Bump jsrsasign from 8.0.12 to 8.0.19
Created by: dependabot[bot]
Bumps jsrsasign from 8.0.12 to 8.0.19.
Release notes
Sourced from jsrsasign's releases.
ECDSA signature validation maleability fix and others
- Changes from 8.0.18 to 8.0.19
- src/ecdsa-mod.js
- ECDSA.verifyHex fixed for some types of maleability (#437)
- src/asn1hex.js
- ASN1HEX.checkStrictDER added
- src/asn1x509.js
- It's founded that OpenSSL's DN representation like "/C=US/O=test" is "compat" format. So those methods are added and existing method is now deprecated.
- X500Name.{ldapToOneline, onelineToLdap} are now deprecated.
- X500Name.{ldapToCompat, compatToLdap} are added.
- src/x509.js
- update for compatToLdap and ldapToCompat
- src/crypto.js
- document update
RSA decryption and RSA signature validation maleability fix
- Changes from 8.0.17 to 8.0.18
- ext/rsa2.js
- RSADecrypt fixed for zero prepending maleability (#439)
- RSADecryptOAEP fixed for zero prepending maleability
- src/rsasign.js
- verifyWithMessageHash fixed for zero prepending maleability
- test
- qunit-do-crypto-cipher.html: some test case added for above
RSAPSS verification maleability fix and others
- Changes from 8.0.16 to 8.0.17
- src/rsasign.js
- verifyWithMessageHashPSS fixed for prepending zeros maleability (#438)
- src/asn1x509.js
- allow alternative algorithms to sign CRLs (#440)
- src/asn1cms.js
- improve CMSUtil.newSignedData helper with detached signatures (#441)
- ext/rsa2.js
- RSAGenerate fixed for not having requesting key length (#442)
- sample_node
- pemtobin was fixed for pemtohex function
- test
extended Authority/SubjectKeyIdentifier support
- Changes from 8.0.15 to 8.0.16 (2020-Mar-29)
- src/asn1x509.js
- AuthorityKeyIdentifier class
- issuerDN ASN.1 encoding bug fixed
- now keyIdentifier is automatically calculated
Changelog
Sourced from jsrsasign's changelog.
ChangeLog for jsrsasign
add CSR support for subjectAltName
- Changes From 8.0.19 to 8.0.20
- src/asn1csr.js
- CSRUtil.getInfo
- add ext parameter to show subjectAltName property
- change not to raise error when subject name is empty in CSR
- src/x509.js
- X509.parseExt
- add support for CSR extension request field
- src/asn1hex.js
- ASN1HEX.getIdxbyList
- small update for exception
- test/
- qunit-do-{asn1csr, x509}.html to add tests for above.
ECDSA signature validation maleability fix and others
- Changes from 8.0.18 to 8.0.19
- src/ecdsa-mod.js
- ECDSA.verifyHex fixed for some types of maleability (#437)
- src/asn1hex.js
- ASN1HEX.checkStrictDER added
- src/asn1x509.js
- It's founded that OpenSSL's DN representation like "/C=US/O=test" is "compat" format. So those methods are added and existing method is now deprecated.
- X500Name.{ldapToOneline, onelineToLdap} are now deprecated.
- X500Name.{ldapToCompat, compatToLdap} are added.
- src/x509.js
- update for compatToLdap and ldapToCompat
- src/crypto.js
- document update
RSA decryption and RSA signature validation maleability fix
Changes from 8.0.17 to 8.0.18
- ext/rsa2.js
- CVE-2020-14967 RSADecrypt fixed for zero prepending maleability (#439)
- RSADecryptOAEP fixed for zero prepending maleability
- src/rsasign.js
- verifyWithMessageHash fixed for zero prepending maleability
- test
- qunit-do-crypto-cipher.html: some test case added for above
Changes from 8.0.16 to 8.0.17
- src/rsasign.js
- CVE-2020-14968 verifyWithMessageHashPSS fixed for prepending zeros maleability (#438)
- src/asn1x509.js
Commits
-
59cc1cc8.0.19 release -
6efc23a8.0.18 release -
60874128.0.18 release -
861ab278.0.17 release -
3bcc088#442 RSAGenerate key length issue fix -
108c7dfcomment update -
12fdf1bMerge pull request #441 from ilmesi/master -
6fa9716Merge pull request #440 from augjoh/master -
591bb2csample_node/pemtobin fix -
02b5480Add parameter with default value to docs - Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.