Comparing version 1.1.0 to 1.1.1
# Release Notes | ||
<a name="1.1.1"></a> | ||
## [1.1.1](https://github.com/cisco/node-jose/compare/1.1.0...1.1.1) (2019-02-01) | ||
* Update node-forge ([6b0bc94](https://github.com/cisco/node-jose/commit/6b0bc94)) | ||
<a name="1.1.0"></a> | ||
@@ -4,0 +9,0 @@ ## [1.1.0](https://github.com/cisco/node-jose/compare/1.0.0...1.1.0) (2018-11-05) |
@@ -146,3 +146,3 @@ /*! | ||
// Inspired by teifip/node-webtokens/blob/master/lib/ecdsa.js | ||
var ERR_MSG = 'Could not extract parameters from DER signature'; | ||
var ERR_MSG = "Could not extract parameters from DER signature"; | ||
function derToConcat(signature, size) { | ||
@@ -149,0 +149,0 @@ var offset = 0; |
@@ -226,3 +226,3 @@ /*! | ||
if (!result) { | ||
throw new Error('verification failed'); | ||
throw new Error("verification failed"); | ||
} | ||
@@ -232,3 +232,3 @@ return { | ||
mac, | ||
valid: true, | ||
valid: true | ||
}; | ||
@@ -235,0 +235,0 @@ }); |
@@ -54,3 +54,3 @@ /*! | ||
function convertToPem(key, isPublic) { | ||
var cacheKey = isPublic ? `__cachedPublicPem` : `__cachedPrivatePem`; | ||
var cacheKey = isPublic ? "__cachedPublicPem" : "__cachedPrivatePem"; | ||
if (key[cacheKey]) { | ||
@@ -57,0 +57,0 @@ return key[cacheKey]; |
@@ -14,4 +14,4 @@ /*! | ||
var nodeSupport = { | ||
'RSA-OAEP': 'RSA_PKCS1_OAEP_PADDING', | ||
RSA1_5: 'RSA_PKCS1_PADDING', | ||
"RSA-OAEP": "RSA_PKCS1_OAEP_PADDING", | ||
RSA1_5: "RSA_PKCS1_PADDING" | ||
}; | ||
@@ -96,7 +96,7 @@ | ||
key, | ||
padding: helpers.nodeCrypto.constants[nodeSupport[name]], | ||
padding: helpers.nodeCrypto.constants[nodeSupport[name]] | ||
}, pdata); | ||
return { | ||
data: cdata, | ||
data: cdata | ||
}; | ||
@@ -174,6 +174,6 @@ }; | ||
key, | ||
padding: helpers.nodeCrypto.constants[nodeSupport[name]], | ||
padding: helpers.nodeCrypto.constants[nodeSupport[name]] | ||
}, pdata); | ||
}; | ||
} else if (helpers.nodeCrypto && name === 'RSA-OAEP') { // node (>= 6.0.0 && < 6.12.0) || ^7.0.0 | ||
} else if (helpers.nodeCrypto && name === "RSA-OAEP") { // node (>= 6.0.0 && < 6.12.0) || ^7.0.0 | ||
nodejs = function(key, pdata) { | ||
@@ -180,0 +180,0 @@ key = rsaUtil.convertToPem(key, false); |
@@ -153,3 +153,3 @@ /*! | ||
mac: mac, | ||
valid: true, | ||
valid: true | ||
}; | ||
@@ -229,3 +229,3 @@ }; | ||
padding: helpers.nodeCrypto.constants.RSA_PKCS1_PSS_PADDING, | ||
saltLength: helpers.nodeCrypto.constants.RSA_PSS_SALTLEN_DIGEST, | ||
saltLength: helpers.nodeCrypto.constants.RSA_PSS_SALTLEN_DIGEST | ||
}); | ||
@@ -315,3 +315,3 @@ | ||
key: rsaUtil.convertToPem(key, true), | ||
padding: helpers.nodeCrypto.constants.RSA_PKCS1_PSS_PADDING, | ||
padding: helpers.nodeCrypto.constants.RSA_PKCS1_PSS_PADDING | ||
}, mac); | ||
@@ -325,3 +325,3 @@ if (!result) { | ||
mac: mac, | ||
valid: true, | ||
valid: true | ||
}; | ||
@@ -328,0 +328,0 @@ }; |
{ | ||
"name": "node-jose", | ||
"version": "1.1.0", | ||
"version": "1.1.1", | ||
"description": "A JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers", | ||
@@ -46,3 +46,3 @@ "keywords": [ | ||
"long": "^4.0.0", | ||
"node-forge": "^0.7.6", | ||
"node-forge": "^0.8.0", | ||
"uuid": "^3.3.2" | ||
@@ -49,0 +49,0 @@ }, |
@@ -461,3 +461,3 @@ # node-jose # | ||
To restrict what signature algorithms are allowed when verifying, add the `allowAlgs` member to the `options` Object. The `allowAlgs` member is either a string or an array of strings, where the string value(s) can be one of the following: | ||
To restrict what signature algorithms are allowed when verifying, add the `algorithms` member to the `options` Object. The `algorithms` member is either a string or an array of strings, where the string value(s) can be one of the following: | ||
@@ -680,3 +680,3 @@ * `"*"`: accept all supported algorithms | ||
To restrict what encryption algorithms are allowed when verifying, add the `allowAlgs` member to the `options` Object. The `allowAlgs` member is either a string or an array of strings, where the string value(s) can be one of the following: | ||
To restrict what encryption algorithms are allowed when verifying, add the `algorithms` member to the `options` Object. The `algorithms` member is either a string or an array of strings, where the string value(s) can be one of the following: | ||
@@ -683,0 +683,0 @@ * `"*"`: accept all supported algorithms |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
New author
Supply chain riskA new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Found 1 instance in 1 package
347369
0
+ Addednode-forge@0.8.5(transitive)
- Removednode-forge@0.7.6(transitive)
Updatednode-forge@^0.8.0