Skip to content

Commit

Permalink
4.8.5 release
Browse files Browse the repository at this point in the history
  • Loading branch information
kjur committed Aug 30, 2015
1 parent 8a76304 commit cf28826
Show file tree
Hide file tree
Showing 11 changed files with 652 additions and 2,900 deletions.
6 changes: 6 additions & 0 deletions ChangeLog.txt
@@ -1,6 +1,12 @@

ChangeLog for jsrsasign

* Changes between 4.8.4 to 4.8.5
- some of small fix release for npm and jsrsasign-latest-all-min.
- jwt 3.2.3 to 3.2.4
- jws.js update for validation of jti confirming to RFC 7519
as optional in verifyJWT method. Thanks @stephanbacheller.

* Changes between 4.8.3 to 4.8.4
- some of small fix release for npm.

Expand Down
2 changes: 1 addition & 1 deletion api/files.html
Expand Up @@ -622,7 +622,7 @@ <h2><a href="symbols/src/jws-3.2.js.html">jws-3.2.js</a></h2>


<dt class="heading">Version:</dt>
<dd>3.2.3 (2015-May-29)</dd>
<dd>3.2.4 (2015-Aug-30)</dd>



Expand Down
4 changes: 2 additions & 2 deletions api/symbols/KJUR.jws.JWS.html
Expand Up @@ -1912,14 +1912,14 @@ <h4>Supported Algorithms</h4> Here is supported algorithm names for <a href="../

</div>
<div class="description">
This method verifies a<a href="https://tools.ietf.org/html/rfc7519">RFC 7519</a> JSON Web Token(JWT).It will verify following:<ul><li>Header.alg<ul><li>alg is specified in JWT header.</li><li>alg is included in acceptField.alg array. (MANDATORY)</li><li>alg is proper for key.</li></ul></li><li>Payload.iss (issuer) - Payload.iss is included in acceptField.iss array if specified. (OPTION)</li><li>Payload.sub (subject) - Payload.sub is included in acceptField.sub array if specified. (OPTION)</li><li>Payload.aud (audience) - Payload.aud is included in acceptField.aud array or the same as value if specified. (OPTION)</li><li>Time validity<ul><li>If acceptField.verifyAt as number of UNIX origin time is specifed for validation time, this method will verify at the time for it, otherwise current time will be used to verify.</li><li>Payload.exp (expire) - Validation time is smaller than Payloead.exp.</li><li>Payload.nbf (not before) - Validation time is greater than Payloead.nbf.</li><li>Payload.iat (issued at) - Validation time is greater than Payloead.iat.</li></ul></li><li>Payload.jti (JWT id) - Payload.jti is defined.</li><li>JWS signature of JWS is valid for specified key.</li></ul>
This method verifies a<a href="https://tools.ietf.org/html/rfc7519">RFC 7519</a> JSON Web Token(JWT).It will verify following:<ul><li>Header.alg<ul><li>alg is specified in JWT header.</li><li>alg is included in acceptField.alg array. (MANDATORY)</li><li>alg is proper for key.</li></ul></li><li>Payload.iss (issuer) - Payload.iss is included in acceptField.iss array if specified. (OPTION)</li><li>Payload.sub (subject) - Payload.sub is included in acceptField.sub array if specified. (OPTION)</li><li>Payload.aud (audience) - Payload.aud is included in acceptField.aud array or the same as value if specified. (OPTION)</li><li>Time validity<ul><li>If acceptField.verifyAt as number of UNIX origin time is specifed for validation time, this method will verify at the time for it, otherwise current time will be used to verify.</li><li>Payload.exp (expire) - Validation time is smaller than Payloead.exp.</li><li>Payload.nbf (not before) - Validation time is greater than Payloead.nbf.</li><li>Payload.iat (issued at) - Validation time is greater than Payloead.iat.</li></ul></li><li>Payload.jti (JWT id) - Payload.jti is included in acceptField.jti if specified. (OPTION)</li><li>JWS signature of JWS is valid for specified key.</li></ul>


</div>



<pre class="code">// simple validation for HS256isValid = KJUR.jws.JWS.verifyJWT("eyJhbG...", "616161", {alg: ["HS256"]}),// full validation for RS or PSpubkey = KEYUTIL.getKey('-----BEGIN CERT...');isValid = KJUR.jws.JWS.verifyJWT('eyJh...', pubkey, { alg: ['RS256', 'RS512', 'PS256', 'PS512'], iss: ['http://foo.com'], sub: ['mailto:john@foo.com', 'mailto:alice@foo.com'], verifyAt: KJUR.jws.IntDate.get('20150520235959Z'), aud: ['http://foo.com'], // aud: 'http://foo.com' is fine too.});</pre>
<pre class="code">// simple validation for HS256isValid = KJUR.jws.JWS.verifyJWT("eyJhbG...", "616161", {alg: ["HS256"]}),// full validation for RS or PSpubkey = KEYUTIL.getKey('-----BEGIN CERT...');isValid = KJUR.jws.JWS.verifyJWT('eyJh...', pubkey, { alg: ['RS256', 'RS512', 'PS256', 'PS512'], iss: ['http://foo.com'], sub: ['mailto:john@foo.com', 'mailto:alice@foo.com'], verifyAt: KJUR.jws.IntDate.get('20150520235959Z'), aud: ['http://foo.com'], // aud: 'http://foo.com' is fine too. jti: 'id123456'});</pre>



Expand Down
637 changes: 320 additions & 317 deletions api/symbols/src/jws-3.2.js.html

Large diffs are not rendered by default.

238 changes: 238 additions & 0 deletions jsrsasign-4.8.5-all-min.js

Large diffs are not rendered by default.

0 comments on commit cf28826

Please sign in to comment.