-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Port OpenSSL code to use contemporary API #61
Comments
It looks like JOSE already uses EVP API, as you suggested. The major place which can not do that is JWK support. You have to define/specify new JWK types and add functions to convert them to/from |
Thanks @lumag. So we would need to extend JWK spec for that, right? |
Namely, https://tools.ietf.org/html/rfc7518 needs to be extended to add GOST to JWA registries |
I'm not sure it's so necessary. |
@beldmit amending the "JSON Web Signature and Encryption Algorithms" registry is required to add any algorithm. |
OK, so it makes sense to start adding new algorithms in JOSE RFCs. But after that we'll have a hardly maintainable case structures that should be converted in pluggable API somewhen. |
@sarroutbi I currently don't have plans related to Russian GOST and not aware of similar plans for anybody in Russia. I'm afraid tha library uses a lot of functions deprecated in OpenSSL 3.0 though... |
Hello @beldmit. Thanks for your quick response. Can this issue be closed then? |
Unfortunately, no. Did you try compile your library against openssl 3.0 with -Wdeprecated? |
Port Jose code to use contemporary OpenSSL API, allowing to use external engines and algorithms provided by them.
The text was updated successfully, but these errors were encountered: