Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: allows other algorithms to be used during the verification process #29

Conversation

mineme0110
Copy link
Contributor

@mineme0110 mineme0110 commented May 19, 2024

The current implementation defaults to the ES256 algorithm, causing other keys with different signature algorithms to fail during the verification process of the SDJWT.
This fix will make the signature algorithm flexible.
This flexibility will allow other algorithms, such as EdDSA, RSA etc to work.

@mineme0110 mineme0110 requested a review from jovfer as a code owner May 19, 2024 10:21
@mineme0110
Copy link
Contributor Author

@jovfer Please can you review this

@mineme0110
Copy link
Contributor Author

@tkuhrt Please can you review this request

Copy link

@elribonazo elribonazo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, this provides the implementation with a little more flexibility on the crypto primitives that want to be used for sd+jwt.

Thanks for adding that @mineme0110

src/lib.rs Show resolved Hide resolved
@jovfer jovfer force-pushed the fix-to-allow-other-sign-alg branch 2 times, most recently from 583327a to e566c92 Compare June 5, 2024 15:37
@jovfer jovfer merged commit 842572f into openwallet-foundation-labs:main Jun 5, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants