed","title":"[3] kdf with algorithm not set"}]}],"config":{"bail":0,"changedFilesWithAncestor":false,"ci":false,"collectCoverage":false,"collectCoverageFrom":[],"coverageDirectory":"/encrypted-uri/packages/ciphers/coverage","coverageProvider":"babel","coverageReporters":["json","text","lcov","clover"],"detectLeaks":false,"detectOpenHandles":false,"errorOnDeprecated":false,"expand":false,"findRelatedTests":false,"forceExit":false,"json":false,"lastCommit":false,"listTests":false,"logHeapUsage":false,"maxConcurrency":5,"maxWorkers":7,"noStackTrace":false,"nonFlagArgs":[],"notify":false,"notifyMode":"failure-change","onlyChanged":false,"onlyFailures":false,"openHandlesTimeout":1000,"passWithNoTests":false,"projects":[],"reporters":[["default",{}],["/encrypted-uri/packages/ciphers/node_modules/jest-html-reporters/index.js",{"publicPath":"../../docs/ciphers","filename":"test-report.html","expand":true}]],"rootDir":"/encrypted-uri/packages/ciphers","runTestsByPath":false,"seed":-444294862,"skipFilter":false,"snapshotFormat":{"escapeString":false,"printBasicPrototype":false},"testFailureExitCode":1,"testPathPattern":"","testSequencer":"/encrypted-uri/packages/ciphers/node_modules/@jest/test-sequencer/build/index.js","updateSnapshot":"new","useStderr":false,"watch":false,"watchAll":false,"watchman":true,"workerThreads":false},"endTime":1707825756965,"_reporterOptions":{"publicPath":"../../docs/ciphers","filename":"test-report.html","expand":true,"pageTitle":"","hideIcon":false,"testCommand":"","openReport":false,"failureMessageOnly":0,"enableMergeData":false,"dataMergeLevel":1,"inlineSource":false,"urlForTestFiles":"","darkTheme":false,"includeConsoleLog":false,"stripSkippedTest":false},"logInfoMapping":{},"attachInfos":{}}) \ No newline at end of file +window.jest_html_reporters_callback__({"numFailedTestSuites":0,"numFailedTests":0,"numPassedTestSuites":2,"numPassedTests":8,"numPendingTestSuites":1,"numPendingTests":22,"numRuntimeErrorTestSuites":0,"numTodoTests":0,"numTotalTestSuites":3,"numTotalTests":30,"startTime":1707902187083,"success":false,"testResults":[{"numFailingTests":0,"numPassingTests":0,"numPendingTests":12,"numTodoTests":0,"perfStats":{"end":1707902195697,"runtime":7838,"slow":true,"start":1707902187859},"testFilePath":"/encrypted-uri/packages/ciphers/kdf.test.ts","failureMessage":null,"testResults":[{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [2] kdf include all parameters including default","status":"pending","title":"[2] kdf include all parameters including default"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [3] kdf with hasher sha512","status":"pending","title":"[3] kdf with hasher sha512"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [4] kdf with hasher sha512_256","status":"pending","title":"[4] kdf with hasher sha512_256"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [5] kdf with hasher sha384","status":"pending","title":"[5] kdf with hasher sha384"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [6] kdf with hasher sha3_512","status":"pending","title":"[6] kdf with hasher sha3_512"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [7] kdf with hasher sha3_384","status":"pending","title":"[7] kdf with hasher sha3_384"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [8] kdf with hasher sha3_256","status":"pending","title":"[8] kdf with hasher sha3_256"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [9] kdf with hasher sha3_224","status":"pending","title":"[9] kdf with hasher sha3_224"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [10] kdf with hasher keccak_512","status":"pending","title":"[10] kdf with hasher keccak_512"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [11] kdf with hasher keccak_384","status":"pending","title":"[11] kdf with hasher keccak_384"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [12] kdf with hasher keccak_256","status":"pending","title":"[12] kdf with hasher keccak_256"},{"ancestorTitles":["kdf success flow"],"duration":null,"failureMessages":[],"fullName":"kdf success flow [13] kdf with hasher keccak_224","status":"pending","title":"[13] kdf with hasher keccak_224"}]},{"numFailingTests":0,"numPassingTests":3,"numPendingTests":10,"numTodoTests":0,"perfStats":{"end":1707902195881,"runtime":7991,"slow":true,"start":1707902187890},"testFilePath":"/encrypted-uri/packages/ciphers/params.test.ts","failureMessage":null,"testResults":[{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [3] kdf with hasher sha512","status":"pending","title":"[3] kdf with hasher sha512"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [4] kdf with hasher sha512_256","status":"pending","title":"[4] kdf with hasher sha512_256"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [5] kdf with hasher sha384","status":"pending","title":"[5] kdf with hasher sha384"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [6] kdf with hasher sha3_512","status":"pending","title":"[6] kdf with hasher sha3_512"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [7] kdf with hasher sha3_384","status":"pending","title":"[7] kdf with hasher sha3_384"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [8] kdf with hasher sha3_256","status":"pending","title":"[8] kdf with hasher sha3_256"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [9] kdf with hasher sha3_224","status":"pending","title":"[9] kdf with hasher sha3_224"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [10] kdf with hasher keccak_512","status":"pending","title":"[10] kdf with hasher keccak_512"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [11] kdf with hasher keccak_384","status":"pending","title":"[11] kdf with hasher keccak_384"},{"ancestorTitles":["hashing customization"],"duration":null,"failureMessages":[],"fullName":"hashing customization [12] kdf with hasher keccak_256","status":"pending","title":"[12] kdf with hasher keccak_256"},{"ancestorTitles":["checking if params are correctly encoded"],"duration":61,"failureMessages":[],"fullName":"checking if params are correctly encoded [1] overriding default values in decrypt","status":"passed","title":"[1] overriding default values in decrypt"},{"ancestorTitles":["checking if params are correctly encoded"],"duration":8,"failureMessages":[],"fullName":"checking if params are correctly encoded [2] kdf include all parameters including default","status":"passed","title":"[2] kdf include all parameters including default"},{"ancestorTitles":["checking if params are correctly encoded"],"duration":6,"failureMessages":[],"fullName":"checking if params are correctly encoded [3] kdf with algorithm not set","status":"passed","title":"[3] kdf with algorithm not set"}]},{"numFailingTests":0,"numPassingTests":5,"numPendingTests":0,"numTodoTests":0,"perfStats":{"end":1707902196493,"runtime":8643,"slow":true,"start":1707902187850},"testFilePath":"/encrypted-uri/packages/ciphers/aes.test.ts","failureMessage":null,"testResults":[{"ancestorTitles":["success flow aes"],"duration":53,"failureMessages":[],"fullName":"success flow aes cbc","status":"passed","title":"cbc"},{"ancestorTitles":["success flow aes"],"duration":10,"failureMessages":[],"fullName":"success flow aes ctr","status":"passed","title":"ctr"},{"ancestorTitles":["success flow aes"],"duration":10,"failureMessages":[],"fullName":"success flow aes ecb","status":"passed","title":"ecb"},{"ancestorTitles":["success flow aes"],"duration":10,"failureMessages":[],"fullName":"success flow aes gcm","status":"passed","title":"gcm"},{"ancestorTitles":["success flow aes"],"duration":14,"failureMessages":[],"fullName":"success flow aes siv","status":"passed","title":"siv"}]}],"config":{"bail":0,"changedFilesWithAncestor":false,"ci":false,"collectCoverage":false,"collectCoverageFrom":[],"coverageDirectory":"/encrypted-uri/packages/ciphers/coverage","coverageProvider":"babel","coverageReporters":["json","text","lcov","clover"],"detectLeaks":false,"detectOpenHandles":false,"errorOnDeprecated":false,"expand":false,"findRelatedTests":false,"forceExit":false,"json":false,"lastCommit":false,"listTests":false,"logHeapUsage":false,"maxConcurrency":5,"maxWorkers":7,"noStackTrace":false,"nonFlagArgs":[],"notify":false,"notifyMode":"failure-change","onlyChanged":false,"onlyFailures":false,"openHandlesTimeout":1000,"passWithNoTests":false,"projects":[],"reporters":[["default",{}],["/encrypted-uri/packages/ciphers/node_modules/jest-html-reporters/index.js",{"publicPath":"../../docs/ciphers","filename":"test-report.html","expand":true}]],"rootDir":"/encrypted-uri/packages/ciphers","runTestsByPath":false,"seed":140700023,"skipFilter":false,"snapshotFormat":{"escapeString":false,"printBasicPrototype":false},"testFailureExitCode":1,"testPathPattern":"","testSequencer":"/encrypted-uri/packages/ciphers/node_modules/@jest/test-sequencer/build/index.js","updateSnapshot":"new","useStderr":false,"watch":false,"watchAll":false,"watchman":true,"workerThreads":false},"endTime":1707902196615,"_reporterOptions":{"publicPath":"../../docs/ciphers","filename":"test-report.html","expand":true,"pageTitle":"","hideIcon":false,"testCommand":"","openReport":false,"failureMessageOnly":0,"enableMergeData":false,"dataMergeLevel":1,"inlineSource":false,"urlForTestFiles":"","darkTheme":false,"includeConsoleLog":false,"stripSkippedTest":false},"logInfoMapping":{},"attachInfos":{}}) \ No newline at end of file diff --git a/docs/core/jest-html-reporters-attach/test-report/result.js b/docs/core/jest-html-reporters-attach/test-report/result.js index 89bdc28..b14708c 100644 --- a/docs/core/jest-html-reporters-attach/test-report/result.js +++ b/docs/core/jest-html-reporters-attach/test-report/result.js @@ -1 +1 @@ -window.jest_html_reporters_callback__({"numFailedTestSuites":0,"numFailedTests":0,"numPassedTestSuites":1,"numPassedTests":36,"numPendingTestSuites":0,"numPendingTests":0,"numRuntimeErrorTestSuites":0,"numTodoTests":0,"numTotalTestSuites":1,"numTotalTests":36,"startTime":1707825981360,"success":false,"testResults":[{"numFailingTests":0,"numPassingTests":36,"numPendingTests":0,"numTodoTests":0,"perfStats":{"end":1707825986940,"runtime":5379,"slow":true,"start":1707825981561},"testFilePath":"/encrypted-uri/packages/core/index.test.ts","failureMessage":null,"testResults":[{"ancestorTitles":["decode uri with default values"],"duration":11,"failureMessages":[],"fullName":"decode uri with default values [1] decode uri with default values not include","status":"passed","title":"[1] decode uri with default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":2,"failureMessages":[],"fullName":"decode uri with default values [2] decode uri with some default values not include","status":"passed","title":"[2] decode uri with some default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":1,"failureMessages":[],"fullName":"decode uri with default values [3] decode uri with some default values not include","status":"passed","title":"[3] decode uri with some default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":3,"failureMessages":[],"fullName":"decode uri with default values [4] decode uri with default values not include","status":"passed","title":"[4] decode uri with default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":3,"failureMessages":[],"fullName":"decode uri with default values [5] decode uri with some default values not include","status":"passed","title":"[5] decode uri with some default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":2,"failureMessages":[],"fullName":"decode uri with default values [6] decode uri with some default values not include","status":"passed","title":"[6] decode uri with some default values not include"},{"ancestorTitles":["decode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"decode uri with customized values [1] decode aes/gcm with customized values","status":"passed","title":"[1] decode aes/gcm with customized values"},{"ancestorTitles":["decode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"decode uri with customized values [2] decode salsa20 with customized values","status":"passed","title":"[2] decode salsa20 with customized values"},{"ancestorTitles":["decode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"decode uri with customized values [3] decode xchacha with customized values","status":"passed","title":"[3] decode xchacha with customized values"},{"ancestorTitles":["decode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"decode uri with customized values [4] decode chacha12 with customized values","status":"passed","title":"[4] decode chacha12 with customized values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [1] encode with default config with default values","status":"passed","title":"[1] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [2] encode with default config with default values","status":"passed","title":"[2] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [3] encode with default config with default values","status":"passed","title":"[3] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [4] encode with default config with default values","status":"passed","title":"[4] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [5] encode with default config with default values","status":"passed","title":"[5] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [6] encode with default config with default values","status":"passed","title":"[6] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [7] encode with default config with default values","status":"passed","title":"[7] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [8] encode with default config with default values","status":"passed","title":"[8] encode with default config with default values"},{"ancestorTitles":["encode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"encode uri with customized values [1] encode aes/gcm with customized values","status":"passed","title":"[1] encode aes/gcm with customized values"},{"ancestorTitles":["encode uri with customized values"],"duration":1,"failureMessages":[],"fullName":"encode uri with customized values [2] encode salsa20 with customized values","status":"passed","title":"[2] encode salsa20 with customized values"},{"ancestorTitles":["encode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"encode uri with customized values [3] encode xchacha with customized values","status":"passed","title":"[3] encode xchacha with customized values"},{"ancestorTitles":["encode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"encode uri with customized values [4] encode chacha12 with customized values","status":"passed","title":"[4] encode chacha12 with customized values"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [1] match valid encrypted uri","status":"passed","title":"[1] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [2] match valid encrypted uri","status":"passed","title":"[2] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":2,"failureMessages":[],"fullName":"uri matcher [3] match valid encrypted uri","status":"passed","title":"[3] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [4] match valid encrypted uri","status":"passed","title":"[4] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [5] match valid encrypted uri","status":"passed","title":"[5] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [6] match valid encrypted uri","status":"passed","title":"[6] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [7] match valid encrypted uri","status":"passed","title":"[7] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [8] match valid encrypted uri","status":"passed","title":"[8] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [9] match valid encrypted uri","status":"passed","title":"[9] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [10] match valid encrypted uri","status":"passed","title":"[10] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [11] match valid encrypted uri","status":"passed","title":"[11] match valid encrypted uri"},{"ancestorTitles":["EncryptedURI object"],"duration":1,"failureMessages":[],"fullName":"EncryptedURI object [1] match valid encrypted uri","status":"passed","title":"[1] match valid encrypted uri"},{"ancestorTitles":["EncryptedURI object"],"duration":4,"failureMessages":[],"fullName":"EncryptedURI object [2] EncryptedURI must run decrypt for custom algorithm","status":"passed","title":"[2] EncryptedURI must run decrypt for custom algorithm"},{"ancestorTitles":["EncryptedURI object"],"duration":2,"failureMessages":[],"fullName":"EncryptedURI object [3] EncryptedURI must run encrypt for custom algorithm","status":"passed","title":"[3] EncryptedURI must run encrypt for custom algorithm"}]}],"config":{"bail":0,"changedFilesWithAncestor":false,"ci":false,"collectCoverage":false,"collectCoverageFrom":[],"coverageDirectory":"/encrypted-uri/packages/core/coverage","coverageProvider":"babel","coverageReporters":["json","text","lcov","clover"],"detectLeaks":false,"detectOpenHandles":false,"errorOnDeprecated":false,"expand":false,"findRelatedTests":false,"forceExit":false,"json":false,"lastCommit":false,"listTests":false,"logHeapUsage":false,"maxConcurrency":5,"maxWorkers":7,"noStackTrace":false,"nonFlagArgs":[],"notify":false,"notifyMode":"failure-change","onlyChanged":false,"onlyFailures":false,"openHandlesTimeout":1000,"passWithNoTests":false,"projects":[],"reporters":[["default",{}],["/encrypted-uri/packages/core/node_modules/jest-html-reporters/index.js",{"publicPath":"../../docs/core","filename":"test-report.html","expand":true}]],"rootDir":"/encrypted-uri/packages/core","runTestsByPath":false,"seed":-232361682,"skipFilter":false,"snapshotFormat":{"escapeString":false,"printBasicPrototype":false},"testFailureExitCode":1,"testPathPattern":"","testSequencer":"/encrypted-uri/packages/core/node_modules/@jest/test-sequencer/build/index.js","updateSnapshot":"new","useStderr":false,"verbose":true,"watch":false,"watchAll":false,"watchman":true,"workerThreads":false},"endTime":1707825986963,"_reporterOptions":{"publicPath":"../../docs/core","filename":"test-report.html","expand":true,"pageTitle":"","hideIcon":false,"testCommand":"","openReport":false,"failureMessageOnly":0,"enableMergeData":false,"dataMergeLevel":1,"inlineSource":false,"urlForTestFiles":"","darkTheme":false,"includeConsoleLog":false,"stripSkippedTest":false},"logInfoMapping":{},"attachInfos":{}}) \ No newline at end of file +window.jest_html_reporters_callback__({"numFailedTestSuites":0,"numFailedTests":0,"numPassedTestSuites":1,"numPassedTests":36,"numPendingTestSuites":0,"numPendingTests":0,"numRuntimeErrorTestSuites":0,"numTodoTests":0,"numTotalTestSuites":1,"numTotalTests":36,"startTime":1707902179345,"success":false,"testResults":[{"numFailingTests":0,"numPassingTests":36,"numPendingTests":0,"numTodoTests":0,"perfStats":{"end":1707902184052,"runtime":4532,"slow":false,"start":1707902179520},"testFilePath":"/encrypted-uri/packages/core/index.test.ts","failureMessage":null,"testResults":[{"ancestorTitles":["decode uri with default values"],"duration":8,"failureMessages":[],"fullName":"decode uri with default values [1] decode uri with default values not include","status":"passed","title":"[1] decode uri with default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":2,"failureMessages":[],"fullName":"decode uri with default values [2] decode uri with some default values not include","status":"passed","title":"[2] decode uri with some default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":1,"failureMessages":[],"fullName":"decode uri with default values [3] decode uri with some default values not include","status":"passed","title":"[3] decode uri with some default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":3,"failureMessages":[],"fullName":"decode uri with default values [4] decode uri with default values not include","status":"passed","title":"[4] decode uri with default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":3,"failureMessages":[],"fullName":"decode uri with default values [5] decode uri with some default values not include","status":"passed","title":"[5] decode uri with some default values not include"},{"ancestorTitles":["decode uri with default values"],"duration":1,"failureMessages":[],"fullName":"decode uri with default values [6] decode uri with some default values not include","status":"passed","title":"[6] decode uri with some default values not include"},{"ancestorTitles":["decode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"decode uri with customized values [1] decode aes/gcm with customized values","status":"passed","title":"[1] decode aes/gcm with customized values"},{"ancestorTitles":["decode uri with customized values"],"duration":1,"failureMessages":[],"fullName":"decode uri with customized values [2] decode salsa20 with customized values","status":"passed","title":"[2] decode salsa20 with customized values"},{"ancestorTitles":["decode uri with customized values"],"duration":1,"failureMessages":[],"fullName":"decode uri with customized values [3] decode xchacha with customized values","status":"passed","title":"[3] decode xchacha with customized values"},{"ancestorTitles":["decode uri with customized values"],"duration":2,"failureMessages":[],"fullName":"decode uri with customized values [4] decode chacha12 with customized values","status":"passed","title":"[4] decode chacha12 with customized values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [1] encode with default config with default values","status":"passed","title":"[1] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [2] encode with default config with default values","status":"passed","title":"[2] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [3] encode with default config with default values","status":"passed","title":"[3] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [4] encode with default config with default values","status":"passed","title":"[4] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [5] encode with default config with default values","status":"passed","title":"[5] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [6] encode with default config with default values","status":"passed","title":"[6] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":1,"failureMessages":[],"fullName":"encode uri with configs using default values [7] encode with default config with default values","status":"passed","title":"[7] encode with default config with default values"},{"ancestorTitles":["encode uri with configs using default values"],"duration":2,"failureMessages":[],"fullName":"encode uri with configs using default values [8] encode with default config with default values","status":"passed","title":"[8] encode with default config with default values"},{"ancestorTitles":["encode uri with customized values"],"duration":1,"failureMessages":[],"fullName":"encode uri with customized values [1] encode aes/gcm with customized values","status":"passed","title":"[1] encode aes/gcm with customized values"},{"ancestorTitles":["encode uri with customized values"],"duration":0,"failureMessages":[],"fullName":"encode uri with customized values [2] encode salsa20 with customized values","status":"passed","title":"[2] encode salsa20 with customized values"},{"ancestorTitles":["encode uri with customized values"],"duration":1,"failureMessages":[],"fullName":"encode uri with customized values [3] encode xchacha with customized values","status":"passed","title":"[3] encode xchacha with customized values"},{"ancestorTitles":["encode uri with customized values"],"duration":1,"failureMessages":[],"fullName":"encode uri with customized values [4] encode chacha12 with customized values","status":"passed","title":"[4] encode chacha12 with customized values"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [1] match valid encrypted uri","status":"passed","title":"[1] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [2] match valid encrypted uri","status":"passed","title":"[2] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":2,"failureMessages":[],"fullName":"uri matcher [3] match valid encrypted uri","status":"passed","title":"[3] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [4] match valid encrypted uri","status":"passed","title":"[4] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [5] match valid encrypted uri","status":"passed","title":"[5] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [6] match valid encrypted uri","status":"passed","title":"[6] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":2,"failureMessages":[],"fullName":"uri matcher [7] match valid encrypted uri","status":"passed","title":"[7] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [8] match valid encrypted uri","status":"passed","title":"[8] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [9] match valid encrypted uri","status":"passed","title":"[9] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [10] match valid encrypted uri","status":"passed","title":"[10] match valid encrypted uri"},{"ancestorTitles":["uri matcher"],"duration":1,"failureMessages":[],"fullName":"uri matcher [11] match valid encrypted uri","status":"passed","title":"[11] match valid encrypted uri"},{"ancestorTitles":["EncryptedURI object"],"duration":1,"failureMessages":[],"fullName":"EncryptedURI object [1] match valid encrypted uri","status":"passed","title":"[1] match valid encrypted uri"},{"ancestorTitles":["EncryptedURI object"],"duration":3,"failureMessages":[],"fullName":"EncryptedURI object [2] EncryptedURI must run decrypt for custom algorithm","status":"passed","title":"[2] EncryptedURI must run decrypt for custom algorithm"},{"ancestorTitles":["EncryptedURI object"],"duration":1,"failureMessages":[],"fullName":"EncryptedURI object [3] EncryptedURI must run encrypt for custom algorithm","status":"passed","title":"[3] EncryptedURI must run encrypt for custom algorithm"}]}],"config":{"bail":0,"changedFilesWithAncestor":false,"ci":false,"collectCoverage":false,"collectCoverageFrom":[],"coverageDirectory":"/encrypted-uri/packages/core/coverage","coverageProvider":"babel","coverageReporters":["json","text","lcov","clover"],"detectLeaks":false,"detectOpenHandles":false,"errorOnDeprecated":false,"expand":false,"findRelatedTests":false,"forceExit":false,"json":false,"lastCommit":false,"listTests":false,"logHeapUsage":false,"maxConcurrency":5,"maxWorkers":7,"noStackTrace":false,"nonFlagArgs":[],"notify":false,"notifyMode":"failure-change","onlyChanged":false,"onlyFailures":false,"openHandlesTimeout":1000,"passWithNoTests":false,"projects":[],"reporters":[["default",{}],["/encrypted-uri/packages/core/node_modules/jest-html-reporters/index.js",{"publicPath":"../../docs/core","filename":"test-report.html","expand":true}]],"rootDir":"/encrypted-uri/packages/core","runTestsByPath":false,"seed":1224921832,"skipFilter":false,"snapshotFormat":{"escapeString":false,"printBasicPrototype":false},"testFailureExitCode":1,"testPathPattern":"","testSequencer":"/encrypted-uri/packages/core/node_modules/@jest/test-sequencer/build/index.js","updateSnapshot":"new","useStderr":false,"verbose":true,"watch":false,"watchAll":false,"watchman":true,"workerThreads":false},"endTime":1707902184081,"_reporterOptions":{"publicPath":"../../docs/core","filename":"test-report.html","expand":true,"pageTitle":"","hideIcon":false,"testCommand":"","openReport":false,"failureMessageOnly":0,"enableMergeData":false,"dataMergeLevel":1,"inlineSource":false,"urlForTestFiles":"","darkTheme":false,"includeConsoleLog":false,"stripSkippedTest":false},"logInfoMapping":{},"attachInfos":{}}) \ No newline at end of file diff --git a/packages/ciphers/aes.test.ts b/packages/ciphers/aes.test.ts index 53b5762..db539fc 100755 --- a/packages/ciphers/aes.test.ts +++ b/packages/ciphers/aes.test.ts @@ -18,16 +18,6 @@ describe('success flow aes', () => { expect(decoded).toEqual(originalMessage); }); - it('cbc generated from other implementation with the same algorithm type and params', async () => { - const decoded = await EncryptedURI.decrypt('encrypted:aes/cbc?iv=1dc8d28370372579a75feac6b5bf5290&c=1000&dklen=8&hasher=md5;U2FsdGVkX18K2mCM3jqJz9SSPC2Rss61NOk4JWeG5IE=', 'teste123'); - expect(decoded).toEqual('teste123'); - }); - - it('cbc generated from other implementation with the same algorithm type and params', async () => { - const decoded = await EncryptedURI.decrypt('encrypted:aes/cbc?iv=9d668dee3bccfd9d3d5fb786aab11894&c=1000&dklen=8&hasher=md5;U2FsdGVkX182g9bXg4UB/MsE9Dlz4lJcGC7WW4WGAVc=', 'exemplo'); - expect(decoded).toEqual('exemplo'); - }); - it('ctr', async () => { const originalMessage = 'mensagem secreta, favor não ler em voz alta'; const password = 'senha123'; diff --git a/packages/ciphers/hashes/index.ts b/packages/ciphers/hashes/index.ts index 844373c..4dc1e44 100644 --- a/packages/ciphers/hashes/index.ts +++ b/packages/ciphers/hashes/index.ts @@ -1,12 +1 @@ -export * from './keccak_224'; -export * from './keccak_256'; -export * from './keccak_384'; -export * from './keccak_512'; -export * from './sha256'; -export * from './sha384'; -export * from './sha3_224'; -export * from './sha3_256'; -export * from './sha3_384'; -export * from './sha3_512'; -export * from './sha512'; -export * from './sha512_256'; +export * from './sha256'; \ No newline at end of file diff --git a/packages/ciphers/hashes/keccak_224.ts b/packages/ciphers/hashes/keccak_224.ts deleted file mode 100644 index 17a7560..0000000 --- a/packages/ciphers/hashes/keccak_224.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { keccak_224 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('keccak_224', keccak_224); diff --git a/packages/ciphers/hashes/keccak_256.ts b/packages/ciphers/hashes/keccak_256.ts deleted file mode 100644 index 171ee77..0000000 --- a/packages/ciphers/hashes/keccak_256.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { keccak_256 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('keccak_256', keccak_256); diff --git a/packages/ciphers/hashes/keccak_384.ts b/packages/ciphers/hashes/keccak_384.ts deleted file mode 100644 index 22d0f56..0000000 --- a/packages/ciphers/hashes/keccak_384.ts +++ /dev/null @@ -1,5 +0,0 @@ -import { keccak_384 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('keccak_384', keccak_384); - diff --git a/packages/ciphers/hashes/keccak_512.ts b/packages/ciphers/hashes/keccak_512.ts deleted file mode 100644 index 5a72736..0000000 --- a/packages/ciphers/hashes/keccak_512.ts +++ /dev/null @@ -1,5 +0,0 @@ -import { keccak_512 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('keccak_512', keccak_512); - diff --git a/packages/ciphers/hashes/sha384.ts b/packages/ciphers/hashes/sha384.ts deleted file mode 100644 index 93fd6be..0000000 --- a/packages/ciphers/hashes/sha384.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha384 } from '@noble/hashes/sha512' -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha384', sha384); diff --git a/packages/ciphers/hashes/sha3_224.ts b/packages/ciphers/hashes/sha3_224.ts deleted file mode 100644 index 2cce5ea..0000000 --- a/packages/ciphers/hashes/sha3_224.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha3_224 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha3_224', sha3_224); diff --git a/packages/ciphers/hashes/sha3_256.ts b/packages/ciphers/hashes/sha3_256.ts deleted file mode 100644 index d38c1d4..0000000 --- a/packages/ciphers/hashes/sha3_256.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha3_256 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha3_256', sha3_256); diff --git a/packages/ciphers/hashes/sha3_384.ts b/packages/ciphers/hashes/sha3_384.ts deleted file mode 100644 index 6f7de5a..0000000 --- a/packages/ciphers/hashes/sha3_384.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha3_384 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha3_384', sha3_384); diff --git a/packages/ciphers/hashes/sha3_512.ts b/packages/ciphers/hashes/sha3_512.ts deleted file mode 100644 index 28decea..0000000 --- a/packages/ciphers/hashes/sha3_512.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha3_512 } from '@noble/hashes/sha3'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha3_512', sha3_512); diff --git a/packages/ciphers/hashes/sha512.ts b/packages/ciphers/hashes/sha512.ts deleted file mode 100644 index f907145..0000000 --- a/packages/ciphers/hashes/sha512.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha512 } from '@noble/hashes/sha512'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha512', sha512); diff --git a/packages/ciphers/hashes/sha512_256.ts b/packages/ciphers/hashes/sha512_256.ts deleted file mode 100644 index 66efa46..0000000 --- a/packages/ciphers/hashes/sha512_256.ts +++ /dev/null @@ -1,4 +0,0 @@ -import { sha512_256 } from '@noble/hashes/sha512'; -import { HashSupport } from './hash-support'; - -HashSupport.addSupport('sha512_256', sha512_256);