-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
EdDSA
alg identifier might be getting deprecated
#23
Comments
EdDSA
alg identifier might be getting deprecated in the futureEdDSA
alg identifier might be getting deprecated
EdDSA
alg identifier might be getting deprecatedEdDSA
JWK alg identifier might be getting deprecated
EdDSA
JWK alg identifier might be getting deprecatedEdDSA
alg identifier might be getting deprecated
Hello 👋 AFAIU from the proposal and linked draft (https://www.ietf.org/archive/id/draft-jones-jose-fully-specified-algorithms-00.html), the I don't actually quite understand why the proposal is limited to EdDSA; to me it would seem simplest to define Edit: I guess for ECDH it's a bit more complicated because they also want to include the AES-KW algorithm, as per https://www.rfc-editor.org/rfc/rfc7518#section-4.6, so they'd need X25519+A128KW, X448+A256KW, etc. (And then it wouldn't really be obvious for us which |
There are no changes to OKP JWK key
It would, alg is not a required JWK member. The X25519/448 JWKs our spec exports/imports doesn't have alg either.
|
I see, OK. I was under the impression that "crv" defined a subtype of the algorithm (i.e. defining a new algorithm would void them), but I guess it defines a subtype of the "kty" OKP; that sort of makes sense. So yeah, I think you're right; do you want to make a PR or revert the previous ones? Otherwise I can do so. |
Please do 👍 i'll do updates to WPTs |
No existing WPT is affected. Do you think we should add negative tests checking for this removed behaviour? |
Hmm.. maybe it might make sense to add a generic test checking that the fields are the same / there aren't any extra fields, instead of just checking that the |
Not sure that I got that. To check that this update was updated in an implementation we need to check that jwk export has no alg member and that the alg member is ignored during import, ie. its value can be any string. |
I meant for export specifically, you could check that there aren't any additional members/fields (beyond the ones specified), rather than adding a check that For import, indeed you could add a test that passes a different |
See https://mailarchive.ietf.org/arch/msg/jose/3REQba16DLXxxpk8IU1pF-AiTCM/, the EdDSA alg identifier might be getting deprecated in the foreseeable future.
I believe we could remove the jwk import/export steps that mention "EdDSA" in
webcrypto-secure-curves
since there's always thecrv
member present that fully specifies the key's sub type. Or we could remove the alg member from export and incorporate the new ones into import only as an option to check for, albeit with the risk of the algorithm changing during the RFC process.@twiss WDYT? I lean towards not having the
alg
member checked during import and also not exporting it, that would meant the steps are identical for all 4 algorithms in this spec.The text was updated successfully, but these errors were encountered: