Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | util.jwt: Add support for RSA-based algorithms (RS256, PS256) | Matthew Wild | 2022-07-02 | 1 | -14/+35 |
| | |||||
* | util.jwt: Add support/tests for ES256 via improved API and using util.crypto | Matthew Wild | 2022-07-01 | 1 | -19/+121 |
| | | | | | | | | | | | In many cases code will be either signing or verifying. With asymmetric algorithms it's clearer and more efficient to just state that once, instead of passing keys (and possibly other parameters) with every sign/verify call. This also allows earlier validation of the key used. The previous (HS256-only) sign/verify methods continue to be exposed for backwards-compatibility. | ||||
* | util.jwt: Use constant-time comparison with expected signature | Matthew Wild | 2021-05-13 | 1 | -1/+2 |
| | |||||
* | util.jwt: Basic JSON Web Token library supporting HS256 tokens | Kim Alvefur | 2020-02-24 | 1 | -0/+50 |