@@ -229,6 +229,7 @@ var require_file_command = __commonJS({
229229 };
230230 Object.defineProperty(exports, "__esModule", { value: true });
231231 exports.prepareKeyValueMessage = exports.issueFileCommand = void 0;
232+ var crypto = __importStar(__require("crypto"));
232233 var fs2 = __importStar(__require("fs"));
233234 var os3 = __importStar(__require("os"));
234235 var utils_1 = require_utils();
@@ -3677,11 +3678,11 @@ var require_util2 = __commonJS({
36773678 var assert = __require("assert");
36783679 var { isUint8Array } = __require("util/types");
36793680 var supportedHashes = [];
3680- var crypto2 ;
3681+ var crypto ;
36813682 try {
3682- crypto2 = __require("crypto");
3683+ crypto = __require("crypto");
36833684 const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
3684- supportedHashes = crypto2 .getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
3685+ supportedHashes = crypto .getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
36853686 } catch {
36863687 }
36873688 function responseURL(response) {
@@ -3946,7 +3947,7 @@ var require_util2 = __commonJS({
39463947 }
39473948 }
39483949 function bytesMatch(bytes, metadataList) {
3949- if (crypto2 === void 0) {
3950+ if (crypto === void 0) {
39503951 return true;
39513952 }
39523953 const parsedMetadata = parseMetadata(metadataList);
@@ -3961,7 +3962,7 @@ var require_util2 = __commonJS({
39613962 for (const item of metadata) {
39623963 const algorithm = item.algo;
39633964 const expectedValue = item.hash;
3964- let actualValue = crypto2 .createHash(algorithm).update(bytes).digest("base64");
3965+ let actualValue = crypto .createHash(algorithm).update(bytes).digest("base64");
39653966 if (actualValue[actualValue.length - 1] === "=") {
39663967 if (actualValue[actualValue.length - 2] === "=") {
39673968 actualValue = actualValue.slice(0, -2);
@@ -16098,9 +16099,9 @@ var require_connection = __commonJS({
1609816099 channels.open = diagnosticsChannel.channel("undici:websocket:open");
1609916100 channels.close = diagnosticsChannel.channel("undici:websocket:close");
1610016101 channels.socketError = diagnosticsChannel.channel("undici:websocket:socket_error");
16101- var crypto2 ;
16102+ var crypto ;
1610216103 try {
16103- crypto2 = __require("crypto");
16104+ crypto = __require("crypto");
1610416105 } catch {
1610516106 }
1610616107 function establishWebSocketConnection(url, protocols, ws, onEstablish, options) {
@@ -16119,7 +16120,7 @@ var require_connection = __commonJS({
1611916120 const headersList = new Headers(options.headers)[kHeadersList];
1612016121 request2.headersList = headersList;
1612116122 }
16122- const keyValue = crypto2 .randomBytes(16).toString("base64");
16123+ const keyValue = crypto .randomBytes(16).toString("base64");
1612316124 request2.headersList.append("sec-websocket-key", keyValue);
1612416125 request2.headersList.append("sec-websocket-version", "13");
1612516126 for (const protocol of protocols) {
@@ -16149,7 +16150,7 @@ var require_connection = __commonJS({
1614916150 return;
1615016151 }
1615116152 const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
16152- const digest = crypto2 .createHash("sha1").update(keyValue + uid).digest("base64");
16153+ const digest = crypto .createHash("sha1").update(keyValue + uid).digest("base64");
1615316154 if (secWSAccept !== digest) {
1615416155 failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
1615516156 return;
@@ -16229,15 +16230,15 @@ var require_frame = __commonJS({
1622916230 ""(exports, module) {
1623016231 "use strict";
1623116232 var { maxUnsigned16Bit } = require_constants5();
16232- var crypto2 ;
16233+ var crypto ;
1623316234 try {
16234- crypto2 = __require("crypto");
16235+ crypto = __require("crypto");
1623516236 } catch {
1623616237 }
1623716238 var WebsocketFrameSend = class {
1623816239 constructor(data) {
1623916240 this.frameData = data;
16240- this.maskKey = crypto2 .randomBytes(4);
16241+ this.maskKey = crypto .randomBytes(4);
1624116242 }
1624216243 createFrame(opcode) {
1624316244 var _a2;
@@ -31774,7 +31775,7 @@ var require_tmp = __commonJS({
3177431775 ""(exports, module) {
3177531776 var fs2 = __require("fs");
3177631777 var path4 = __require("path");
31777- var crypto2 = __require("crypto");
31778+ var crypto = __require("crypto");
3177831779 var osTmpDir = require_os_tmpdir();
3177931780 var _c = process.binding("constants");
3178031781 var tmpDir = osTmpDir();
@@ -31792,9 +31793,9 @@ var require_tmp = __commonJS({
3179231793 function _randomChars(howMany) {
3179331794 var value = [], rnd = null;
3179431795 try {
31795- rnd = crypto2 .randomBytes(howMany);
31796+ rnd = crypto .randomBytes(howMany);
3179631797 } catch (e) {
31797- rnd = crypto2 .pseudoRandomBytes(howMany);
31798+ rnd = crypto .pseudoRandomBytes(howMany);
3179831799 }
3179931800 for (var i = 0; i < howMany; i++) {
3180031801 value.push(RANDOM_CHARS[rnd[i] % RANDOM_CHARS.length]);
@@ -38279,11 +38280,11 @@ var require_util9 = __commonJS({
3827938280 var { isUint8Array } = __require("node:util/types");
3828038281 var { webidl } = require_webidl2();
3828138282 var supportedHashes = [];
38282- var crypto2 ;
38283+ var crypto ;
3828338284 try {
38284- crypto2 = __require("node:crypto");
38285+ crypto = __require("node:crypto");
3828538286 const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
38286- supportedHashes = crypto2 .getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
38287+ supportedHashes = crypto .getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
3828738288 } catch {
3828838289 }
3828938290 function responseURL(response) {
@@ -38543,7 +38544,7 @@ var require_util9 = __commonJS({
3854338544 }
3854438545 }
3854538546 function bytesMatch(bytes, metadataList) {
38546- if (crypto2 === void 0) {
38547+ if (crypto === void 0) {
3854738548 return true;
3854838549 }
3854938550 const parsedMetadata = parseMetadata(metadataList);
@@ -38558,7 +38559,7 @@ var require_util9 = __commonJS({
3855838559 for (const item of metadata) {
3855938560 const algorithm = item.algo;
3856038561 const expectedValue = item.hash;
38561- let actualValue = crypto2 .createHash(algorithm).update(bytes).digest("base64");
38562+ let actualValue = crypto .createHash(algorithm).update(bytes).digest("base64");
3856238563 if (actualValue[actualValue.length - 1] === "=") {
3856338564 if (actualValue[actualValue.length - 2] === "=") {
3856438565 actualValue = actualValue.slice(0, -2);
@@ -50244,13 +50245,13 @@ var require_frame2 = __commonJS({
5024450245 "use strict";
5024550246 var { maxUnsigned16Bit } = require_constants11();
5024650247 var BUFFER_SIZE = 16386;
50247- var crypto2 ;
50248+ var crypto ;
5024850249 var buffer = null;
5024950250 var bufIdx = BUFFER_SIZE;
5025050251 try {
50251- crypto2 = __require("node:crypto");
50252+ crypto = __require("node:crypto");
5025250253 } catch {
50253- crypto2 = {
50254+ crypto = {
5025450255 randomFillSync: function randomFillSync(buffer2, _offset, _size) {
5025550256 for (let i = 0; i < buffer2.length; ++i) {
5025650257 buffer2[i] = Math.random() * 255 | 0;
@@ -50262,7 +50263,7 @@ var require_frame2 = __commonJS({
5026250263 function generateMask() {
5026350264 if (bufIdx === BUFFER_SIZE) {
5026450265 bufIdx = 0;
50265- crypto2 .randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
50266+ crypto .randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
5026650267 }
5026750268 return [buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++]];
5026850269 }
@@ -50331,9 +50332,9 @@ var require_connection2 = __commonJS({
5033150332 var { Headers, getHeadersList } = require_headers2();
5033250333 var { getDecodeSplit } = require_util9();
5033350334 var { WebsocketFrameSend } = require_frame2();
50334- var crypto2 ;
50335+ var crypto ;
5033550336 try {
50336- crypto2 = __require("node:crypto");
50337+ crypto = __require("node:crypto");
5033750338 } catch {
5033850339 }
5033950340 function establishWebSocketConnection(url, protocols, client, ws, onEstablish, options) {
@@ -50353,7 +50354,7 @@ var require_connection2 = __commonJS({
5035350354 const headersList = getHeadersList(new Headers(options.headers));
5035450355 request2.headersList = headersList;
5035550356 }
50356- const keyValue = crypto2 .randomBytes(16).toString("base64");
50357+ const keyValue = crypto .randomBytes(16).toString("base64");
5035750358 request2.headersList.append("sec-websocket-key", keyValue);
5035850359 request2.headersList.append("sec-websocket-version", "13");
5035950360 for (const protocol of protocols) {
@@ -50384,7 +50385,7 @@ var require_connection2 = __commonJS({
5038450385 return;
5038550386 }
5038650387 const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
50387- const digest = crypto2 .createHash("sha1").update(keyValue + uid).digest("base64");
50388+ const digest = crypto .createHash("sha1").update(keyValue + uid).digest("base64");
5038850389 if (secWSAccept !== digest) {
5038950390 failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
5039050391 return;
0 commit comments