| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273 | 
							
-     var SEA = require('./root');
 
-     var shim = require('./shim');
 
-     var S = require('./settings');
 
-     SEA.name = SEA.name || (async (cb, opt) => { try {
 
-       if(cb){ try{ cb() }catch(e){console.log(e)} }
 
-       return;
 
-     } catch(e) {
 
-       console.log(e);
 
-       SEA.err = e;
 
-       if(SEA.throw){ throw e }
 
-       if(cb){ cb() }
 
-       return;
 
-     }});
 
-     //SEA.pair = async (data, proof, cb) => { try {
 
-     SEA.pair = SEA.pair || (async (cb, opt) => { try {
 
-       var ecdhSubtle = shim.ossl || shim.subtle;
 
-       // First: ECDSA keys for signing/verifying...
 
-       var sa = await shim.subtle.generateKey({name: 'ECDSA', namedCurve: 'P-256'}, true, [ 'sign', 'verify' ])
 
-       .then(async (keys) => {
 
-         // privateKey scope doesn't leak out from here!
 
-         //const { d: priv } = await shim.subtle.exportKey('jwk', keys.privateKey)
 
-         var key = {};
 
-         key.priv = (await shim.subtle.exportKey('jwk', keys.privateKey)).d;
 
-         var pub = await shim.subtle.exportKey('jwk', keys.publicKey);
 
-         //const pub = Buff.from([ x, y ].join(':')).toString('base64') // old
 
-         key.pub = pub.x+'.'+pub.y; // new
 
-         // x and y are already base64
 
-         // pub is UTF8 but filename/URL safe (https://www.ietf.org/rfc/rfc3986.txt)
 
-         // but split on a non-base64 letter.
 
-         return key;
 
-       })
 
-       
 
-       // To include PGPv4 kind of keyId:
 
-       // const pubId = await SEA.keyid(keys.pub)
 
-       // Next: ECDH keys for encryption/decryption...
 
-       try{
 
-       var dh = await ecdhSubtle.generateKey({name: 'ECDH', namedCurve: 'P-256'}, true, ['deriveKey'])
 
-       .then(async (keys) => {
 
-         // privateKey scope doesn't leak out from here!
 
-         var key = {};
 
-         key.epriv = (await ecdhSubtle.exportKey('jwk', keys.privateKey)).d;
 
-         var pub = await ecdhSubtle.exportKey('jwk', keys.publicKey);
 
-         //const epub = Buff.from([ ex, ey ].join(':')).toString('base64') // old
 
-         key.epub = pub.x+'.'+pub.y; // new
 
-         // ex and ey are already base64
 
-         // epub is UTF8 but filename/URL safe (https://www.ietf.org/rfc/rfc3986.txt)
 
-         // but split on a non-base64 letter.
 
-         return key;
 
-       })
 
-       }catch(e){
 
-         if(SEA.window){ throw e }
 
-         if(e == 'Error: ECDH is not a supported algorithm'){ console.log('Ignoring ECDH...') }
 
-         else { throw e }
 
-       } dh = dh || {};
 
-       var r = { pub: sa.pub, priv: sa.priv, /* pubId, */ epub: dh.epub, epriv: dh.epriv }
 
-       if(cb){ try{ cb(r) }catch(e){console.log(e)} }
 
-       return r;
 
-     } catch(e) {
 
-       console.log(e);
 
-       SEA.err = e;
 
-       if(SEA.throw){ throw e }
 
-       if(cb){ cb() }
 
-       return;
 
-     }});
 
-     module.exports = SEA.pair;
 
-   
 
 
  |