You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ Support from the community to continue maintaining and improving this module is
10
10
11
11
`@panva/hpke` has no dependencies and it exports tree-shakeable ESM.
12
12
13
-
## [API Reference](/docs/README.md)
13
+
## [API Reference](docs/README.md)
14
14
15
15
`@panva/hpke` is distributed via [npmjs.com](https://www.npmjs.com/package/@panva/hpke), [jsdelivr.com](https://www.jsdelivr.com/package/npm/@panva/hpke), and [github.com](https://github.com/panva/hpke).
For more advanced examples, including how to integrate external cryptographic libraries, see the [examples directory](/examples/README.md).
43
+
For more advanced examples, including how to integrate external cryptographic libraries, see the [examples directory](examples/README.md).
44
44
45
45
## Supported Runtimes
46
46
@@ -61,7 +61,7 @@ Please note that some suites may not be available depending on the runtime used.
61
61
62
62
Algorithm implementations exposed by this module are built on top of [Web Cryptography][] (and its extensions, e.g. [Secure Curves][], [Modern Algorithms][]). Runtimes implementing Web Cryptography are not required to support all of its algorithms and so not all algorithms are available in all runtimes.
63
63
64
-
This module is designed to be extensible, you can bring outside-built implementations of any KEM, KDF, or AEAD algorithm into any runtime by conforming to the respective interfaces ([KEM](/docs/interfaces/KEM.md), [KDF](/docs/interfaces/KDF.md), [AEAD](/docs/interfaces/AEAD.md)). This allows you to use alternative cryptographic libraries, native bindings, or specialized hardware implementations alongside the built-in Web Cryptography-based algorithms. See the [Noble Suite Example](./examples/noble-suite/README.md) for a demonstration of integrating external cryptographic libraries. Below are the algorithms built in (based on Web Cryptography) and their runtime support matrix.
64
+
This module is designed to be extensible, you can bring outside-built implementations of any KEM, KDF, or AEAD algorithm into any runtime by conforming to the respective interfaces ([KEM](docs/interfaces/KEM.md), [KDF](docs/interfaces/KDF.md), [AEAD](docs/interfaces/AEAD.md)). This allows you to use alternative cryptographic libraries, native bindings, or specialized hardware implementations alongside the built-in Web Cryptography-based algorithms. See the [Noble Suite Example](examples/noble-suite/README.md) for a demonstration of integrating external cryptographic libraries. Below are the algorithms built in (based on Web Cryptography) and their runtime support matrix.
65
65
66
66
### KEM
67
67
@@ -125,4 +125,4 @@ The algorithm implementations in `@panva/hpke` have been tested using test vecto
125
125
126
126
[^24.7]: Available in Node.js versions >= 24.7.0
127
127
128
-
[^noble]: Available through [extensibility](./examples/noble-suite/README.md)
0 commit comments