-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: SubtleCrypto support for RSA-PSS, ECDSA, ED25519, pkcs8 and spki #579
Comments
Would this also include |
@jfctfl We support RS256, but that is not what Fanout uses, Fanout uses EC P-256, which we do not support and is already listed in this issue 👍 |
I assumed it was RS256 based on this rust example. But in any case, glad to see the required algorithm listed here! 👍 |
In fastly#639 we added support for ECDSA keys in SubtleCrypto. This adds the interface to the type defintions for SubtleCrypto.importKey to allow consuming TypeScript applications to use this type of key. Partly addresses fastly#579 and brings the library in sync with [our Fanout docs][1]. [1]: https://www.fastly.com/documentation/guides/concepts/real-time-messaging/fanout/#validating-grip-requests
Moved to bytecodealliance/StarlingMonkey#123. |
If I could lobby for a few more algorithms to be supported 🙏
RSA-PSS
ECDSA
(at least P-256, but ideally all three curves)Ed25519
from https://wicg.github.io/webcrypto-secure-curves/HMAC
Also
pkcs8
andspki
key format import/export are not to be overlooked. Developers LOOOVE to use in favour of JWKs.I have a comprehensive test suite for different runtimes' webcrypto implementations that I could unload on js-compute-runtime eventually.
Originally posted by @panva in #440 (comment)
The text was updated successfully, but these errors were encountered: