./security/R-jose, JavaScript Object Signing and Encryption

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 1.2.1, Package name: R-jose-1.2.1, Maintainer: pkgsrc-users

Read and write JSON Web Keys (JWK, rfc7517), generate and verify JSON
Web Signatures (JWS, rfc7515) and encode/decode JSON Web Tokens (JWT,
rfc7519). These standards provide modern signing and encryption
formats that are natively supported by browsers via the JavaScript
WebCryptoAPI, and used by services like OAuth 2.0, LetsEncrypt, and
Github Apps.


Master sites: (Expand)


Version history: (Expand)


CVS history: (Expand)


   2025-01-11 13:33:46 by Makoto Fujiwara | Files touched by this commit (2) | Package updated
Log message:
(security/R-jose) Updated 1.2.0 to 1.2.1, NEWS not updated, make test passed

1.2
  - jwt_encode_sig() now allows to override the typ field via headers #15
  - jwt_decode functions now check the 'exp' and 'nbf' fields and raise
    and error if token has expired.
   2022-12-18 02:44:09 by Makoto Fujiwara | Files touched by this commit (3)
Log message:
(security/R-jose) import R-jose-1.2.0

Read and write JSON Web Keys (JWK, rfc7517), generate and verify JSON
Web Signatures (JWS, rfc7515) and encode/decode JSON Web Tokens (JWT,
rfc7519). These standards provide modern signing and encryption
formats that are natively supported by browsers via the JavaScript
WebCryptoAPI, and used by services like OAuth 2.0, LetsEncrypt, and
Github Apps.