-
Notifications
You must be signed in to change notification settings - Fork 15
Patches #1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…rs/decrypters Make smallstep's pkcs7 fork support RSA key handles returned from any private key type that returns an RSA public key. Specifically, this addresses the need to use key handles returned by piv-go that are of the `piv.keyRSA` type. Signed-Off-By: Dan Fuhry <dan@fuhry.com>
decrypt: support for RSA keys from piv-go and other generic RSA signers/decrypters
Nisarga Patel seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account. You have signed the CLA already but the status is still pending? Let us recheck it. |
@maraino I've made this the default base branch for now. |
Changes from mozilla-services#48 are included in this commit. Slightly adapted to fit with how we work with `crypto.Decrypter`.
Currently the test suite still goes back as far as Go 1.12. This failed the test.
Addressing most of the review comments.
Add support for RSA-OAEP decryption
Add support for RSA-OAEP (key) encryption
[action] add dependabot automerge workflow
Will rename the module to @dopey regarding CI: I'll set this up with our shared workflows in that PR too. I think I'll do it in a similar way as with smallstep/scep#8, so that we have our shared workflows, as well as the old workflow that tests some older Go versions for legacy compatibility. We can drop support for those after a while, imo. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm, let's add pkcs#8 in a different PR using x509.ParsePKCS1PrivateKey()
Closing in favor of #8 |
The branch of this PR contains a selection of (existing) patches and additional functionality.