summaryrefslogtreecommitdiff
path: root/ext/crypto/import_key.rs
AgeCommit message (Collapse)Author
2024-10-18refactor(ext/crypto): use concrete error types (#26167)Leo Kettmeir
2024-09-23feat(ext/crypto): import and export p521 keys (#25789)Divy Srivastava
Towards https://github.com/denoland/deno/issues/13449
2024-08-23fix(ext/crypto): throw DataError for invalid EC key import (#25181)Divy Srivastava
Fixes https://github.com/denoland/deno/issues/20931
2024-01-06feat(ext/crypto): initial support for p521 in `generateKey` and `importKey` ↵Divy Srivastava
(#21815) Part 1 of a potential 3 part series. Ref #13449 The current implementation passes key material back and forth RustCrypto group of crates and ring. ring does not implement p521 yet. This PR adds support for P521 named curve in `generateKey` and `importKey` where we use RustCrypto. Other parts should be moved over to the RustGroup group of crates for consistency.
2024-01-01chore: update to Rust 1.75 (#21731)林炳权
2024-01-01chore: update copyright to 2024 (#21753)David Sherret
2023-11-05fixDivy Srivastava
2023-11-05chore(ext/crypto): upgrade ec cratesDivy Srivastava
2023-10-30chore: upgrade rsa to 0.9 (#21016)Divy Srivastava
2023-10-27chore(ext/crypto): upgrade to ring 0.17 (#20824)Divy Srivastava
Ref https://github.com/denoland/deno/issues/18071
2023-10-26chore: update base64 crate (#20877)Luca Casonato
2023-09-13refactor: rewrite ext/crypto to op2 (#20477)Bartek Iwańczuk
2023-06-22refactor(serde_v8): split ZeroCopyBuf into JsBuffer and ToJsBuffer (#19566)Bartek Iwańczuk
`ZeroCopyBuf` was convenient to use, but sometimes it did hide details that some copies were necessary in certain cases. Also it made it way to easy for the caller to pass around and convert into different values. This commit splits `ZeroCopyBuf` into `JsBuffer` (an array buffer coming from V8) and `ToJsBuffer` (a Rust buffer that will be converted into a V8 array buffer). As a result some magical conversions were removed (they were never used) limiting the API surface and preparing for changes in #19534.
2023-01-13chore: add `copyright_checker` tool and add the missing copyright (#17285)Yiyu Lin
2022-10-04fix(ext/crypto): interoperable import/export (#16153)Filip Skokan
This PR updates RSA key import/export to a state which is interoperable with other implementations. For RSA the only OID in and out is `rsaEncryption`. For EC the only OID in and out is `id-ecpublickey` (fixed in #16152). see https://github.com/w3c/webcrypto/issues/307#issuecomment-995813032 see https://github.com/w3c/webcrypto/issues/307 see https://github.com/w3c/webcrypto/pull/305 see https://github.com/nodejs/node/pull/42816
2022-10-03fix(ext/crypto): fix importKey error when leading zeroes (#16009)李瑞丰
Co-authored-by: Jason <m.jason.liu@outlook.com>
2022-09-24chore(ext/crypto): fix typo in import_key.rs (#16012)Ikko Ashimine
eliptic -> elliptic
2022-06-20chore(ext/crypto): update webcrypto deps (#14452)Divy Srivastava
2022-03-16feat(ops): optional OpState (#13954)Aaron O'Mullan
2022-03-14feat(core): codegen ops (#13861)Divy Srivastava
Co-authored-by: Aaron O'Mullan <aaron.omullan@gmail.com>
2022-01-19fix(ext/crypto): validate maskGenAlgorithm asn1 in importKey (#13421)Divy Srivastava
2022-01-19feat(ext/crypto): implement pkcs8/JWK for P-384 curves (#13154)Sean Michael Wykes
2022-01-03fix(ext/crypto): use forgiving base64 encoding for JWK (#13240)Sean Michael Wykes
Implements "forgiving" in JWK decode passing suitable config to base64::decode_config
2021-12-16feat(ext/crypto): support importing ECSDA and ECDH (#13088)Sean Michael Wykes
Co-authored-by: Luca Casonato <hello@lcas.dev>
2021-12-14feat(ext/crypto): support importing RSA JWKs (#13071)Luca Casonato
This commit adds support for importing RSA JWKs in the Web Crypto API. Co-authored-by: Sean Michael Wykes <sean.wykes@nascent.com.br>
2021-12-10refactor(ext/crypto): symmetric jwk decode in rust (#13047)Luca Casonato
2021-12-10refactor(ext/crypto): clean up rust side importKey (#13036)Luca Casonato
This commit cleans up the Rust side of `import_key` by using a bunch of enums instead of structs with "type" and "data" fields. This commit does add some duplicated code for the time being, because a lot of the other ops still need to get the same cleanup treatment.