Socket
Socket
Sign inDemoInstall

jose

Package Overview
Dependencies
Maintainers
1
Versions
209
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

jose - npm Package Compare versions

Comparing version 3.8.0 to 3.9.0

4

dist/browser/jwe/compact/decrypt.js
import decrypt from '../flattened/decrypt.js';
import { JWEInvalid } from '../../util/errors.js';
import { decoder } from '../../lib/buffer_utils.js';
export default async function compactDecrypt(jwe, key, options) {
async function compactDecrypt(jwe, key, options) {
if (jwe instanceof Uint8Array) {

@@ -24,1 +24,3 @@ jwe = decoder.decode(jwe);

}
export { compactDecrypt };
export default compactDecrypt;
import FlattenedEncrypt from '../flattened/encrypt.js';
export default class CompactEncrypt {
class CompactEncrypt {
constructor(plaintext) {

@@ -27,1 +27,3 @@ this._flattened = new FlattenedEncrypt(plaintext);

}
export { CompactEncrypt };
export default CompactEncrypt;

@@ -17,3 +17,3 @@ import { JOSEAlgNotAllowed, JOSENotSupported, JWEInvalid } from '../../util/errors.js';

const checkEncOption = validateAlgorithms.bind(undefined, 'contentEncryptionAlgorithms');
export default async function flattenedDecrypt(jwe, key, options) {
async function flattenedDecrypt(jwe, key, options) {
var _a;

@@ -133,1 +133,3 @@ if (!isObject(jwe)) {

}
export { flattenedDecrypt };
export default flattenedDecrypt;

@@ -13,3 +13,3 @@ import ivFactory from '../../lib/iv.js';

const checkExtensions = validateCrit.bind(undefined, JWEInvalid, new Map());
export default class FlattenedEncrypt {
class FlattenedEncrypt {
constructor(plaintext) {

@@ -166,1 +166,3 @@ this._plaintext = plaintext;

}
export { FlattenedEncrypt };
export default FlattenedEncrypt;
import decrypt from '../flattened/decrypt.js';
import { JWEDecryptionFailed, JWEInvalid } from '../../util/errors.js';
import isObject from '../../lib/is_object.js';
export default async function generalDecrypt(jwe, key, options) {
async function generalDecrypt(jwe, key, options) {
if (!isObject(jwe)) {

@@ -29,1 +29,3 @@ throw new JWEInvalid('General JWE must be an object');

}
export { generalDecrypt };
export default generalDecrypt;
import parseJwk from './parse.js';
import isObject from '../lib/is_object.js';
import { JWSInvalid } from '../util/errors.js';
export default async function EmbeddedJWK(protectedHeader, token) {
async function EmbeddedJWK(protectedHeader, token) {
const joseHeader = {

@@ -18,1 +18,3 @@ ...protectedHeader,

}
export { EmbeddedJWK };
export default EmbeddedJWK;
import { encode as base64url } from '../runtime/base64url.js';
import asJWK from '../runtime/key_to_jwk.js';
export default async function fromKeyLike(key) {
async function fromKeyLike(key) {
if (key instanceof Uint8Array) {

@@ -12,1 +12,3 @@ return {

}
export { fromKeyLike };
export default fromKeyLike;

@@ -5,3 +5,3 @@ import { decode as base64url } from '../runtime/base64url.js';

import isObject from '../lib/is_object.js';
export default async function parseJwk(jwk, alg, octAsKeyObject) {
async function parseJwk(jwk, alg, octAsKeyObject) {
if (!isObject(jwk)) {

@@ -35,1 +35,3 @@ throw new TypeError('JWK must be an object');

}
export { parseJwk };
export default parseJwk;

@@ -11,3 +11,3 @@ import { JOSENotSupported, JWKInvalid } from '../util/errors.js';

};
export default async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') {
async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') {
if (!isObject(jwk)) {

@@ -44,1 +44,3 @@ throw new TypeError('JWK must be an object');

}
export { calculateThumbprint };
export default calculateThumbprint;

@@ -122,5 +122,7 @@ import parseJWK from '../jwk/parse.js';

}
export default function createRemoteJWKSet(url, options) {
function createRemoteJWKSet(url, options) {
const set = new RemoteJWKSet(url, options);
return set.getKey.bind(set);
}
export { createRemoteJWKSet };
export default createRemoteJWKSet;
import FlattenedSign from '../flattened/sign.js';
export default class CompactSign {
class CompactSign {
constructor(payload) {

@@ -18,1 +18,3 @@ this._flattened = new FlattenedSign(payload);

}
export { CompactSign };
export default CompactSign;
import verify from '../flattened/verify.js';
import { JWSInvalid } from '../../util/errors.js';
import { decoder } from '../../lib/buffer_utils.js';
export default async function compactVerify(jws, key, options) {
async function compactVerify(jws, key, options) {
if (jws instanceof Uint8Array) {

@@ -22,1 +22,3 @@ jws = decoder.decode(jws);

}
export { compactVerify };
export default compactVerify;

@@ -9,3 +9,3 @@ import isDisjoint from '../../lib/is_disjoint.js';

const checkExtensions = validateCrit.bind(undefined, JWSInvalid, new Map([['b64', true]]));
export default class FlattenedSign {
class FlattenedSign {
constructor(payload) {

@@ -80,1 +80,3 @@ this._payload = payload;

}
export { FlattenedSign };
export default FlattenedSign;

@@ -12,3 +12,3 @@ import { JOSEAlgNotAllowed, JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js';

const checkAlgOption = validateAlgorithms.bind(undefined, 'algorithms');
export default async function flattenedVerify(jws, key, options) {
async function flattenedVerify(jws, key, options) {
var _a;

@@ -98,1 +98,3 @@ if (!isObject(jws)) {

}
export { flattenedVerify };
export default flattenedVerify;

@@ -32,3 +32,3 @@ import FlattenedSign from '../flattened/sign.js';

}
export default class GeneralSign {
class GeneralSign {
constructor(payload) {

@@ -75,1 +75,3 @@ this._signatures = [];

}
export { GeneralSign };
export default GeneralSign;
import verify from '../flattened/verify.js';
import { JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js';
import isObject from '../../lib/is_object.js';
export default async function generalVerify(jws, key, options) {
async function generalVerify(jws, key, options) {
if (!isObject(jws)) {

@@ -25,1 +25,3 @@ throw new JWSInvalid('General JWS must be an object');

}
export { generalVerify };
export default generalVerify;
import decrypt from '../jwe/compact/decrypt.js';
import jwtPayload from '../lib/jwt_claims_set.js';
import { JWTClaimValidationFailed } from '../util/errors.js';
export default async function jwtDecrypt(jwt, key, options) {
async function jwtDecrypt(jwt, key, options) {
const decrypted = await decrypt(jwt, key, options);

@@ -20,1 +20,3 @@ const payload = jwtPayload(decrypted.protectedHeader, decrypted.plaintext, options);

}
export { jwtDecrypt };
export default jwtDecrypt;
import CompactEncrypt from '../jwe/compact/encrypt.js';
import { encoder } from '../lib/buffer_utils.js';
import ProduceJWT from '../lib/jwt_producer.js';
export default class EncryptJWT extends ProduceJWT {
class EncryptJWT extends ProduceJWT {
setProtectedHeader(protectedHeader) {

@@ -69,1 +69,3 @@ if (this._protectedHeader) {

}
export { EncryptJWT };
export default EncryptJWT;

@@ -5,3 +5,3 @@ import CompactSign from '../jws/compact/sign.js';

import ProduceJWT from '../lib/jwt_producer.js';
export default class SignJWT extends ProduceJWT {
class SignJWT extends ProduceJWT {
setProtectedHeader(protectedHeader) {

@@ -21,1 +21,3 @@ this._protectedHeader = protectedHeader;

}
export { SignJWT };
export default SignJWT;

@@ -6,3 +6,3 @@ import { decoder } from '../lib/buffer_utils.js';

import ProduceJWT from '../lib/jwt_producer.js';
export default class UnsecuredJWT extends ProduceJWT {
class UnsecuredJWT extends ProduceJWT {
encode() {

@@ -34,1 +34,3 @@ const header = base64url.encode(JSON.stringify({ alg: 'none' }));

}
export { UnsecuredJWT };
export default UnsecuredJWT;
import verify from '../jws/compact/verify.js';
import jwtPayload from '../lib/jwt_claims_set.js';
import { JWTInvalid } from '../util/errors.js';
export default async function jwtVerify(jwt, key, options) {
async function jwtVerify(jwt, key, options) {
var _a;

@@ -13,1 +13,3 @@ const verified = await verify(jwt, key, options);

}
export { jwtVerify };
export default jwtVerify;

@@ -5,3 +5,3 @@ import { ok as assert } from 'assert';

import isObject from '../lib/is_object.js';
export default function decodeProtectedHeader(token) {
function decodeProtectedHeader(token) {
let protectedB64u;

@@ -33,1 +33,3 @@ if (typeof token === 'string') {

}
export { decodeProtectedHeader };
export default decodeProtectedHeader;
import { generateKeyPair as generate } from '../runtime/generate.js';
export default async function generateKeyPair(alg, options) {
async function generateKeyPair(alg, options) {
return generate(alg, options);
}
export { generateKeyPair };
export default generateKeyPair;
import { generateSecret as generate } from '../runtime/generate.js';
export default async function generateSecret(alg) {
async function generateSecret(alg) {
return generate(alg);
}
export { generateSecret };
export default generateSecret;
import runtimeRandom from '../runtime/random.js';
const random = runtimeRandom;
export { random };
export default random;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.compactDecrypt = void 0;
const decrypt_js_1 = require("../flattened/decrypt.js");

@@ -26,2 +27,3 @@ const errors_js_1 = require("../../util/errors.js");

}
exports.compactDecrypt = compactDecrypt;
exports.default = compactDecrypt;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.CompactEncrypt = void 0;
const encrypt_js_1 = require("../flattened/encrypt.js");

@@ -29,2 +30,3 @@ class CompactEncrypt {

}
exports.CompactEncrypt = CompactEncrypt;
exports.default = CompactEncrypt;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.flattenedDecrypt = void 0;
const errors_js_1 = require("../../util/errors.js");

@@ -134,2 +135,3 @@ const is_disjoint_js_1 = require("../../lib/is_disjoint.js");

}
exports.flattenedDecrypt = flattenedDecrypt;
exports.default = flattenedDecrypt;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.FlattenedEncrypt = void 0;
const iv_js_1 = require("../../lib/iv.js");

@@ -167,2 +168,3 @@ const base64url_js_1 = require("../../runtime/base64url.js");

}
exports.FlattenedEncrypt = FlattenedEncrypt;
exports.default = FlattenedEncrypt;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.generalDecrypt = void 0;
const decrypt_js_1 = require("../flattened/decrypt.js");

@@ -31,2 +32,3 @@ const errors_js_1 = require("../../util/errors.js");

}
exports.generalDecrypt = generalDecrypt;
exports.default = generalDecrypt;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.EmbeddedJWK = void 0;
const parse_js_1 = require("./parse.js");

@@ -20,2 +21,3 @@ const is_object_js_1 = require("../lib/is_object.js");

}
exports.EmbeddedJWK = EmbeddedJWK;
exports.default = EmbeddedJWK;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.fromKeyLike = void 0;
const base64url_js_1 = require("../runtime/base64url.js");

@@ -14,2 +15,3 @@ const key_to_jwk_js_1 = require("../runtime/key_to_jwk.js");

}
exports.fromKeyLike = fromKeyLike;
exports.default = fromKeyLike;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.parseJwk = void 0;
const base64url_js_1 = require("../runtime/base64url.js");

@@ -36,2 +37,3 @@ const jwk_to_key_js_1 = require("../runtime/jwk_to_key.js");

}
exports.parseJwk = parseJwk;
exports.default = parseJwk;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.calculateThumbprint = void 0;
const errors_js_1 = require("../util/errors.js");

@@ -45,2 +46,3 @@ const digest_js_1 = require("../runtime/digest.js");

}
exports.calculateThumbprint = calculateThumbprint;
exports.default = calculateThumbprint;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.createRemoteJWKSet = void 0;
const parse_js_1 = require("../jwk/parse.js");

@@ -128,2 +129,3 @@ const errors_js_1 = require("../util/errors.js");

}
exports.createRemoteJWKSet = createRemoteJWKSet;
exports.default = createRemoteJWKSet;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.CompactSign = void 0;
const sign_js_1 = require("../flattened/sign.js");

@@ -20,2 +21,3 @@ class CompactSign {

}
exports.CompactSign = CompactSign;
exports.default = CompactSign;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.compactVerify = void 0;
const verify_js_1 = require("../flattened/verify.js");

@@ -24,2 +25,3 @@ const errors_js_1 = require("../../util/errors.js");

}
exports.compactVerify = compactVerify;
exports.default = compactVerify;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.FlattenedSign = void 0;
const is_disjoint_js_1 = require("../../lib/is_disjoint.js");

@@ -81,2 +82,3 @@ const errors_js_1 = require("../../util/errors.js");

}
exports.FlattenedSign = FlattenedSign;
exports.default = FlattenedSign;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.flattenedVerify = void 0;
const errors_js_1 = require("../../util/errors.js");

@@ -99,2 +100,3 @@ const buffer_utils_js_1 = require("../../lib/buffer_utils.js");

}
exports.flattenedVerify = flattenedVerify;
exports.default = flattenedVerify;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.GeneralSign = void 0;
const sign_js_1 = require("../flattened/sign.js");

@@ -76,2 +77,3 @@ const errors_js_1 = require("../../util/errors.js");

}
exports.GeneralSign = GeneralSign;
exports.default = GeneralSign;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.generalVerify = void 0;
const verify_js_1 = require("../flattened/verify.js");

@@ -27,2 +28,3 @@ const errors_js_1 = require("../../util/errors.js");

}
exports.generalVerify = generalVerify;
exports.default = generalVerify;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.jwtDecrypt = void 0;
const decrypt_js_1 = require("../jwe/compact/decrypt.js");

@@ -22,2 +23,3 @@ const jwt_claims_set_js_1 = require("../lib/jwt_claims_set.js");

}
exports.jwtDecrypt = jwtDecrypt;
exports.default = jwtDecrypt;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.EncryptJWT = void 0;
const encrypt_js_1 = require("../jwe/compact/encrypt.js");

@@ -71,2 +72,3 @@ const buffer_utils_js_1 = require("../lib/buffer_utils.js");

}
exports.EncryptJWT = EncryptJWT;
exports.default = EncryptJWT;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.SignJWT = void 0;
const sign_js_1 = require("../jws/compact/sign.js");

@@ -22,2 +23,3 @@ const errors_js_1 = require("../util/errors.js");

}
exports.SignJWT = SignJWT;
exports.default = SignJWT;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.UnsecuredJWT = void 0;
const buffer_utils_js_1 = require("../lib/buffer_utils.js");

@@ -35,2 +36,3 @@ const base64url = require("../runtime/base64url.js");

}
exports.UnsecuredJWT = UnsecuredJWT;
exports.default = UnsecuredJWT;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.jwtVerify = void 0;
const verify_js_1 = require("../jws/compact/verify.js");

@@ -15,2 +16,3 @@ const jwt_claims_set_js_1 = require("../lib/jwt_claims_set.js");

}
exports.jwtVerify = jwtVerify;
exports.default = jwtVerify;

@@ -11,3 +11,3 @@ "use strict";

const generateIv = iv_js_1.default(random_js_1.default);
exports.wrap = async (alg, key, cek, iv) => {
const wrap = async (alg, key, cek, iv) => {
const jweAlgorithm = alg.substr(0, 7);

@@ -21,3 +21,4 @@ iv || (iv = generateIv(jweAlgorithm));

};
exports.unwrap = async (alg, key, encryptedKey, iv, tag) => {
exports.wrap = wrap;
const unwrap = async (alg, key, encryptedKey, iv, tag) => {
const jweAlgorithm = alg.substr(0, 7);

@@ -29,1 +30,2 @@ if (webcrypto_js_1.isCryptoKey(key)) {

};
exports.unwrap = unwrap;

@@ -14,3 +14,3 @@ "use strict";

}
exports.wrap = async (alg, key, cek) => {
const wrap = async (alg, key, cek) => {
const size = parseInt(alg.substr(1, 3), 10);

@@ -35,3 +35,4 @@ const algorithm = `aes${size}-wrap`;

};
exports.unwrap = async (alg, key, encryptedKey) => {
exports.wrap = wrap;
const unwrap = async (alg, key, encryptedKey) => {
const size = parseInt(alg.substr(1, 3), 10);

@@ -56,1 +57,2 @@ const algorithm = `aes${size}-wrap`;

};
exports.unwrap = unwrap;

@@ -20,2 +20,3 @@ "use strict";

exports.encode = encodeImpl;
exports.decode = (input) => Buffer.from(normalize(input), 'base64');
const decode = (input) => Buffer.from(normalize(input), 'base64');
exports.decode = decode;

@@ -44,5 +44,6 @@ "use strict";

};
exports.setModulusLength = (keyObject, modulusLength) => {
const setModulusLength = (keyObject, modulusLength) => {
exports.weakMap.set(keyObject, modulusLength);
};
exports.setModulusLength = setModulusLength;
exports.default = (key, alg) => {

@@ -49,0 +50,0 @@ if (getModulusLength(key) < 2048) {

@@ -14,3 +14,3 @@ "use strict";

const concatKdf = buffer_utils_js_1.concatKdf.bind(undefined, digest_js_1.default.bind(undefined, 'sha256'));
exports.deriveKey = async (publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) => {
const deriveKey = async (publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) => {
const value = buffer_utils_js_1.concat(buffer_utils_js_1.lengthAndInput(buffer_utils_js_1.encoder.encode(algorithm)), buffer_utils_js_1.lengthAndInput(apu), buffer_utils_js_1.lengthAndInput(apv), buffer_utils_js_1.uint32be(keyLength));

@@ -26,3 +26,4 @@ if (webcrypto_js_1.isCryptoKey(publicKey)) {

};
exports.ephemeralKeyToPublicJWK = function ephemeralKeyToPublicJWK(key) {
exports.deriveKey = deriveKey;
const ephemeralKeyToPublicJWK = function ephemeralKeyToPublicJWK(key) {
if (webcrypto_js_1.isCryptoKey(key)) {

@@ -53,3 +54,4 @@ key = webcrypto_js_1.getKeyObject(key);

};
exports.generateEpk = async (key) => {
exports.ephemeralKeyToPublicJWK = ephemeralKeyToPublicJWK;
const generateEpk = async (key) => {
if (webcrypto_js_1.isCryptoKey(key)) {

@@ -72,3 +74,4 @@ key = webcrypto_js_1.getKeyObject(key);

};
exports.publicJwkToEphemeralKey = async (jwk) => {
exports.generateEpk = generateEpk;
const publicJwkToEphemeralKey = async (jwk) => {
let pem;

@@ -114,3 +117,5 @@ switch (jwk.crv) {

};
exports.publicJwkToEphemeralKey = publicJwkToEphemeralKey;
const curves = ['P-256', 'P-384', 'P-521', 'X25519', 'X448'];
exports.ecdhAllowed = (key) => curves.includes(get_named_curve_js_1.default(key));
const ecdhAllowed = (key) => curves.includes(get_named_curve_js_1.default(key));
exports.ecdhAllowed = ecdhAllowed;

@@ -13,3 +13,3 @@ "use strict";

const pbkdf2 = util_1.promisify(crypto_1.pbkdf2);
exports.encrypt = async (alg, key, cek, p2c = Math.floor(Math.random() * 2049) + 2048, p2s = random_js_1.default(new Uint8Array(16))) => {
const encrypt = async (alg, key, cek, p2c = Math.floor(Math.random() * 2049) + 2048, p2s = random_js_1.default(new Uint8Array(16))) => {
check_p2s_js_1.default(p2s);

@@ -32,3 +32,4 @@ const salt = buffer_utils_js_1.p2s(alg, p2s);

};
exports.decrypt = async (alg, key, encryptedKey, p2c, p2s) => {
exports.encrypt = encrypt;
const decrypt = async (alg, key, encryptedKey, p2c, p2s) => {
check_p2s_js_1.default(p2s);

@@ -50,1 +51,2 @@ const salt = buffer_utils_js_1.p2s(alg, p2s);

};
exports.decrypt = decrypt;

@@ -40,3 +40,3 @@ "use strict";

};
exports.encrypt = async (alg, key, cek) => {
const encrypt = async (alg, key, cek) => {
const padding = resolvePadding(alg);

@@ -50,3 +50,4 @@ const oaepHash = resolveOaepHash(alg);

};
exports.decrypt = async (alg, key, encryptedKey) => {
exports.encrypt = encrypt;
const decrypt = async (alg, key, encryptedKey) => {
const padding = resolvePadding(alg);

@@ -60,1 +61,2 @@ const oaepHash = resolveOaepHash(alg);

};
exports.decrypt = decrypt;

@@ -8,3 +8,5 @@ "use strict";

const deflateRaw = util_1.promisify(zlib_1.deflateRaw);
exports.inflate = (input) => inflateRaw(input);
exports.deflate = (input) => deflateRaw(input);
const inflate = (input) => inflateRaw(input);
exports.inflate = inflate;
const deflate = (input) => deflateRaw(input);
exports.deflate = deflate;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.decodeProtectedHeader = void 0;
const assert_1 = require("assert");

@@ -34,2 +35,3 @@ const base64url_js_1 = require("./base64url.js");

}
exports.decodeProtectedHeader = decodeProtectedHeader;
exports.default = decodeProtectedHeader;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.generateKeyPair = void 0;
const generate_js_1 = require("../runtime/generate.js");

@@ -7,2 +8,3 @@ async function generateKeyPair(alg, options) {

}
exports.generateKeyPair = generateKeyPair;
exports.default = generateKeyPair;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.generateSecret = void 0;
const generate_js_1 = require("../runtime/generate.js");

@@ -7,2 +8,3 @@ async function generateSecret(alg) {

}
exports.generateSecret = generateSecret;
exports.default = generateSecret;
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.random = void 0;
const random_js_1 = require("../runtime/random.js");
const random = random_js_1.default;
exports.random = random;
exports.default = random;
import decrypt from '../flattened/decrypt.js';
import { JWEInvalid } from '../../util/errors.js';
import { decoder } from '../../lib/buffer_utils.js';
export default async function compactDecrypt(jwe, key, options) {
async function compactDecrypt(jwe, key, options) {
if (jwe instanceof Uint8Array) {

@@ -24,1 +24,3 @@ jwe = decoder.decode(jwe);

}
export { compactDecrypt };
export default compactDecrypt;
import FlattenedEncrypt from '../flattened/encrypt.js';
export default class CompactEncrypt {
class CompactEncrypt {
constructor(plaintext) {

@@ -27,1 +27,3 @@ this._flattened = new FlattenedEncrypt(plaintext);

}
export { CompactEncrypt };
export default CompactEncrypt;

@@ -17,3 +17,3 @@ import { JOSEAlgNotAllowed, JOSENotSupported, JWEInvalid } from '../../util/errors.js';

const checkEncOption = validateAlgorithms.bind(undefined, 'contentEncryptionAlgorithms');
export default async function flattenedDecrypt(jwe, key, options) {
async function flattenedDecrypt(jwe, key, options) {
var _a;

@@ -133,1 +133,3 @@ if (!isObject(jwe)) {

}
export { flattenedDecrypt };
export default flattenedDecrypt;

@@ -13,3 +13,3 @@ import ivFactory from '../../lib/iv.js';

const checkExtensions = validateCrit.bind(undefined, JWEInvalid, new Map());
export default class FlattenedEncrypt {
class FlattenedEncrypt {
constructor(plaintext) {

@@ -166,1 +166,3 @@ this._plaintext = plaintext;

}
export { FlattenedEncrypt };
export default FlattenedEncrypt;
import decrypt from '../flattened/decrypt.js';
import { JWEDecryptionFailed, JWEInvalid } from '../../util/errors.js';
import isObject from '../../lib/is_object.js';
export default async function generalDecrypt(jwe, key, options) {
async function generalDecrypt(jwe, key, options) {
if (!isObject(jwe)) {

@@ -29,1 +29,3 @@ throw new JWEInvalid('General JWE must be an object');

}
export { generalDecrypt };
export default generalDecrypt;
import parseJwk from './parse.js';
import isObject from '../lib/is_object.js';
import { JWSInvalid } from '../util/errors.js';
export default async function EmbeddedJWK(protectedHeader, token) {
async function EmbeddedJWK(protectedHeader, token) {
const joseHeader = {

@@ -18,1 +18,3 @@ ...protectedHeader,

}
export { EmbeddedJWK };
export default EmbeddedJWK;
import { encode as base64url } from '../runtime/base64url.js';
import asJWK from '../runtime/key_to_jwk.js';
export default async function fromKeyLike(key) {
async function fromKeyLike(key) {
if (key instanceof Uint8Array) {

@@ -12,1 +12,3 @@ return {

}
export { fromKeyLike };
export default fromKeyLike;

@@ -5,3 +5,3 @@ import { decode as base64url } from '../runtime/base64url.js';

import isObject from '../lib/is_object.js';
export default async function parseJwk(jwk, alg, octAsKeyObject) {
async function parseJwk(jwk, alg, octAsKeyObject) {
if (!isObject(jwk)) {

@@ -35,1 +35,3 @@ throw new TypeError('JWK must be an object');

}
export { parseJwk };
export default parseJwk;

@@ -11,3 +11,3 @@ import { JOSENotSupported, JWKInvalid } from '../util/errors.js';

};
export default async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') {
async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') {
if (!isObject(jwk)) {

@@ -44,1 +44,3 @@ throw new TypeError('JWK must be an object');

}
export { calculateThumbprint };
export default calculateThumbprint;

@@ -122,5 +122,7 @@ import parseJWK from '../jwk/parse.js';

}
export default function createRemoteJWKSet(url, options) {
function createRemoteJWKSet(url, options) {
const set = new RemoteJWKSet(url, options);
return set.getKey.bind(set);
}
export { createRemoteJWKSet };
export default createRemoteJWKSet;
import FlattenedSign from '../flattened/sign.js';
export default class CompactSign {
class CompactSign {
constructor(payload) {

@@ -18,1 +18,3 @@ this._flattened = new FlattenedSign(payload);

}
export { CompactSign };
export default CompactSign;
import verify from '../flattened/verify.js';
import { JWSInvalid } from '../../util/errors.js';
import { decoder } from '../../lib/buffer_utils.js';
export default async function compactVerify(jws, key, options) {
async function compactVerify(jws, key, options) {
if (jws instanceof Uint8Array) {

@@ -22,1 +22,3 @@ jws = decoder.decode(jws);

}
export { compactVerify };
export default compactVerify;

@@ -9,3 +9,3 @@ import isDisjoint from '../../lib/is_disjoint.js';

const checkExtensions = validateCrit.bind(undefined, JWSInvalid, new Map([['b64', true]]));
export default class FlattenedSign {
class FlattenedSign {
constructor(payload) {

@@ -80,1 +80,3 @@ this._payload = payload;

}
export { FlattenedSign };
export default FlattenedSign;

@@ -12,3 +12,3 @@ import { JOSEAlgNotAllowed, JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js';

const checkAlgOption = validateAlgorithms.bind(undefined, 'algorithms');
export default async function flattenedVerify(jws, key, options) {
async function flattenedVerify(jws, key, options) {
var _a;

@@ -98,1 +98,3 @@ if (!isObject(jws)) {

}
export { flattenedVerify };
export default flattenedVerify;

@@ -32,3 +32,3 @@ import FlattenedSign from '../flattened/sign.js';

}
export default class GeneralSign {
class GeneralSign {
constructor(payload) {

@@ -75,1 +75,3 @@ this._signatures = [];

}
export { GeneralSign };
export default GeneralSign;
import verify from '../flattened/verify.js';
import { JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js';
import isObject from '../../lib/is_object.js';
export default async function generalVerify(jws, key, options) {
async function generalVerify(jws, key, options) {
if (!isObject(jws)) {

@@ -25,1 +25,3 @@ throw new JWSInvalid('General JWS must be an object');

}
export { generalVerify };
export default generalVerify;
import decrypt from '../jwe/compact/decrypt.js';
import jwtPayload from '../lib/jwt_claims_set.js';
import { JWTClaimValidationFailed } from '../util/errors.js';
export default async function jwtDecrypt(jwt, key, options) {
async function jwtDecrypt(jwt, key, options) {
const decrypted = await decrypt(jwt, key, options);

@@ -20,1 +20,3 @@ const payload = jwtPayload(decrypted.protectedHeader, decrypted.plaintext, options);

}
export { jwtDecrypt };
export default jwtDecrypt;
import CompactEncrypt from '../jwe/compact/encrypt.js';
import { encoder } from '../lib/buffer_utils.js';
import ProduceJWT from '../lib/jwt_producer.js';
export default class EncryptJWT extends ProduceJWT {
class EncryptJWT extends ProduceJWT {
setProtectedHeader(protectedHeader) {

@@ -69,1 +69,3 @@ if (this._protectedHeader) {

}
export { EncryptJWT };
export default EncryptJWT;

@@ -5,3 +5,3 @@ import CompactSign from '../jws/compact/sign.js';

import ProduceJWT from '../lib/jwt_producer.js';
export default class SignJWT extends ProduceJWT {
class SignJWT extends ProduceJWT {
setProtectedHeader(protectedHeader) {

@@ -21,1 +21,3 @@ this._protectedHeader = protectedHeader;

}
export { SignJWT };
export default SignJWT;

@@ -6,3 +6,3 @@ import { decoder } from '../lib/buffer_utils.js';

import ProduceJWT from '../lib/jwt_producer.js';
export default class UnsecuredJWT extends ProduceJWT {
class UnsecuredJWT extends ProduceJWT {
encode() {

@@ -34,1 +34,3 @@ const header = base64url.encode(JSON.stringify({ alg: 'none' }));

}
export { UnsecuredJWT };
export default UnsecuredJWT;
import verify from '../jws/compact/verify.js';
import jwtPayload from '../lib/jwt_claims_set.js';
import { JWTInvalid } from '../util/errors.js';
export default async function jwtVerify(jwt, key, options) {
async function jwtVerify(jwt, key, options) {
var _a;

@@ -13,1 +13,3 @@ const verified = await verify(jwt, key, options);

}
export { jwtVerify };
export default jwtVerify;

@@ -5,3 +5,3 @@ import { ok as assert } from 'assert';

import isObject from '../lib/is_object.js';
export default function decodeProtectedHeader(token) {
function decodeProtectedHeader(token) {
let protectedB64u;

@@ -33,1 +33,3 @@ if (typeof token === 'string') {

}
export { decodeProtectedHeader };
export default decodeProtectedHeader;
import { generateKeyPair as generate } from '../runtime/generate.js';
export default async function generateKeyPair(alg, options) {
async function generateKeyPair(alg, options) {
return generate(alg, options);
}
export { generateKeyPair };
export default generateKeyPair;
import { generateSecret as generate } from '../runtime/generate.js';
export default async function generateSecret(alg) {
async function generateSecret(alg) {
return generate(alg);
}
export { generateSecret };
export default generateSecret;
import runtimeRandom from '../runtime/random.js';
const random = runtimeRandom;
export { random };
export default random;
import type { KeyLike, DecryptOptions, JWEHeaderParameters, GetKeyFunction, FlattenedJWE, CompactDecryptResult } from '../../types.d';
export interface CompactDecryptGetKey extends GetKeyFunction<JWEHeaderParameters, FlattenedJWE> {
}
export default function compactDecrypt(jwe: string | Uint8Array, key: KeyLike | CompactDecryptGetKey, options?: DecryptOptions): Promise<CompactDecryptResult>;
declare function compactDecrypt(jwe: string | Uint8Array, key: KeyLike | CompactDecryptGetKey, options?: DecryptOptions): Promise<CompactDecryptResult>;
export { compactDecrypt };
export default compactDecrypt;
export type { KeyLike, DecryptOptions };
import type { KeyLike, JWEKeyManagementHeaderParameters, JWEHeaderParameters, EncryptOptions } from '../../types.d';
export default class CompactEncrypt {
declare class CompactEncrypt {
private _flattened;

@@ -11,2 +11,4 @@ constructor(plaintext: Uint8Array);

}
export { CompactEncrypt };
export default CompactEncrypt;
export type { KeyLike, JWEKeyManagementHeaderParameters, JWEHeaderParameters };
import type { FlattenedDecryptResult, KeyLike, FlattenedJWE, JWEHeaderParameters, DecryptOptions, GetKeyFunction } from '../../types.d';
export interface FlattenedDecryptGetKey extends GetKeyFunction<JWEHeaderParameters | undefined, FlattenedJWE> {
}
export default function flattenedDecrypt(jwe: FlattenedJWE, key: KeyLike | FlattenedDecryptGetKey, options?: DecryptOptions): Promise<FlattenedDecryptResult>;
declare function flattenedDecrypt(jwe: FlattenedJWE, key: KeyLike | FlattenedDecryptGetKey, options?: DecryptOptions): Promise<FlattenedDecryptResult>;
export { flattenedDecrypt };
export default flattenedDecrypt;
export type { KeyLike, FlattenedJWE, JWEHeaderParameters, DecryptOptions };
import type { KeyLike, FlattenedJWE, JWEHeaderParameters, JWEKeyManagementHeaderParameters, EncryptOptions } from '../../types.d';
export default class FlattenedEncrypt {
declare class FlattenedEncrypt {
private _plaintext;

@@ -21,2 +21,4 @@ private _protectedHeader;

}
export { FlattenedEncrypt };
export default FlattenedEncrypt;
export type { KeyLike, FlattenedJWE, JWEHeaderParameters, JWEKeyManagementHeaderParameters };
import type { KeyLike, DecryptOptions, JWEHeaderParameters, GetKeyFunction, FlattenedJWE, GeneralJWE, GeneralDecryptResult } from '../../types.d';
export interface GeneralDecryptGetKey extends GetKeyFunction<JWEHeaderParameters, FlattenedJWE> {
}
export default function generalDecrypt(jwe: GeneralJWE, key: KeyLike | GeneralDecryptGetKey, options?: DecryptOptions): Promise<GeneralDecryptResult>;
declare function generalDecrypt(jwe: GeneralJWE, key: KeyLike | GeneralDecryptGetKey, options?: DecryptOptions): Promise<GeneralDecryptResult>;
export { generalDecrypt };
export default generalDecrypt;
export type { KeyLike, GeneralJWE, DecryptOptions };
/// <reference types="node" />
import type { KeyObject } from 'crypto';
import type { FlattenedJWSInput, JWSHeaderParameters } from '../types.d';
export default function EmbeddedJWK(protectedHeader: JWSHeaderParameters, token: FlattenedJWSInput): Promise<CryptoKey | KeyObject>;
declare function EmbeddedJWK(protectedHeader: JWSHeaderParameters, token: FlattenedJWSInput): Promise<CryptoKey | KeyObject>;
export { EmbeddedJWK };
export default EmbeddedJWK;
import type { JWK, KeyLike } from '../types.d';
export default function fromKeyLike(key: KeyLike): Promise<JWK>;
declare function fromKeyLike(key: KeyLike): Promise<JWK>;
export { fromKeyLike };
export default fromKeyLike;
export type { KeyLike, JWK };
import type { JWK, KeyLike } from '../types.d';
export default function parseJwk(jwk: JWK, alg?: string, octAsKeyObject?: boolean): Promise<KeyLike>;
declare function parseJwk(jwk: JWK, alg?: string, octAsKeyObject?: boolean): Promise<KeyLike>;
export { parseJwk };
export default parseJwk;
export type { KeyLike, JWK };
import type { JWK } from '../types.d';
export default function calculateThumbprint(jwk: JWK, digestAlgorithm?: 'sha256' | 'sha384' | 'sha512'): Promise<string>;
declare function calculateThumbprint(jwk: JWK, digestAlgorithm?: 'sha256' | 'sha384' | 'sha512'): Promise<string>;
export { calculateThumbprint };
export default calculateThumbprint;
export type { JWK };

@@ -10,2 +10,4 @@ /// <reference types="node" />

}
export default function createRemoteJWKSet(url: URL, options?: RemoteJWKSetOptions): GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput>;
declare function createRemoteJWKSet(url: URL, options?: RemoteJWKSetOptions): GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput>;
export { createRemoteJWKSet };
export default createRemoteJWKSet;
import type { JWSHeaderParameters, KeyLike, SignOptions } from '../../types.d';
export default class CompactSign {
declare class CompactSign {
private _flattened;

@@ -8,2 +8,4 @@ constructor(payload: Uint8Array);

}
export { CompactSign };
export default CompactSign;
export type { JWSHeaderParameters, KeyLike };
import type { CompactVerifyResult, FlattenedJWSInput, GetKeyFunction, JWSHeaderParameters, KeyLike, VerifyOptions } from '../../types.d';
export interface CompactVerifyGetKey extends GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput> {
}
export default function compactVerify(jws: string | Uint8Array, key: KeyLike | CompactVerifyGetKey, options?: VerifyOptions): Promise<CompactVerifyResult>;
declare function compactVerify(jws: string | Uint8Array, key: KeyLike | CompactVerifyGetKey, options?: VerifyOptions): Promise<CompactVerifyResult>;
export { compactVerify };
export default compactVerify;
export type { KeyLike, VerifyOptions };
import type { KeyLike, FlattenedJWS, JWSHeaderParameters, SignOptions } from '../../types.d';
export default class FlattenedSign {
declare class FlattenedSign {
private _payload;

@@ -11,2 +11,4 @@ private _protectedHeader;

}
export { FlattenedSign };
export default FlattenedSign;
export type { KeyLike, FlattenedJWS, JWSHeaderParameters };
import type { FlattenedVerifyResult, KeyLike, FlattenedJWSInput, JWSHeaderParameters, VerifyOptions, GetKeyFunction } from '../../types.d';
export interface FlattenedVerifyGetKey extends GetKeyFunction<JWSHeaderParameters | undefined, FlattenedJWSInput> {
}
export default function flattenedVerify(jws: FlattenedJWSInput, key: KeyLike | FlattenedVerifyGetKey, options?: VerifyOptions): Promise<FlattenedVerifyResult>;
declare function flattenedVerify(jws: FlattenedJWSInput, key: KeyLike | FlattenedVerifyGetKey, options?: VerifyOptions): Promise<FlattenedVerifyResult>;
export { flattenedVerify };
export default flattenedVerify;
export type { KeyLike, FlattenedJWSInput, GetKeyFunction, JWSHeaderParameters, VerifyOptions };

@@ -6,3 +6,3 @@ import type { KeyLike, GeneralJWS, JWSHeaderParameters, SignOptions } from '../../types.d';

}
export default class GeneralSign {
declare class GeneralSign {
private _payload;

@@ -14,2 +14,4 @@ private _signatures;

}
export { GeneralSign };
export default GeneralSign;
export type { KeyLike, GeneralJWS, JWSHeaderParameters };
import type { GeneralJWSInput, GeneralVerifyResult, FlattenedJWSInput, GetKeyFunction, JWSHeaderParameters, KeyLike, VerifyOptions } from '../../types.d';
export interface GeneralVerifyGetKey extends GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput> {
}
export default function generalVerify(jws: GeneralJWSInput, key: KeyLike | GeneralVerifyGetKey, options?: VerifyOptions): Promise<GeneralVerifyResult>;
declare function generalVerify(jws: GeneralJWSInput, key: KeyLike | GeneralVerifyGetKey, options?: VerifyOptions): Promise<GeneralVerifyResult>;
export { generalVerify };
export default generalVerify;
export type { KeyLike, GeneralJWSInput, VerifyOptions };

@@ -6,3 +6,5 @@ import type { KeyLike, DecryptOptions, JWTPayload, JWTClaimVerificationOptions, GetKeyFunction, JWEHeaderParameters, FlattenedJWE, JWTDecryptResult } from '../types.d';

}
export default function jwtDecrypt(jwt: string | Uint8Array, key: KeyLike | JWTDecryptGetKey, options?: JWTDecryptOptions): Promise<JWTDecryptResult>;
declare function jwtDecrypt(jwt: string | Uint8Array, key: KeyLike | JWTDecryptGetKey, options?: JWTDecryptOptions): Promise<JWTDecryptResult>;
export { jwtDecrypt };
export default jwtDecrypt;
export type { KeyLike, DecryptOptions, JWTPayload, JWTDecryptOptions };
import type { EncryptOptions, JWEHeaderParameters, JWEKeyManagementHeaderParameters, JWTPayload, KeyLike } from '../types.d';
import ProduceJWT from '../lib/jwt_producer.js';
export default class EncryptJWT extends ProduceJWT {
declare class EncryptJWT extends ProduceJWT {
private _cek;

@@ -20,2 +20,4 @@ private _iv;

}
export { EncryptJWT };
export default EncryptJWT;
export type { JWEHeaderParameters, JWTPayload, KeyLike };
import type { JWSHeaderParameters, JWTPayload, KeyLike, SignOptions } from '../types.d';
import ProduceJWT from '../lib/jwt_producer.js';
export default class SignJWT extends ProduceJWT {
declare class SignJWT extends ProduceJWT {
private _protectedHeader;

@@ -8,2 +8,4 @@ setProtectedHeader(protectedHeader: JWSHeaderParameters): this;

}
export { SignJWT };
export default SignJWT;
export type { JWSHeaderParameters, JWTPayload, KeyLike };
import type { JWSHeaderParameters, JWTClaimVerificationOptions, JWTPayload } from '../types.d';
import ProduceJWT from '../lib/jwt_producer.js';
export default class UnsecuredJWT extends ProduceJWT {
declare class UnsecuredJWT extends ProduceJWT {
encode(): string;

@@ -10,2 +10,4 @@ static decode(jwt: string, options?: JWTClaimVerificationOptions): {

}
export { UnsecuredJWT };
export default UnsecuredJWT;
export type { JWSHeaderParameters, JWTPayload };

@@ -6,3 +6,5 @@ import type { KeyLike, VerifyOptions, JWTPayload, JWTClaimVerificationOptions, JWSHeaderParameters, GetKeyFunction, FlattenedJWSInput, JWTVerifyResult } from '../types.d';

}
export default function jwtVerify(jwt: string | Uint8Array, key: KeyLike | JWTVerifyGetKey, options?: JWTVerifyOptions): Promise<JWTVerifyResult>;
declare function jwtVerify(jwt: string | Uint8Array, key: KeyLike | JWTVerifyGetKey, options?: JWTVerifyOptions): Promise<JWTVerifyResult>;
export { jwtVerify };
export default jwtVerify;
export type { KeyLike, JWTPayload, JWTVerifyOptions, JWSHeaderParameters, GetKeyFunction };
import type { JWSHeaderParameters, JWEHeaderParameters } from '../types.d';
export declare type ProtectedHeaderParameters = JWSHeaderParameters & JWEHeaderParameters;
export default function decodeProtectedHeader(token: string | object): ProtectedHeaderParameters;
declare function decodeProtectedHeader(token: string | object): ProtectedHeaderParameters;
export { decodeProtectedHeader };
export default decodeProtectedHeader;

@@ -6,5 +6,7 @@ import type { KeyLike } from '../types.js';

}
export default function generateKeyPair(alg: string, options?: GenerateKeyPairOptions): Promise<{
declare function generateKeyPair(alg: string, options?: GenerateKeyPairOptions): Promise<{
privateKey: KeyLike;
publicKey: KeyLike;
}>;
export { generateKeyPair };
export default generateKeyPair;
import type { KeyLike } from '../types.d';
export default function generateSecret(alg: string): Promise<KeyLike>;
declare function generateSecret(alg: string): Promise<KeyLike>;
export { generateSecret };
export default generateSecret;

@@ -5,2 +5,3 @@ interface GetRandomValuesFunction {

declare const random: GetRandomValuesFunction;
export { random };
export default random;
{
"name": "jose",
"version": "3.8.0",
"version": "3.9.0",
"description": "Universal 'JSON Web Almost Everything' - JWA, JWS, JWE, JWT, JWK with no dependencies",

@@ -5,0 +5,0 @@ "keywords": [

@@ -57,27 +57,27 @@ # jose

- JSON Web Tokens (JWT)
- [Signing](docs/classes/_jwt_sign_.signjwt.md#readme)
- [Verification & Claims Set Validation](docs/functions/_jwt_verify_.jwtverify.md#readme)
- [Signing](docs/classes/jwt_sign.signjwt.md#readme)
- [Verification & Claims Set Validation](docs/functions/jwt_verify.jwtverify.md#readme)
- Encrypted JSON Web Tokens
- [Encryption](docs/classes/_jwt_encrypt_.encryptjwt.md#readme)
- [Decryption & Claims Set Validation](docs/functions/_jwt_decrypt_.jwtdecrypt.md#readme)
- [Encryption](docs/classes/jwt_encrypt.encryptjwt.md#readme)
- [Decryption & Claims Set Validation](docs/functions/jwt_decrypt.jwtdecrypt.md#readme)
- JSON Web Encryption (JWE)
- Encryption - [Compact](docs/classes/_jwe_compact_encrypt_.compactencrypt.md#readme), [Flattened](docs/classes/_jwe_flattened_encrypt_.flattenedencrypt.md#readme)
- Decryption - [Compact](docs/functions/_jwe_compact_decrypt_.compactdecrypt.md#readme), [Flattened](docs/functions/_jwe_flattened_decrypt_.flatteneddecrypt.md#readme), [General](docs/functions/_jwe_general_decrypt_.generaldecrypt.md#readme)
- Encryption - [Compact](docs/classes/jwe_compact_encrypt.compactencrypt.md#readme), [Flattened](docs/classes/jwe_flattened_encrypt.flattenedencrypt.md#readme)
- Decryption - [Compact](docs/functions/jwe_compact_decrypt.compactdecrypt.md#readme), [Flattened](docs/functions/jwe_flattened_decrypt.flatteneddecrypt.md#readme), [General](docs/functions/jwe_general_decrypt.generaldecrypt.md#readme)
- JSON Web Signature (JWS)
- Signing - [Compact](docs/classes/_jws_compact_sign_.compactsign.md#readme), [Flattened](docs/classes/_jws_flattened_sign_.flattenedsign.md#readme), [General](docs/classes/_jws_general_sign_.generalsign.md#readme)
- Verification - [Compact](docs/functions/_jws_compact_verify_.compactverify.md#readme), [Flattened](docs/functions/_jws_flattened_verify_.flattenedverify.md#readme), [General](docs/functions/_jws_general_verify_.generalverify.md#readme)
- Signing - [Compact](docs/classes/jws_compact_sign.compactsign.md#readme), [Flattened](docs/classes/jws_flattened_sign.flattenedsign.md#readme), [General](docs/classes/jws_general_sign.generalsign.md#readme)
- Verification - [Compact](docs/functions/jws_compact_verify.compactverify.md#readme), [Flattened](docs/functions/jws_flattened_verify.flattenedverify.md#readme), [General](docs/functions/jws_general_verify.generalverify.md#readme)
- JSON Web Key (JWK)
- [Parsing (JWK to KeyLike)](docs/functions/_jwk_parse_.parsejwk.md#readme)
- [Conversion (KeyLike to JWK)](docs/functions/_jwk_from_key_like_.fromkeylike.md#readme)
- [Thumbprints](docs/functions/_jwk_thumbprint_.calculatethumbprint.md#readme)
- [EmbeddedJWK](docs/functions/_jwk_embedded_.embeddedjwk.md#readme)
- [Parsing (JWK to KeyLike)](docs/functions/jwk_parse.parsejwk.md#readme)
- [Conversion (KeyLike to JWK)](docs/functions/jwk_from_key_like.fromkeylike.md#readme)
- [Thumbprints](docs/functions/jwk_thumbprint.calculatethumbprint.md#readme)
- [EmbeddedJWK](docs/functions/jwk_embedded.embeddedjwk.md#readme)
- JSON Web Key Set (JWKS)
- [Verify using a remote JWKSet](docs/functions/_jwks_remote_.createremotejwkset.md#readme)
- [Verify using a remote JWKSet](docs/functions/jwks_remote.createremotejwkset.md#readme)
- Key Pair or Secret Generation (Generate KeyLike)
- [Asymmetric Key Pair Generation](docs/functions/_util_generate_key_pair_.generatekeypair.md#readme)
- [Symmetric Secret Generation](docs/functions/_util_generate_secret_.generatesecret.md#readme)
- [Asymmetric Key Pair Generation](docs/functions/util_generate_key_pair.generatekeypair.md#readme)
- [Symmetric Secret Generation](docs/functions/util_generate_secret.generatesecret.md#readme)
- Utilities
- [Decoding Token's Protected Header](docs/functions/_util_decode_protected_header_.decodeprotectedheader.md#readme)
- [Unsecured JWT](docs/classes/_jwt_unsecured_.unsecuredjwt.md#readme)
- [JOSE Errors](docs/modules/_util_errors_.md)
- [Decoding Token's Protected Header](docs/functions/util_decode_protected_header.decodeprotectedheader.md#readme)
- [Unsecured JWT](docs/classes/jwt_unsecured.unsecuredjwt.md#readme)
- [JOSE Errors](docs/modules/util_errors.md)

@@ -84,0 +84,0 @@ ## Examples

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc