Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump the minor-changes group with 3 updates #187

Merged
merged 2 commits into from
Dec 10, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 16 additions & 16 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,9 @@ See the crate docs for more examples of usage.
for elliptic curves used in standard `ES*` algorithms).
- The `ES256` algorithm is supported via pure Rust [`p256`] crate.
- RSA algorithms (`RS*` and `PS*`) are supported via pure Rust [`rsa`] crate.
Beware that the `rsa` crate (along with other RSA implementations) may be susceptible to
[the "Marvin" timing side-channel attack](https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr)
at the time of writing; use with caution.
- The crate supports the `no_std` mode. [No-std support](e2e-tests/no-std)
and [WASM compatibility](e2e-tests/wasm) are explicitly tested.

Expand Down
5 changes: 5 additions & 0 deletions deny.toml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,11 @@ unsound = "deny"
yanked = "deny"
notice = "warn"
severity-threshold = "Medium"
ignore = [
# "Marvin" attack for the `rsa` crate; no fix is available ATM.
# A warning is added to crate readme and crate docs as a stopgap measure.
"RUSTSEC-2023-0071",
]

[licenses]
unlicensed = "deny"
Expand Down
2 changes: 1 addition & 1 deletion e2e-tests/no-std/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ panic-halt = "0.2.0"

# RSA-specific dependencies. Everything besides `rsa` is needed to set up an RNG.
getrandom = { version = "0.2", features = ["custom"], optional = true }
once_cell = { version = "1.16.0", default-features = false, optional = true }
once_cell = { version = "1.19.0", default-features = false, optional = true }
rand_chacha = { version = "0.3.1", default-features = false, optional = true }
rsa = { version = "0.9", default-features = false, optional = true }

Expand Down
2 changes: 1 addition & 1 deletion e2e-tests/wasm/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ wasm-opt = ["-Os", "--enable-mutable-globals"]
crate-type = ["cdylib", "rlib"]

[dependencies]
wasm-bindgen = "0.2.88"
wasm-bindgen = "0.2.89"

chrono = { version = "0.4.22", features = ["wasmbind"] }
serde = { version = "1.0", default-features = false, features = ["alloc", "derive"] }
Expand Down
4 changes: 4 additions & 0 deletions src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,10 @@
//! | `ES256` | [`p256`] | Pure Rust implementation |
//! | `RS*`, `PS*` (RSA) | `rsa` | Uses pure Rust [`rsa`] crate with blinding |
//!
//! Beware that the `rsa` crate (along with other RSA implementations) may be susceptible to
//! [the "Marvin" timing side-channel attack](https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr)
//! at the time of writing; use with caution.
//!
//! `EdDSA` and `ES256K` algorithms are somewhat less frequently supported by JWT implementations
//! than others since they are recent additions to the JSON Web Algorithms (JWA) suit.
//! They both work with elliptic curves
Expand Down