All notable changes to this project will be documented in this file. See standard-version for commit guidelines.
1.10.1 (2019-10-04)
1.10.0 (2019-10-01)
- rename package (26f4cf2)
1.9.2 (2019-09-16)
1.9.1 (2019-09-10)
1.9.0 (2019-08-24)
- allow JWKS.asKeyStore to swallow errors (78398d3)
1.8.0 (2019-08-22)
- added Node.js lts/dubnium support for runtime supported features (67a8601)
1.7.0 (2019-08-20)
1.6.1 (2019-07-29)
- properly pad calculated RSA primes (dd121ce)
1.6.0 (2019-07-27)
- use the correct ECPrivateKey version when importing EC JWK (24acd20)
- electron v6.x support (e7ad82c)
1.5.2 (2019-07-27)
- importing x5c in electron requires the input split (181fd09)
1.5.1 (2019-07-27)
- correctly pad integers when importing RSA JWK (1dc7f35)
1.5.0 (2019-07-23)
- validate JWTs according to a JWT profile - ID Token (6c98b61)
1.4.1 (2019-07-14)
1.4.0 (2019-07-08)
- add secp256k1 EC Key curve and ES256K (211d7af)
1.3.0 (2019-06-21)
- compute private RSA key p, q, dp, dq, qi when omitted (6e3d6fd), closes #26
- add support for JWK x5c, x5t and x5t#S256 (9d46c48)
- instances of JWKS.KeyStore are now iterable (e.g. for ... of) (2eae293)
- limit calculation of missing RSA private components (5b53cb0)
- reject rsa keys without all factors and exponents with a specific message (b0ff436)
- this deprecates the use of
JWK.importKey
in favor ofJWK.asKey
- this deprecates the use of
JWKS.KeyStore.fromJWKS
in favor ofJWKS.asKeyStore
Both JWK.importKey
and JWKS.KeyStore.fromJWKS
could have resulted
in the process getting blocked when large bitsize RSA private keys
were missing their components and could also result in an endless
calculation loop when the private key's private exponent was outright
invalid or tampered with.
The new methods still allow to import private RSA keys with these optimization key parameters missing but it is disabled by default and one should choose to enable it when working with keys from trusted sources
It is recommended not to use jose
versions with this feature in
its original on-by-default form - v1.1.0 and v1.2.0
1.0.2 (2019-05-13)
1.0.1 (2019-04-27)
- oct key ts "k" type fix (0750d2c)
1.0.0 (2019-04-23)
- fail to import invalid PEM formatted strings and buffers (857dc2b)
- add JWK key_ops support, fix .algorithms() op returns (23b874c)
- add key.toPEM() export function with optional encryption (1159b0d)
- add OKP Key and EdDSA sign/verify support (2dbd3ed), closes #12
- key.algorithms(op) un+wrapKey was split into correct wrapKey/unwrapKey/deriveKey returns
- keystore.all and keystore.get
operation
option was removed,key_ops: string[]
supersedes it - Node.js minimal version is now v12.0.0 due to its added EdDSA support (crypto.sign, crypto.verify and eddsa key objects)
0.12.0 (2019-04-07)
- add EC P-256K JWK and ES256K sign/verify support (e21fea1)
- removing ES256K alg and EC P-256K crv support until the IETF WG decides on what the final names will be.
0.11.5 (2019-04-04)
- add key.secret and key.type for completeness (2dd7053)
- add key.thumbprint always returning the JWK Thumbprint (RFC7638) (65db7e0)
0.11.4 (2019-03-28)
- properly restrict EC curves in generate(Sync) (764b863)
- remove unintended exposure of private material via enumerables (946d9df)
0.11.3 (2019-03-27)
- throw on unsupported EC curves (cfa4222)
- add EC P-256K JWK and ES256K sign/verify support (2e33e1c)
0.11.2 (2019-03-19)
- internal symbol method is now really a symbol (925d47c)
- key.toJWK() fixed on windows (57f1692), closes #17
0.11.1 (2019-03-17)
- restrict RS key algorithms by the key's bit size (9af295b)
0.11.0 (2019-03-16)
- all JWA defined RSA operations require key of 2048 or more (cc70c5d)
- use correct salt length for RSASSA-PSS (e936d54)
- all JWA defined RSA based operations require key size of 2048 bits or more.
0.10.0 (2019-03-12)
- do not list "dir" under wrap/unwrapKey operations (17b37d3)
- keystore .all and .get operation option (d349ba9)
- "dir" is no longer returned as wrap/unwrapKey key operation
0.9.2 (2019-03-05)
- "dir" is only available on keys with correct lengths (6854860)
- do not 'in' operator when importing keys as string (be3f4e4)
0.9.1 (2019-03-02)
- only import RSA, EC and oct successfully (e5e02fc)
Initial release
- JSON Web Signature (JWS) - RFC7515
- JSON Web Encryption (JWE) - RFC7516
- JSON Web Key (JWK) - RFC7517
- JSON Web Algorithms (JWA) - RFC7518
- JSON Web Token (JWT) - RFC7519
- JSON Web Key (JWK) Thumbprint - RFC7638
- JWS Unencoded Payload Option - RFC7797
JWK Key Types | Supported | |
---|---|---|
RSA | ✓ | RSA |
Elliptic Curve | ✓ | EC |
Octet sequence | ✓ | oct |
Serialization | JWS Sign | JWS Verify | JWE Encrypt | JWE Decrypt |
---|---|---|---|---|
Compact | ✓ | ✓ | ✓ | ✓ |
General JSON | ✓ | ✓ | ✓ | ✓ |
Flattened JSON | ✓ | ✓ | ✓ | ✓ |
JWS Algorithms | Supported | |
---|---|---|
RSASSA-PKCS1-v1_5 | ✓ | RS256, RS384, RS512 |
RSASSA-PSS | ✓ | PS256, PS384, PS512 |
ECDSA | ✓ | ES256, ES384, ES512 |
HMAC with SHA-2 | ✓ | HS256, HS384, HS512 |
JWE Key Management Algorithms | Supported | |
---|---|---|
AES | ✓ | A128KW, A192KW, A256KW |
AES GCM | ✓ | A128GCMKW, A192GCMKW, A256GCMKW |
Direct Key Agreement | ✓ | dir |
RSAES OAEP | ✓* | RSA-OAEP (*RSA-OAEP-256 is not supported due to its lack of support in Node.js) |
RSAES-PKCS1-v1_5 | ✓ | RSA1_5 |
PBES2 | ✓ | PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW |
ECDH-ES | ✓ | ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW |
JWE Content Encryption Algorithms | Supported | |
---|---|---|
AES GCM | ✓ | A128GCM, A192GCM, A256GCM |
AES_CBC_HMAC_SHA2 | ✓ | A128CBC-HS256, A192CBC-HS384, A256CBC-HS512 |