Commits on Source (39)
-
Christian Heimes authored
Signed-off-by:
Christian Heimes <cheimes@redhat.com>
-
Michael Boulton authored
-
Michael Boulton authored
If the claim passed was not one of sub, aud, iat, etc. then passing a string as a value to check_claims would raise an error if it was not an integer Add a working test as well
-
Simo Sorce authored
Fixes #93 Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
-
Michael Boulton authored
-
Simo Sorce authored
-
Simo Sorce authored
Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
This makes it simpler to get a JWK that contains excluively a pulic key from an existing JWK. It fails if no public key is available in the source JWK. Only known public elements are returned. "Unknown" attributes are not copied over. Signed-off-by:
Simo Sorce <simo@redhat.com> Resolves #99
-
Simo Sorce authored
Fixes #92 Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
Change one test to also test using strings instead of dicts as headers. This is supported in the code but was not tested. Signed-off-by:
Simo Sorce <simo@redhat.com> Closes #96
-
Simo Sorce authored
Modify test to check the header is emitted correctly Signed-off-by:
Simo Sorce <simo@redhat.com> Fixes #105
-
Simo Sorce authored
Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Michael Boulton authored
-
Eamonn Nugent authored
There was a typo in the "_EcdhEsAes256Kw" class. I have changed "A128KW" in the description for the class to become "A256KW" in accordance with the algorithm.
-
Simo Sorce authored
Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
JWK.from_json(<json_string>) will import a previously exported key. Signed-off-by:
Simo Sorce <simo@redhat.com> Fixes: #116
-
Simo Sorce authored
It has no value to return the 'keys' attribute itself, instead we now we return the inner 'keys' object iterator when the JWKSet is iterated over. This way iterating over the JWKSet object returns its JWK objects. Signed-off-by:
Simo Sorce <simo@redhat.com> Fixes #117
-
Simo Sorce authored
Fixes #120 Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Christian Heimes authored
Signed-off-by:
Christian Heimes <cheimes@redhat.com>
-
Christian Heimes authored
Signed-off-by:
Christian Heimes <cheimes@redhat.com>
-
Christian Heimes authored
Signed-off-by:
Christian Heimes <cheimes@redhat.com>
-
mbaldwin authored
-
Li lin authored
-
Simo Sorce authored
Stop using our own, pyca has has AES Key wrap support for long enough now. Resolves #137 Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
When using ECDH-ES+A[128|192|256]WK key agreement and A128CBC-HS256 encryption the Content Encrypition Key (CEK) has a bigger size than the Key Encryption Key (KEK). Thess tests makes sure we properly handle this case. Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
The code was incorrectly assigning key size for derivation and wrapping when they differ in size. Fixes #136 Signed-off-by:
Simo Sorce <simo@redhat.com>
-
Simo Sorce authored
Together with non encoded payloads this commit also adds sull support for dealing with detached payloads on deserlization and serialization. The payload must still be provided for any computation, but can be removed before serialization and add after deserialization of a JWS with detached payload. Signed-off-by:
Simo Sorce <simo@redhat.com> Fixes #4
-
Jonathan Huot authored
-
Jonathan Huot authored
import_keyset no longer returns self.
-
Christian Heimes authored
Signed-off-by:
Christian Heimes <cheimes@redhat.com>
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored
-
Timo Aaltonen authored