Sat, 02 Jul 2022 11:50:56 +0100 util.crypto: Add support for RSA signatures (PKCS1-v1.5 + PSS)
Matthew Wild <mwild1@gmail.com> [Sat, 02 Jul 2022 11:50:56 +0100] rev 12701
util.crypto: Add support for RSA signatures (PKCS1-v1.5 + PSS) These are used by the RS*** and PS*** family of JOSE algorithms (e.g. in JWTs)
Fri, 01 Jul 2022 18:51:15 +0100 util.jwt: Add support/tests for ES256 via improved API and using util.crypto
Matthew Wild <mwild1@gmail.com> [Fri, 01 Jul 2022 18:51:15 +0100] rev 12700
util.jwt: Add support/tests for ES256 via improved API and using util.crypto In many cases code will be either signing or verifying. With asymmetric algorithms it's clearer and more efficient to just state that once, instead of passing keys (and possibly other parameters) with every sign/verify call. This also allows earlier validation of the key used. The previous (HS256-only) sign/verify methods continue to be exposed for backwards-compatibility.
Thu, 30 Jun 2022 15:38:22 +0200 util.crypto: Add Teal type specification
Kim Alvefur <zash@zash.se> [Thu, 30 Jun 2022 15:38:22 +0200] rev 12699
util.crypto: Add Teal type specification
Fri, 24 Jun 2022 17:03:28 +0100 util.paseto: Implementation of PASETO v4.public tokens
Matthew Wild <mwild1@gmail.com> [Fri, 24 Jun 2022 17:03:28 +0100] rev 12698
util.paseto: Implementation of PASETO v4.public tokens PASETO provides an alternative to JWT with the promise of fewer implementation pitfalls. The v4.public algorithm allows asymmetric cryptographically-verified token issuance and validation. In summary, such tokens can be issued by one party and securely verified by any other party independently using the public key of the issuer. This has a number of potential applications in a decentralized network and ecosystem such as XMPP. For example, such tokens could be combined with XEP-0317 to allow hats to be verified even in the context of a third-party MUC service.
Fri, 24 Jun 2022 16:56:16 +0100 util.crypto: New wrapper for some operations in OpenSSL's libcrypto
Matthew Wild <mwild1@gmail.com> [Fri, 24 Jun 2022 16:56:16 +0100] rev 12697
util.crypto: New wrapper for some operations in OpenSSL's libcrypto Specifically, ED25519 key generation/import/export, sign/verify operations, and AES encrypt/decrypt.
Fri, 01 Jul 2022 15:11:08 +0100 util-src: Add new utility header managed_pointer.h
Matthew Wild <mwild1@gmail.com> [Fri, 01 Jul 2022 15:11:08 +0100] rev 12696
util-src: Add new utility header managed_pointer.h The macros in this header allow creation of GC-managed objects from manually- managed C alloc/free APIs.
Mon, 29 Aug 2022 15:58:51 +0100 mod_smacks: Set session.smacks after sending <enabled/> to fix traceback
Matthew Wild <mwild1@gmail.com> [Mon, 29 Aug 2022 15:58:51 +0100] rev 12695
mod_smacks: Set session.smacks after sending <enabled/> to fix traceback ...with opportunistic writes enabled.
Mon, 29 Aug 2022 11:47:31 +0200 core.moduleapi: Check for local role-aware sessions before e.g. s2s
Kim Alvefur <zash@zash.se> [Mon, 29 Aug 2022 11:47:31 +0200] rev 12694
core.moduleapi: Check for local role-aware sessions before e.g. s2s The condition checked for s2sin but not s2sout, so would have ignored bidi-enabled s2sout sessions. Components as well.
Mon, 29 Aug 2022 15:48:07 +0100 mod_smacks: Use new :add_error() in last remaining error result construction
Matthew Wild <mwild1@gmail.com> [Mon, 29 Aug 2022 15:48:07 +0100] rev 12693
mod_smacks: Use new :add_error() in last remaining error result construction
Mon, 29 Aug 2022 15:45:52 +0100 mod_smacks: Split enable handling to stages, to allow easier SASL2 integration
Matthew Wild <mwild1@gmail.com> [Mon, 29 Aug 2022 15:45:52 +0100] rev 12692
mod_smacks: Split enable handling to stages, to allow easier SASL2 integration
(0) -10000 -3000 -1000 -300 -100 -10 +10 +100 +300 tip