Filip Skokan
0ed5025de3
fix: skip validating iat is in the past when exp is present
...
validating that iat is in the past is common sense but actually nowhere
defined, in most applications tokens will contain `exp` and for those
it seems requiring a few second leeway just to satisfy `iat` seems
inappropriate
2019-12-17 20:40:23 +01:00
Filip Skokan
bee574457f
fix: properly fail to import unsupported openssh keys
2019-12-10 17:06:34 +01:00
Filip Skokan
25a7a71915
feat: importing a certificate populates x5c and x5t thumbprints
...
closes #59
2019-12-10 14:58:54 +01:00
Filip Skokan
62bdee7b29
refactor: improve error message when JWE "enc" value is invalid
2019-12-06 16:09:49 +01:00
Filip Skokan
8976027c97
refactor: improve error message when key use mismatches the operation
2019-12-06 15:35:15 +01:00
Filip Skokan
daabedc776
fix: handle Unencoded Payload (b64:false) with arbitrary buffer payloads
...
fixes #57
2019-12-05 20:54:43 +01:00
Filip Skokan
a9f1d4b195
refactor: introduce various registries to prepare for extension modules
2019-12-03 18:54:37 +01:00
Filip Skokan
ce77388254
fix: default JWT.sign kid option value is false for HMAC signatures
2019-11-27 22:04:15 +01:00
Filip Skokan
5e1009a63e
feat: allow JWK.asKey inputs for sign/verify/encrypt/decrypt operations
2019-11-27 22:04:14 +01:00
Filip Skokan
ea60338ca6
feat: allow JWKS.KeyStore .all and .get to filter for key curves
2019-11-26 16:01:49 +01:00
Filip Skokan
c3eb8450b9
feat: return the CEK from JWE.decrypt operation with { complete: true }
2019-11-23 12:06:15 +01:00
Filip Skokan
6bb66d4f0b
feat: add JWS.verify encoding and parsing options
2019-11-05 20:09:34 +01:00
Filip Skokan
8ea968312e
feat: expose crypto.KeyObject instances in supported runtimes
2019-11-03 17:27:44 +01:00
Filip Skokan
98cdad46ee
test: fix secp256k1 tests
2019-10-29 15:31:52 +01:00
Filip Skokan
95882232d6
fix: only use secp256k1 keys for signing/verification
2019-10-29 15:21:57 +01:00
Filip Skokan
3bf1f945a2
ci: enable electron 7 in CI
2019-10-24 19:27:15 +02:00
Filip Skokan
0a16efb961
fix: throw proper error when runtime doesn't support OKP
...
closes #48
2019-10-04 12:21:08 +02:00
Filip Skokan
1db9fc9cd1
refactor: don't swallow invalid encoding errors
2019-09-25 22:18:47 +02:00
Filip Skokan
81abdfabc5
fix: keystore.toJWKS(true) does not throw on public keys
...
closes #42
2019-09-16 14:46:38 +02:00
Filip Skokan
06758102b2
refactor: rename node_support to runtime_support
2019-09-10 12:14:15 +02:00
Filip Skokan
fae3e7943f
style: upgrade standard linter and fix lint issues
2019-08-22 20:46:00 +02:00
Filip Skokan
67a8601b09
feat: added Node.js lts/dubnium support for runtime supported features
2019-08-22 20:40:02 +02:00
Filip Skokan
1d6d55ff91
ci: enable and fix rfc7797 4.2 tests
2019-08-22 16:51:32 +02:00
Filip Skokan
28d7cf8c78
feat: add RSA-OAEP-256 support (when a node version supports it)
...
resolves #29
2019-08-20 19:22:42 +02:00
Filip Skokan
caeb6910d6
Revert "test: fix flaky tests"
...
This reverts commit 1cf0da0812 .
2019-07-29 15:34:53 +02:00
Filip Skokan
8d625a139d
ci: clean electron app exit
2019-07-29 15:30:17 +02:00
Filip Skokan
51db802f39
style: fix lint
2019-07-27 21:39:33 +02:00
Filip Skokan
1cf0da0812
test: fix flaky tests
2019-07-27 21:33:02 +02:00
Filip Skokan
e7ad82cbbc
feat: electron v6.x support
2019-07-27 21:19:14 +02:00
Filip Skokan
6c98b61597
feat: validate JWTs according to a JWT profile - ID Token
...
It is now possible to pass a profile to `JWT.verify` and have the JWT
validated according to it. This makes sure you pass all the right
options and that required claims are present, prohibited claims are
missing and that the right JWT typ is used.
More profiles will be added in the future.
2019-07-23 14:50:16 +02:00
Filip Skokan
98af967ef6
test: test jwt sign options over existing payload
2019-07-22 22:38:03 +02:00
Filip Skokan
418e311c8d
chore: update dev deps, code lint
2019-07-21 18:05:57 +02:00
Filip Skokan
36c9ce20c5
fix: honour the JWT.sign jti option
...
fixes #33
2019-07-14 19:30:04 +03:00
Filip Skokan
211d7af5db
feat: add secp256k1 EC Key curve and ES256K
...
This is as per
- https://tools.ietf.org/html/draft-ietf-cose-webauthn-algorithms-01
- https://mailarchive.ietf.org/arch/msg/cose/91MouVA43DefbpQOB7l5daCEeIc
2019-07-08 22:04:29 +02:00
Filip Skokan
5b53cb0155
fix: limit calculation of missing RSA private components
...
- this deprecates the use of `JWK.importKey` in favor of
`JWK.asKey`
- this deprecates the use of `JWKS.KeyStore.fromJWKS` in favor of
`JWKS.asKeyStore`
Both `JWK.importKey` and `JWKS.KeyStore.fromJWKS` could have resulted
in the process getting blocked when large bitsize RSA private keys
were missing their components and could also result in an endless
calculation loop when the private key's private exponent was outright
invalid or tampered with.
The new methods still allow to import private RSA keys with these
optimization key parameters missing but its disabled by default and one
should choose to enable it when working with keys from trusted sources
It is recommended not to use @panva/jose versions with this feature in
its original on-by-default form - v1.1.0 and v1.2.0 These will
2019-06-20 23:32:13 +02:00
Filip Skokan
9d46c48fd5
feat: add support for JWK x5c, x5t and x5t#S256
2019-05-25 22:34:28 +02:00
Filip Skokan
2eae293760
feat: instances of JWKS.KeyStore are now iterable (e.g. for ... of)
2019-05-25 22:18:27 +02:00
Filip Skokan
6e3d6fd111
feat: compute private RSA key p, q, dp, dq, qi when omitted
...
resolves #26
2019-05-23 19:51:45 +02:00
Filip Skokan
b0ff436daf
fix: reject rsa keys without all factors and exponents with a specific message
2019-05-23 19:20:30 +02:00
Filip Skokan
46eb7edb80
refactor: mention thumbprint rather then kid in ref oct key thumbprint
2019-03-01 19:42:10 +02:00
Filip Skokan
857dc2b51b
fix: fail to import invalid PEM formatted strings and buffers
2019-04-23 14:30:51 +02:00
Filip Skokan
23b874cc20
feat: add JWK key_ops support, fix .algorithms() op returns
...
BREAKING CHANGE: key.algorithms(op) un+wrapKey was split into correct
wrapKey/unwrapKey/deriveKey returns
BREAKING CHANGE: keystore.all and keystore.get `operation` option was
removed, `key_ops: string[]` supersedes it
2019-04-23 14:30:51 +02:00
Filip Skokan
4ace4be99d
test: check kid/thumbprint is not the same when kid is provided
2019-04-23 14:30:50 +02:00
Filip Skokan
1159b0df4e
feat: add key.toPEM() export function with optional encryption
2019-04-23 14:30:50 +02:00
Filip Skokan
2dbd3ed43a
feat: add OKP Key and EdDSA sign/verify support
...
BREAKING CHANGE: node.js minimal version is now v12.0.0 due to its
added EdDSA support (crypto.sign, crypto.verify and eddsa key objects)
resolves #12
2019-04-23 14:30:49 +02:00
Filip Skokan
e21fea106b
revert: add EC P-256K JWK and ES256K sign/verify support
...
BREAKING CHANGE: removing ES256K alg and EC P-256K crv support until the
IETF WG decides on what the final names will be.
2019-04-07 14:13:10 +02:00
Filip Skokan
2dd7053a4a
feat: add key.secret<boolean> and key.type<string> for completeness
2019-04-01 20:26:47 +02:00
Filip Skokan
764b86309c
fix: properly restrict EC curves in generate(Sync)
2019-03-28 09:42:27 +01:00
Filip Skokan
cfa4222e6c
fix: throw on unsupported EC curves
2019-03-27 11:13:01 +01:00
Filip Skokan
2e33e1cc2b
feat: add EC P-256K JWK and ES256K sign/verify support
2019-03-27 10:35:02 +01:00