@@ -18,6 +18,7 @@ The following specifications are implemented by @panva/jose
18
18
- JSON Web Key Thumbprint - [ RFC7638] [ spec-thumbprint ]
19
19
- JWS Unencoded Payload Option - [ RFC7797] [ spec-b64 ]
20
20
- CFRG Elliptic Curve Signatures (EdDSA) - [ RFC8037] [ spec-okp ]
21
+ - secp256k1 curve EC Key support - [ JOSE Registrations for WebAuthn Algorithms] [ draft-secp256k1 ]
21
22
22
23
The test suite utilizes examples defined in [ RFC7520] [ spec-cookbook ] to confirm its JOSE
23
24
implementation is correct.
@@ -47,7 +48,7 @@ Legend:
47
48
| -- | -- | -- |
48
49
| RSASSA-PKCS1-v1_5 | ✓ | RS256, RS384, RS512 |
49
50
| RSASSA-PSS | ✓ | PS256, PS384, PS512 |
50
- | ECDSA | ✓ | ES256, ES384, ES512 |
51
+ | ECDSA | ✓ | ES256, ES256K, ES384, ES512 |
51
52
| Edwards-curve DSA | ✓ | EdDSA |
52
53
| HMAC with SHA-2 | ✓ | HS256, HS384, HS512 |
53
54
@@ -247,6 +248,32 @@ jose.JWE.decrypt(
247
248
)
248
249
```
249
250
251
+ #### secp256k1
252
+
253
+ Note: the secp256k1 JOSE parameters registration and the RFC is still in a draft state. If the WG
254
+ draft changes its mind about the parameter names again the new values will be propagated as a MINOR
255
+ library version.
256
+
257
+ When you require ` @panva/jose ` you can work with ` secp256k1 ` EC keys right away, the EC JWK ` crv `
258
+ used is as per the specification ` secp256k1 ` .
259
+
260
+ ``` js
261
+ const jose = require (' @panva/jose' )
262
+ let key = jose .JWK .generateSync (' EC' , ' secp256k1' )
263
+ key = jose .JWK .asKey (fs .readFileSync (' path/to/key/file' ))
264
+ key .crv === ' secp256k1'
265
+ ```
266
+
267
+ For legacy reasons the unregistered EC JWK ` crv ` value ` P-256K ` is also supported but you must
268
+ require ` @panva/jose ` like so to use it:
269
+
270
+ ``` js
271
+ const jose = require (' @panva/jose/P-256K' )
272
+ let key = jose .JWK .generateSync (' EC' , ' P-256K' )
273
+ key = jose .JWK .asKey (fs .readFileSync (' path/to/key/file' ))
274
+ key .crv === ' P-256K'
275
+ ```
276
+
250
277
## FAQ
251
278
252
279
#### Semver?
@@ -315,6 +342,7 @@ in terms of performance and API (not having well defined errors).
315
342
[ spec-jws ] : https://tools.ietf.org/html/rfc7515
316
343
[ spec-jwt ] : https://tools.ietf.org/html/rfc7519
317
344
[ spec-okp ] : https://tools.ietf.org/html/rfc8037
345
+ [ draft-secp256k1 ] : https://tools.ietf.org/html/draft-ietf-cose-webauthn-algorithms-01
318
346
[ spec-thumbprint ] : https://tools.ietf.org/html/rfc7638
319
347
[ suggest-feature ] : https://github.com/panva/jose/issues/new?labels=enhancement&template=feature-request.md&title=proposal%3A+
320
348
[ support-patreon ] : https://www.patreon.com/panva
0 commit comments