=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== node-trust-webcrypto-0.9.2/src/algorithms/RegisteredAlgorithms.js-22- for (let key in this) { node-trust-webcrypto-0.9.2/src/algorithms/RegisteredAlgorithms.js:23: if (key.match(new RegExp(`^${algName}$`, 'i'))) { node-trust-webcrypto-0.9.2/src/algorithms/RegisteredAlgorithms.js-24- return key ############################################## node-trust-webcrypto-0.9.2/src/algorithms/SHA.js-68- } else { node-trust-webcrypto-0.9.2/src/algorithms/SHA.js:69: throw new OperationError(`${name} is not a supported algorithm`) node-trust-webcrypto-0.9.2/src/algorithms/SHA.js-70- } ############################################## node-trust-webcrypto-0.9.2/src/errors/CurrentlyNotSupportedError.js-11- super() node-trust-webcrypto-0.9.2/src/errors/CurrentlyNotSupportedError.js:12: this.message = `Currently '${format}' is not a supported format. Please use '${available}' in the interim.` node-trust-webcrypto-0.9.2/src/errors/CurrentlyNotSupportedError.js-13- } ############################################## node-trust-webcrypto-0.9.2/src/errors/KeyFormatNotSupportedError.js-11- super() node-trust-webcrypto-0.9.2/src/errors/KeyFormatNotSupportedError.js:12: this.message = `${format} is not a supported key format` node-trust-webcrypto-0.9.2/src/errors/KeyFormatNotSupportedError.js-13- } ############################################## node-trust-webcrypto-0.9.2/src/errors/NotSupportedError.js-6- super() node-trust-webcrypto-0.9.2/src/errors/NotSupportedError.js:7: this.message = `${alg} is not a supported algorithm` node-trust-webcrypto-0.9.2/src/errors/NotSupportedError.js-8- } ############################################## node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-49-const ECDSATest = ({ ECPrivateKey, ECPublicKey, ECPrivatePem, ECPublicPem }, eccrv, echash) => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js:50: describe(`ECDSA ${eccrv}`, () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-51- /** ############################################## node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-338- node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js:339: describe(`private ${eccrv} key`, () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-340- let key ############################################## node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-366- node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js:367: describe(`public ${eccrv} key`, () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-368- let key ############################################## node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-428- describe('with "jwk" format', () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js:429: describe(`${eccrv} curve`, () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-430- let jwk ############################################## node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-443- }) node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js:444: it(`should set "crv" to "${eccrv}"`, () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-445- jwk.crv.should.equal(eccrv) ############################################## node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-450- describe('with "raw" format', () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js:451: describe(`${eccrv} curve`, () => { node-trust-webcrypto-0.9.2/test/algorithms/ECDSASpec.js-452- let raw, key ############################################## node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-49-const ECDSATest = ({ ECPrivateKey, ECPublicKey, ECPrivatePem, ECPublicPem }, eccrv, echash) => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js:50: describe(`ECDSA ${eccrv}`, () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-51- /** ############################################## node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-338- node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js:339: describe(`private ${eccrv} key`, () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-340- let key ############################################## node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-366- node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js:367: describe(`public ${eccrv} key`, () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-368- let key ############################################## node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-428- describe('with "jwk" format', () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js:429: describe(`${eccrv} curve`, () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-430- let jwk ############################################## node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-443- }) node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js:444: it(`should set "crv" to "${eccrv}"`, () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-445- jwk.crv.should.equal(eccrv) ############################################## node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-450- describe('with "raw" format', () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js:451: describe(`${eccrv} curve`, () => { node-trust-webcrypto-0.9.2/.pc/2002_mocha.patch/test/algorithms/ECDSASpec.js-452- let raw, key