Replies: 7 comments
-
Hi @rjbma and thank you for the kind words. This implementation does not allow for proprietary (IANA unregistered) critical parameters. "crit" members are typically only required and registered when these alter how the JWS/JWE payloads get processed, e.g. You do not need a protectedHeader member to be present in "crit" for it to be protected. |
Beta Was this translation helpful? Give feedback.
-
Hi @panva, thanks for the quick response! That makes a lot of sense. Unfortunately, the spec I'm working with mandates that these proprietary parameters be crit members. Quick question: I noticed that jose@2 allows for this situation (verifying only that the params are present in the header, of course). Do you think this is something that jose@3 will also support eventually, or is it something that you see as completely out of scope? |
Beta Was this translation helpful? Give feedback.
-
I am undecided, as I'm not convinced there's any valid use for this. Please link the spec, that's a good start. |
Beta Was this translation helpful? Give feedback.
-
sigh, i'll have to think about this. OB is technically not an extension of JWA/JWS specifications so i'd argue its use of "crit" is not 100% warranted.
I'll think about it some more and gather more resources. |
Beta Was this translation helpful? Give feedback.
-
Completely understandable. |
Beta Was this translation helpful? Give feedback.
-
v3.3.1 is safe to use with a new crit option for all sign/verify/encrypt/decrypt option which lets you ack a proprietary/private crit header.
|
Beta Was this translation helpful? Give feedback.
-
First of all, congrats for this great library!
I was trying to set some custom protected headers and add them to the crit header, like so:
However, this fails with the following error:
Looking at the code, seems that only b64 is supported.
Is that the case, or am I missing how this can be done?
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions