Giter Site home page Giter Site logo

node-jws's Introduction

node-jws Build Status

An implementation of JSON Web Signatures.

This was developed against draft-ietf-jose-json-web-signature-08 and implements the entire spec except X.509 Certificate Chain signing/verifying (patches welcome).

There are both synchronous (jws.sign, jws.verify) and streaming (jws.createSign, jws.createVerify) APIs.

Install

$ npm install jws

Usage

jws.ALGORITHMS

Array of supported algorithms. The following algorithms are currently supported.

alg Parameter Value Digital Signature or MAC Algorithm
HS256 HMAC using SHA-256 hash algorithm
HS384 HMAC using SHA-384 hash algorithm
HS512 HMAC using SHA-512 hash algorithm
RS256 RSASSA using SHA-256 hash algorithm
RS384 RSASSA using SHA-384 hash algorithm
RS512 RSASSA using SHA-512 hash algorithm
PS256 RSASSA-PSS using SHA-256 hash algorithm
PS384 RSASSA-PSS using SHA-384 hash algorithm
PS512 RSASSA-PSS using SHA-512 hash algorithm
ES256 ECDSA using P-256 curve and SHA-256 hash algorithm
ES384 ECDSA using P-384 curve and SHA-384 hash algorithm
ES512 ECDSA using P-521 curve and SHA-512 hash algorithm
none No digital signature or MAC value included

jws.sign(options)

(Synchronous) Return a JSON Web Signature for a header and a payload.

Options:

  • header
  • payload
  • secret or privateKey
  • encoding (Optional, defaults to 'utf8')

header must be an object with an alg property. header.alg must be one a value found in jws.ALGORITHMS. See above for a table of supported algorithms.

If payload is not a buffer or a string, it will be coerced into a string using JSON.stringify.

Example

const signature = jws.sign({
  header: { alg: 'HS256' },
  payload: 'h. jon benjamin',
  secret: 'has a van',
});

jws.verify(signature, algorithm, secretOrKey)

(Synchronous) Returns true or false for whether a signature matches a secret or key.

signature is a JWS Signature. header.alg must be a value found in jws.ALGORITHMS. See above for a table of supported algorithms. secretOrKey is a string or buffer containing either the secret for HMAC algorithms, or the PEM encoded public key for RSA and ECDSA.

Note that the "alg" value from the signature header is ignored.

jws.decode(signature)

(Synchronous) Returns the decoded header, decoded payload, and signature parts of the JWS Signature.

Returns an object with three properties, e.g.

{ header: { alg: 'HS256' },
  payload: 'h. jon benjamin',
  signature: 'YOWPewyGHKu4Y_0M_vtlEnNlqmFOclqp4Hy6hVHfFT4'
}

jws.createSign(options)

Returns a new SignStream object.

Options:

  • header (required)
  • payload
  • key || privateKey || secret
  • encoding (Optional, defaults to 'utf8')

Other than header, all options expect a string or a buffer when the value is known ahead of time, or a stream for convenience. key/privateKey/secret may also be an object when using an encrypted private key, see the crypto documentation.

Example:

// This...
jws.createSign({
  header: { alg: 'RS256' },
  privateKey: privateKeyStream,
  payload: payloadStream,
}).on('done', function(signature) {
  // ...
});

// is equivalent to this:
const signer = jws.createSign({
  header: { alg: 'RS256' },
});
privateKeyStream.pipe(signer.privateKey);
payloadStream.pipe(signer.payload);
signer.on('done', function(signature) {
  // ...
});

jws.createVerify(options)

Returns a new VerifyStream object.

Options:

  • signature
  • algorithm
  • key || publicKey || secret
  • encoding (Optional, defaults to 'utf8')

All options expect a string or a buffer when the value is known ahead of time, or a stream for convenience.

Example:

// This...
jws.createVerify({
  publicKey: pubKeyStream,
  signature: sigStream,
}).on('done', function(verified, obj) {
  // ...
});

// is equivilant to this:
const verifier = jws.createVerify();
pubKeyStream.pipe(verifier.publicKey);
sigStream.pipe(verifier.signature);
verifier.on('done', function(verified, obj) {
  // ...
});

Class: SignStream

A Readable Stream that emits a single data event (the calculated signature) when done.

Event: 'done'

function (signature) { }

signer.payload

A Writable Stream that expects the JWS payload. Do not use if you passed a payload option to the constructor.

Example:

payloadStream.pipe(signer.payload);

signer.secret
signer.key
signer.privateKey

A Writable Stream. Expects the JWS secret for HMAC, or the privateKey for ECDSA and RSA. Do not use if you passed a secret or key option to the constructor.

Example:

privateKeyStream.pipe(signer.privateKey);

Class: VerifyStream

This is a Readable Stream that emits a single data event, the result of whether or not that signature was valid.

Event: 'done'

function (valid, obj) { }

valid is a boolean for whether or not the signature is valid.

verifier.signature

A Writable Stream that expects a JWS Signature. Do not use if you passed a signature option to the constructor.

verifier.secret
verifier.key
verifier.publicKey

A Writable Stream that expects a public key or secret. Do not use if you passed a key or secret option to the constructor.

TODO

  • It feels like there should be some convenience options/APIs for defining the algorithm rather than having to define a header object with { alg: 'ES512' } or whatever every time.

  • X.509 support, ugh

License

MIT

Copyright (c) 2013-2015 Brian J. Brennan

Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:

The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

node-jws's People

Contributors

andygout avatar brianloveswords avatar calinou avatar fearphage avatar forivall avatar frantello avatar graingert avatar marco-c avatar markherhold avatar olleolleolle avatar omsmith avatar ralphtheninja avatar shane-tomlinson avatar simonexmachina avatar sre-57-opslevel[bot] avatar tanepiper avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

node-jws's Issues

base64 encoded tokens (with padding) rejected

I have tokens that appear to have been generated using base64 encoding instead of base64url encoding (3rd party auth system) and line 8 of verify-stream.js defines the pattern which the token must match. That doesn't currently include '=' padding, which is causing these tokens to be rejected as invalid.

I'm reading through the spec, and while it's pretty clear that token issuers should not include padding, it also appears to recommend that validation should allow for padding.

Thoughts?

x5c support

I have a couple JWTs that use x5c in the headers (Android SafetyNet attestation, FIDO Metadata Service). Would it be possible to add validation of JWS that's using x5c?

Here's the Android SafetyNet JWS:

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.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.iCF6D2os8DYuDVOnt3zDJB2mSXnZjtWJtl_jzSDx5MrRC9A2fmFBZ6z5kpQZ2MiQ7ootj9WkHMgxqIhrX3dlh2POHAwkIS34ySjLVNsSPprE84eZgqSFLMEYT0GR2eVLHAMPN8n5R8K6buDOGF3nSi6GKzG57Zll8CSob2yiAS9r7spdA6H0TDH-NGzSdbMIId8fZD1dzFKNQr77b6lbIAFgQbRZBrnp-e-H4iH6d21oN2NAYRnR5YURacP6kGGj2cFxswE2908wxv9hiYNKNojeeu8Xc4It7PbhlAuO7ywhQFA81iPCCFm11B8cfUXbWA8l_2ttNPBEMGM6-Z6VyQ

And the FIDO MDS JWT:

eyJhbGciOiAiRVMyNTYiLCAidHlwIjogIkpXVCIsICJ4NWMiOiBbIk1JSUNuVENDQWtPZ0F3SUJBZ0lPUnZDTTFhdVU2RllWWFVlYkpIY3dDZ1lJS29aSXpqMEVBd0l3VXpFTE1Ba0dBMVVFQmhNQ1ZWTXhGakFVQmdOVkJBb1REVVpKUkU4Z1FXeHNhV0Z1WTJVeEhUQWJCZ05WQkFzVEZFMWxkR0ZrWVhSaElGUlBReUJUYVdkdWFXNW5NUTB3Q3dZRFZRUURFd1JEUVMweE1CNFhEVEUxTURneE9UQXdNREF3TUZvWERURTRNRGd4T1RBd01EQXdNRm93WkRFTE1Ba0dBMVVFQmhNQ1ZWTXhGakFVQmdOVkJBb1REVVpKUkU4Z1FXeHNhV0Z1WTJVeEhUQWJCZ05WQkFzVEZFMWxkR0ZrWVhSaElGUlBReUJUYVdkdWFXNW5NUjR3SEFZRFZRUURFeFZOWlhSaFpHRjBZU0JVVDBNZ1UybG5ibVZ5SURNd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTS1grcDNXMmoxR1Y0bFF3bjdIWE5qNGxoOWUyd0FhNko5dEJJUWhiUVRrcU12TlpHbkh4T243eVRaM05wWU81WkdWZ3IvWEM2NnFsaTdCV0E4amdUZm80SHBNSUhtTUE0R0ExVWREd0VCL3dRRUF3SUd3REFNQmdOVkhSTUJBZjhFQWpBQU1CMEdBMVVkRGdRV0JCUmNrTkYrenp4TXVMdm0rcVJqTGVKUWYwRHd5ekFmQmdOVkhTTUVHREFXZ0JScEVWNHRhV1NGblphNDF2OWN6Yjg4ZGM5TUdEQTFCZ05WSFI4RUxqQXNNQ3FnS0tBbWhpUm9kSFJ3T2k4dmJXUnpMbVpwWkc5aGJHeHBZVzVqWlM1dmNtY3ZRMEV0TVM1amNtd3dUd1lEVlIwZ0JFZ3dSakJFQmdzckJnRUVBWUxsSEFFREFUQTFNRE1HQ0NzR0FRVUZCd0lCRmlkb2RIUndjem92TDIxa2N5NW1hV1J2WVd4c2FXRnVZMlV1YjNKbkwzSmxjRzl6YVhSdmNua3dDZ1lJS29aSXpqMEVBd0lEU0FBd1JRSWhBTExiWWpCcmJoUGt3cm4zbVFqQ0VSSXdrTU5OVC9sZmtwTlhIKzR6alVYRUFpQmFzMmxQNmpwNDRCaDRYK3RCWHFZN3k2MWlqR1JJWkNhQUYxS0lsZ3ViMGc9PSIsICJNSUlDc2pDQ0FqaWdBd0lCQWdJT1JxbXhrOE5RdUpmQ0VOVllhMVF3Q2dZSUtvWkl6ajBFQXdNd1V6RUxNQWtHQTFVRUJoTUNWVk14RmpBVUJnTlZCQW9URFVaSlJFOGdRV3hzYVdGdVkyVXhIVEFiQmdOVkJBc1RGRTFsZEdGa1lYUmhJRlJQUXlCVGFXZHVhVzVuTVEwd0N3WURWUVFERXdSU2IyOTBNQjRYRFRFMU1EWXhOekF3TURBd01Gb1hEVFF3TURZeE56QXdNREF3TUZvd1V6RUxNQWtHQTFVRUJoTUNWVk14RmpBVUJnTlZCQW9URFVaSlJFOGdRV3hzYVdGdVkyVXhIVEFiQmdOVkJBc1RGRTFsZEdGa1lYUmhJRlJQUXlCVGFXZHVhVzVuTVEwd0N3WURWUVFERXdSRFFTMHhNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUU5c0RnQzhQekJZbC93S3FwWGZhOThqT0lvNzhsOXB6NHhPekdER0l6MHpFWE1Yc0JZNmtBaHlVNEdSbVQwd280dHlVdng1Qlk4T0tsc0xNemxiS01SYU9CN3pDQjdEQU9CZ05WSFE4QkFmOEVCQU1DQVFZd0VnWURWUjBUQVFIL0JBZ3dCZ0VCL3dJQkFEQWRCZ05WSFE0RUZnUVVhUkZlTFdsa2haMld1TmIvWE0yL1BIWFBUQmd3SHdZRFZSMGpCQmd3Rm9BVTBxVWZDNmYyWXNoQTFOaTl1ZGVPMFZTN3ZFWXdOUVlEVlIwZkJDNHdMREFxb0NpZ0pvWWthSFIwY0RvdkwyMWtjeTVtYVdSdllXeHNhV0Z1WTJVdWIzSm5MMUp2YjNRdVkzSnNNRThHQTFVZElBUklNRVl3UkFZTEt3WUJCQUdDNVJ3QkF3RXdOVEF6QmdnckJnRUZCUWNDQVJZbmFIUjBjSE02THk5dFpITXVabWxrYjJGc2JHbGhibU5sTG05eVp5OXlaWEJ2YzJsMGIzSjVNQW9HQ0NxR1NNNDlCQU1EQTJnQU1HVUNNQkxWcTBKZFd2MnlZNFJwMUlpeUlWV0VLRzFQVHoxcFBBRnFFbmFrUHR3NFJNUlRHd0hkYjJpZmNEYlBvRWtmWVFJeEFPTGtmRVBqMjJmQm5lajF3dGd5eWxzdTczcktMVXY0eGhEeTlUQWVWVW1sMGlEQk04U3RFNERpVnMvNGVqRmhxUT09Il19.{"nextUpdate": "2018-06-18", "no": 62, "entries": [{"url": "https://mds.fidoalliance.org/metadata/0013%230001", "timeOfLastStatusChange": "2015-05-20", "hash": "06LZxJ5mNuNZj48IZLV816bfp3A7GVtO2O-EeQ1pkTY=", "aaid": "0013#0001", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-05-20"}]}, {"url": "https://mds.fidoalliance.org/metadata/0013%230061", "timeOfLastStatusChange": "2015-12-22", "hash": "gW89T1g92RfWTn2jXaPo-sNSimg4ypjghog0GnMDP5c=", "aaid": "0013#0061", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0013%230071", "timeOfLastStatusChange": "2015-12-22", "hash": "naDBoNwd4A1xbKgqmIPIo34DcroNOibj2L-QAtlN4MM=", "aaid": "0013#0071", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0013%230084", "timeOfLastStatusChange": "2015-12-22", "hash": "c7-gOx1NAaL_kquWEiwWuVX4-hhkd3Me64DJwxXPEpo=", "aaid": "0013#0084", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0014%23FFF1", "timeOfLastStatusChange": "2016-11-22", "hash": "VUtIkPXyhkmFFc1GjTrgFX0gZqd_WxPvsi2gcs9T_3I=", "aaid": "0014#FFF1", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-09-25"}, {"status": "REVOKED", "url": "", "certificate": "", "effectiveDate": "2016-11-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0014%23FFF2", "timeOfLastStatusChange": "2016-11-22", "hash": "uH2hE1T8uIBhnF7Frn3qK8KB8JKI-ZJbpsRPmycHffs=", "aaid": "0014#FFF2", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-09-30"}, {"status": "REVOKED", "url": "", "certificate": "", "effectiveDate": "2016-11-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0014%23FFF3", "timeOfLastStatusChange": "2016-11-22", "hash": "maQyhIodIijkYi2Hysv-hhVp-jS2H-NkZ0nfZeDIoPs=", "aaid": "0014#FFF3", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-10-31"}, {"status": "REVOKED", "url": "", "certificate": "", "effectiveDate": "2016-11-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0015%230002", "timeOfLastStatusChange": "2016-01-08", "hash": "i8_wcw1aWDRiFUQek_lb068EuLUcShLjrxcJW0B8OvY=", "aaid": "0015#0002", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-01-08"}]}, {"url": "https://mds.fidoalliance.org/metadata/0015%230005", "timeOfLastStatusChange": "2017-02-08", "hash": "Q1dqUrMpStpBA2jrtrRzFKyjlVsdiIgrMOmx5tu_bZw=", "aaid": "0015#0005", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-08"}]}, {"url": "https://mds.fidoalliance.org/metadata/0016%230001", "timeOfLastStatusChange": "2015-07-21", "hash": "uyjDJpNJoKN9C2hq8I-wgUxkduwAWXQQC9uqkTuGzNk=", "aaid": "0016#0001", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-07-21"}]}, {"url": "https://mds.fidoalliance.org/metadata/0016%230003", "timeOfLastStatusChange": "2016-02-10", "hash": "tTeheLD3GKGjxfbvV2doO_nUlgy4qycJ42xGBZTNvxY=", "aaid": "0016#0003", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-10"}]}, {"url": "https://mds.fidoalliance.org/metadata/0016%230010", "timeOfLastStatusChange": "2016-02-10", "hash": "Ryk4zzGHEt3Ha8nOCRwZZ4U8zTWJyxqNqB4zSpdGGy4=", "aaid": "0016#0010", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-10"}]}, {"url": "https://mds.fidoalliance.org/metadata/0016%230020", "timeOfLastStatusChange": "2016-02-10", "hash": "pXAY-CNDWKbT-fU-GrQFAdrxDCns7GU5CrZ-QDnnSdA=", "aaid": "0016#0020", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-10"}]}, {"url": "https://mds.fidoalliance.org/metadata/0017%230400", "timeOfLastStatusChange": "2015-12-27", "hash": "9H57fGLa2f1aCMpH-qsYtWMT_iUUHtc8d8SYonAnTo8=", "aaid": "0017#0400", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-27"}]}, {"url": "https://mds.fidoalliance.org/metadata/0019%230005", "timeOfLastStatusChange": "2015-07-22", "hash": "lfJkNaAGAebZzoNz_0IZQwxVUgPuXSUI2pb3BlNlYvk=", "aaid": "0019#0005", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-07-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0019%231005", "timeOfLastStatusChange": "2017-02-10", "hash": "_ZtbhNsskXud6mra28yOTyjLDzQUvGl9In-FZb2Xi44=", "aaid": "0019#1005", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-10"}]}, {"url": "https://mds.fidoalliance.org/metadata/0019%231009", "timeOfLastStatusChange": "2017-02-10", "hash": "KBtnvu3JccYtCCIfduW1HWzuLVerZ9RRBYgrMaBjB24=", "aaid": "0019#1009", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-10"}]}, {"url": "https://mds.fidoalliance.org/metadata/001B%230001", "timeOfLastStatusChange": "2016-01-01", "hash": "pQV2bR9-IMDaGFZJC6BKatf93tIPTfSvklTvGLjn8DA=", "aaid": "001B#0001", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-01-01"}]}, {"url": "https://mds.fidoalliance.org/metadata/001D%230001", "timeOfLastStatusChange": "2017-03-31", "hash": "XHc32UXefvsPOZz-CNaN_dSXPPXinDCbQzJjE6ZYjRw=", "aaid": "001D#0001", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-31"}]}, {"url": "https://mds.fidoalliance.org/metadata/001D%230002", "timeOfLastStatusChange": "2017-05-04", "hash": "ascUXlpw7C0rctQFhCR5EbKnc-sVNLOPYqwP13N96i8=", "aaid": "001D#0002", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-05-04"}]}, {"url": "https://mds.fidoalliance.org/metadata/001D%231001", "timeOfLastStatusChange": "2017-03-28", "hash": "brYb6k7ZrKdc7Ax1QTC8dwzCw9rV1Jx1ZIxkwkDBOQ8=", "aaid": "001D#1001", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-28"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230001", "timeOfLastStatusChange": "2016-03-31", "hash": "6yrrrgNdbivZ7I-F4BRpDxVY7XsDq9XBVtLrv1PwgqQ=", "aaid": "001E#0001", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-31"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230002", "timeOfLastStatusChange": "2016-01-18", "hash": "6v7IC3k2MnQsr4XcXXwW_sNpQi-UZnK5lkueHuyJpdE=", "aaid": "001E#0002", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-01-18"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230003", "timeOfLastStatusChange": "2016-02-04", "hash": "6HeScxAZZ_u0AgO7dmgo088GFoylNBWtTb3AcT-C2hk=", "aaid": "001E#0003", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-04"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230004", "timeOfLastStatusChange": "2016-02-04", "hash": "7fZDc0ERq4FuSWzpI1Lkpry98Yebzt5NyU8myEuMlh0=", "aaid": "001E#0004", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-04"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230005", "timeOfLastStatusChange": "2016-02-04", "hash": "xoZsBh5svvicjp7l85EHGrrDcRAHyXGyfrTZW6ig1Yw=", "aaid": "001E#0005", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-04"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230006", "timeOfLastStatusChange": "2016-02-04", "hash": "kqa_-9q8SmDYJfy4FoqSfjHYDiZa7DXNJ4OKxkRqqHs=", "aaid": "001E#0006", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-04"}]}, {"url": "https://mds.fidoalliance.org/metadata/001E%230007", "timeOfLastStatusChange": "2016-03-21", "hash": "84vdt0Rz4TD_s6aBJIhSmCVOJWtSghK8fEzJruR09tM=", "aaid": "001E#0007", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-21"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A111", "timeOfLastStatusChange": "2016-11-22", "hash": "xIE5Teo_NRwpk15ALIDkTXTucwtoe1yRzxXS5BbCsXU=", "aaid": "0020#A111", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-11-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A201", "timeOfLastStatusChange": "2016-02-12", "hash": "hWG6xG20tN6GNu6sCHf0g5Z6XtkE3fEakk5pAyjP0YM=", "aaid": "0020#A201", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-12"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A202", "timeOfLastStatusChange": "2016-02-12", "hash": "yK4jTMAJQY2l-WWI6mBZgfBZZNJKg17VxSrofOLEXHQ=", "aaid": "0020#A202", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-12"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A203", "timeOfLastStatusChange": "2016-02-12", "hash": "0bK_CCfCMgtiayjem9e7qkYCqbhl9sr0ph3mdyIJ_DA=", "aaid": "0020#A203", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-12"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A204", "timeOfLastStatusChange": "2015-12-22", "hash": "eh7V4piN_U5Bc_flPY386FchRw5W3uAxu0j83qB2Y1o=", "aaid": "0020#A204", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A205", "timeOfLastStatusChange": "2016-02-12", "hash": "XeFOiMk6j1hhNa2mxXGUh2rzq-QfvNpQ6wEp6VhSMZc=", "aaid": "0020#A205", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-12"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23A206", "timeOfLastStatusChange": "2016-02-12", "hash": "-74n1J2am5djXatYoHTkyvxapiQXKU1MC4Hn_5F0FQI=", "aaid": "0020#A206", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-02-12"}]}, {"url": "https://mds.fidoalliance.org/metadata/0020%23B204", "timeOfLastStatusChange": "2015-12-22", "hash": "UB96twC_HvqJPXCNB1aXwylsgOFrWgTb-yhOJ-nYI2k=", "aaid": "0020#B204", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0028%230001", "timeOfLastStatusChange": "2016-03-21", "hash": "CfY8r-OS66kX4BMRAYnBUqQGS74lI6W-7H4sCaZlE8g=", "aaid": "0028#0001", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-21"}]}, {"url": "https://mds.fidoalliance.org/metadata/0031%230001", "timeOfLastStatusChange": "2017-03-22", "hash": "daRyZ1HJB1mvV0hKDIlt9LoqhgSTpjj9cvpOcfVwV5Q=", "aaid": "0031#0001", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0031%230002", "timeOfLastStatusChange": "2017-03-22", "hash": "UPAhTy5FxELFMuGNNm38V1tEDW5ZqW82jV1dc--6T1k=", "aaid": "0031#0002", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-22"}]}, {"url": "https://mds.fidoalliance.org/metadata/0037%230001", "timeOfLastStatusChange": "2017-11-28", "hash": "D4aSBma2_LWdWfiJHgmnv8Tc1ER6ftAGUqqTohEgZHg=", "aaid": "0037#0001", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-11-28"}]}, {"url": "https://mds.fidoalliance.org/metadata/096E%230004", "timeOfLastStatusChange": "2017-01-04", "hash": "AgN2UlIKA4W01ngWDdyYYsXV43_W0qhBTd1aCZLgOIE=", "aaid": "096E#0004", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-01-04"}]}, {"url": "https://mds.fidoalliance.org/metadata/1EA8%238081", "timeOfLastStatusChange": "2017-04-07", "hash": "jTVAVSWGfN63yK6GBAd5xgNMDaavx4ytfl7A-R85ATk=", "aaid": "1EA8#8081", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-04-07"}]}, {"url": "https://mds.fidoalliance.org/metadata/4746%233208", "timeOfLastStatusChange": "2016-06-07", "hash": "DuuG4hxBhe-JoxOn8SzOcfW0m5O6MXNB3tVhsOqu1c8=", "aaid": "4746#3208", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-06-07"}]}, {"url": "https://mds.fidoalliance.org/metadata/4746%235206", "timeOfLastStatusChange": "2017-03-09", "hash": "olC6zN12P1i_7UqFpLnfHXAzUmmka1YyUk_V_EwZr8c=", "aaid": "4746#5206", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-09"}]}, {"url": "https://mds.fidoalliance.org/metadata/4746%23F816", "timeOfLastStatusChange": "2015-10-12", "hash": "PwhcRAxwjQxlwqoWoLhkEa-5uvOm4IDPMwFGL5kLDCs=", "aaid": "4746#F816", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-10-12"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%234005", "timeOfLastStatusChange": "2015-09-15", "hash": "jIFRspPdFbB6moFByGbzSuk_H2MPiqaOzdT1gzfnBOc=", "aaid": "4e4e#4005", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-09-15"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%234006", "timeOfLastStatusChange": "2016-03-14", "hash": "O2j4C7Flrtw-ddVGl1VcCjfvXaqCcw9nPwB0H0XzPJ8=", "aaid": "4e4e#4006", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%234009", "timeOfLastStatusChange": "2016-03-14", "hash": "eyLMF445cPL_TKscfYGeYrb-bYX02DnAdilw0KLGMLo=", "aaid": "4e4e#4009", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%23400a", "timeOfLastStatusChange": "2016-03-14", "hash": "VYqidG8Y8d9D6F7AreQiirOUUwKZj157EjDdUigFCos=", "aaid": "4e4e#400a", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%23400b", "timeOfLastStatusChange": "2016-03-14", "hash": "DSe_Ge8BJ-exVWDQx4PS_eddEebyNn0QKfFR1eTSBSw=", "aaid": "4e4e#400b", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%234010", "timeOfLastStatusChange": "2016-03-14", "hash": "0hIIbR4jegPdXCV3Ff-blc0u-RmYZzARuj4AUbKTGqw=", "aaid": "4e4e#4010", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/4e4e%234011", "timeOfLastStatusChange": "2016-03-14", "hash": "mUK8rUDkGASjp5C61PQCEmSxRoNI5iY2cZCnD0zy9gg=", "aaid": "4e4e#4011", "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2016-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/9zMUFaoTE82iWu9uJ4NxZ8", "hash": "ECS-jtrrH2h2JLFxq1HeI7et2WWE8tV6GsR3U9vskqs=", "timeOfLastStatusChange": "2017-11-28", "attestationCertificateKeyIdentifiers": ["923881fe2f214ee465484371aeb72e97f5a58e0a"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-11-28"}]}, {"url": "https://mds.fidoalliance.org/metadata/bbEPmd36hrosiVbxBZcG7f", "hash": "GWAKlKfVl10-h2iPB_nchbefarrbd1fToXIv1Y8cKWY=", "timeOfLastStatusChange": "2017-02-11", "attestationCertificateKeyIdentifiers": ["941b67384ff03330b70dcca58f721632f04726d2"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-11"}]}, {"url": "https://mds.fidoalliance.org/metadata/Bz2DLGtxPc4dSDFkeZ6BTC", "hash": "Yi727IE-ERdlBHOerPNxra1i6kNrjjPZ_hw5Dd_qQBo=", "timeOfLastStatusChange": "2017-01-24", "attestationCertificateKeyIdentifiers": ["418377e213db14abc6509db5e10c9598b42f92ea"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-01-24"}]}, {"url": "https://mds.fidoalliance.org/metadata/DAB8%230011", "timeOfLastStatusChange": "2015-10-02", "hash": "y4iOJZuKLv1EXkuWAQkXQuAx3nb8LvBtWx9JLqiVB68=", "aaid": "DAB8#0011", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-10-02"}]}, {"url": "https://mds.fidoalliance.org/metadata/DAB8%231011", "timeOfLastStatusChange": "2015-12-23", "hash": "anuMQhZzKRzFHJ2wZiYUvG1rQqm87uaNCxRMPxwDVyI=", "aaid": "DAB8#1011", "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2015-12-23"}]}, {"url": "https://mds.fidoalliance.org/metadata/eS7v8sum4jxp7kgLQ5Qqcg", "hash": "RDzwtYClWUyarU-7YsKc87SbJRKrtn8CzHuia23PFnw=", "timeOfLastStatusChange": "2017-03-14", "attestationCertificateKeyIdentifiers": ["d5db4dd48fe46afd8af8f1f7cfbdee61640bbbcc", "55464d5bea84e7073074b21d1204934358c7db4d"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-14"}]}, {"url": "https://mds.fidoalliance.org/metadata/FbFZ2KFvi9BCrUdSsZJDRe", "hash": "UlKtQIyhiuw4Tz2Hs_U70DiboFsV-AbVKNxKTNUMjsI=", "timeOfLastStatusChange": "2017-02-08", "attestationCertificateKeyIdentifiers": ["d3a1598c09dcd51142973f1bb7c8bd652e93b105"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-08"}]}, {"url": "https://mds.fidoalliance.org/metadata/JKP5CiDehdMMPwtG5i7to5", "hash": "BMb6U9KIlALenQBo2KF_3IgM5ddiOKfIO0IW5S_r83w=", "timeOfLastStatusChange": "2017-03-02", "attestationCertificateKeyIdentifiers": ["a5a3530e03a0f2118399ac0b6c3c9d552a0d34f8"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-02"}]}, {"url": "https://mds.fidoalliance.org/metadata/mNSPLuzgyDaVAzUG7HAEN9", "hash": "ecZcxIXp24XyYbGIdbmu7NhJg4G3p6qxQTaQW08nwrc=", "timeOfLastStatusChange": "2018-04-13", "attestationCertificateKeyIdentifiers": ["2d0188b9e2552fee0ab6a612641de966841ebe2b", "1ea89c916d2ac3cf262b7832299c48d8b48ce323"], "statusReports": [{"status": "NOT_FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2018-04-13"}]}, {"url": "https://mds.fidoalliance.org/metadata/N9Uo7W4cNnva72LqwGJRnd", "hash": "eVdKElX2jex4_RhEeq1uib18FpOpf0QCP48rQX1bENc=", "timeOfLastStatusChange": "2017-02-20", "attestationCertificateKeyIdentifiers": ["6bab19c6c097f19060ce5404000380c32fa6a8e6"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-20"}]}, {"url": "https://mds.fidoalliance.org/metadata/uPTfqAPbaZsCt2vyeuTjzK", "hash": "vSQ2lVgA6J1o80It1C-yo5YXi3KAmmyFRrVdoIb5L_c=", "timeOfLastStatusChange": "2017-11-28", "attestationCertificateKeyIdentifiers": ["6cd99d8b0abfa6a4378138a1475f7e46df217a25", "7a8fe37a42bbf2a5b3e6574d6f04bdbc55e59047", "c10bc4c6f614b63371d929596ededde3e458404d", "76e47b47e32814aaa6a87c280cfcbd527881a404"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-11-28"}]}, {"url": "https://mds.fidoalliance.org/metadata/V4fzAdVFDjQ8xgy4vk2DsQ", "hash": "D0Lkw8H6_A6PU6HiR7cnVvlI7NvAoSID9ZFtYO0bpms=", "timeOfLastStatusChange": "2017-02-08", "attestationCertificateKeyIdentifiers": ["c88871a438ef97c4d83207d6f16113927af8ef3a"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-02-08"}]}, {"url": "https://mds.fidoalliance.org/metadata/WRD8z2WRy9Le4NemGUK6vA", "hash": "2bzCVBePcHuwk17cnt5UqBKojdaJbYUKijF4tmEq3Ws=", "timeOfLastStatusChange": "2018-02-09", "attestationCertificateKeyIdentifiers": ["5fbc4ba753052187aab3c741d1f9ec6fb3c4d875", "2eb9ff3572f67628d1291a3b57924f818aad9e72"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2018-02-09"}]}, {"url": "https://mds.fidoalliance.org/metadata/yMUFCP2qzjsYsbHgEYZSV9", "hash": "6JnYkz4TD8uwsHeQSp8-_YFmhdA-p0kaNH_7mqB_0cs=", "timeOfLastStatusChange": "2017-03-23", "attestationCertificateKeyIdentifiers": ["fbec12c428774d31be4d77236758ea3c041a2ed0"], "statusReports": [{"status": "FIDO_CERTIFIED", "url": "", "certificate": "", "effectiveDate": "2017-03-23"}]}]}.XUDpXgWFEy2r2vvJVsk3pxADqu53nGsiF36F6q9aZFqJ_0b6X0eTS_xUggV61vFgX3_FLYtxpwJlBSSdw1__yQ

See also: auth0/node-jsonwebtoken#314

Add JWK(s) support?

Are you interested in supporting JSON web keys? There seem to be people who want it (auth0/node-jsonwebtoken#43).

I wrote the jws-jwk module to add such support, but it would be better to have the functionality built in for the issue I referenced.

If you want this functionality added, I can generate a pull request for it. I just do not want to spend the time if you have no interest.

Support (RFC7797) Unencoded Payload Option

RFC7797 defines an extension to JSON Web Signatures to allow unencoded payloads.

Additional features

Recommended API Changes

Add opts.detached

Default: false. When opts.detached === false, the payload is omitted from the payload. The separators remain where it would usually be. E.g.,

eyJhbGciOiJIUzI1NiIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..A5dxf2s96_n5FLueVuW1Z_vh161FwXZC4YLPff6

Add opts.header.b64

Default: true. When b64 is false, the payload will not be encoded prior to signing.

Since, unencoded and detached are most useful together for large bodies, we would stream the data to sign. This would require a change to jwa in order to support this.

Signature verification (PS256) succeeds in Node.js but fails in jwt.io debugger

I wrote a test script with which I'm signing and then verifying a JWT with the PS256 algorithm.

My code verifies the JWT successfully, but the verification fails in the jwt.io debugger.

This only happens when using PS256. There are no issues when I use RS256 instead.

I'm using [email protected].

Am I doing anything wrong?

I generated my keys with:

openssl genpkey -algorithm RSA -out private_key2.pem -pkeyopt rsa_keygen_bits:2048
openssl rsa -pubout -in private_key2.pem -out public_key2.pem

Code:

const { join } = require('path');
const { readFileSync } = require('fs');
const jws = require('jws');

const ALG = 'PS256';

/**********
 * SIGNING
 **********/

const PRIVATE_KEY_PATH = join(__dirname, './keys/private_key2.pem');

const privateKey = readFileSync(PRIVATE_KEY_PATH).toString();

const payload = {
  foo: 'bar',
};

const token = jws.sign({
  header: { alg: ALG },
  payload,
  privateKey,
})

console.log('Token:');
console.log(token);

/************
 * VERIFYING
 ************/

const PUBLIC_KEY_PATH = join(__dirname, './keys/public_key2.pem');

const publicKey = readFileSync(PUBLIC_KEY_PATH).toString();

const result = jws.verify(token, ALG, publicKey);
if (result) {
  console.log('Verification successful.');
} else {
  console.error('Verification failed.');
}

Private key:

-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

Public key:

-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz0fAg//VfX3XUbzJOfdC
bblOIT0/Yjw/5mHlnb1E25Ddoj6YOiwwAwZ7c/CPQs04QpIB5g0IYePUMwDjYh38
h4Sk+hxyAUu/MBln4RPbnhbZL9fcYrLxSUwzuiJZRhTIoqI/AJLzicGmPuWSkhRt
9ldIDGoJTUjUzoeSiug7MYHR9inzM5+rhcCZL7M9asD4iDbv66rzkDziCiQmzRwT
oP0r4T1gUhBQwvQJC5t2o4RgHJ0pVotCoFBc+4h7lEerOBi3ZHONLgKKGBMRFrGc
qAck9fLV5Z9oTwLxNQLWtj0m7Sx7sLzELeL82YvNCuAV6joqrzTKNQNWk6EkJ5js
LQIDAQAB
-----END PUBLIC KEY-----

Decode jws header

Is it possible to decode the header without knowing the algorithm?

Modifying payload hash causes crash

Original Token
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzaXRlIjoidGVzdCIsImlhdCI6MTUwNzE1Nzg1M30.imUNKrBoBpoYRrpNaar7aPUTEHOCyzeQhwM488WzJb8

Mod Token
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eMODIFYINGyJzaXRlIjoidGVzdCIsImlhdCI6MTUwNzE1Nzg1M30.imUNKrBoBpoYRrpNaar7aPUTEHOCyzeQhwM488WzJb8

undefined:1
y�ͥє��ѕ�Ј����Ј������������
^

SyntaxError: Unexpected token y in JSON at position 0
    at JSON.parse (<anonymous>)
    at Object.jwsDecode [as decode] (/Users/fran/Projects/testjwtissue/node_modules/jws/lib/verify-stream.js:71:20)
    at Object.module.exports [as decode] (/Users/fran/Projects/testjwtissue/node_modules/jsonwebtoken/decode.js:5:21)
    at middleware (/Users/fran/Projects/testjwtissue/node_modules/restify-jwt-community/lib/index.js:70:24)

Matching jwt token against a regex

Hey Guys,

We are facing some issues with the jsonwebtoken library when we create our own token following the JWT standards (using C language). Unfortunately the official C library doesnt compile well in our Windows environment.

After debugging for days we came to the conclusion that the regex used in the jws library verify-stream.js file does not allow for equals sign (=), hence the regex validation fails.

Currently the regex looks like as follow -

const JWS_REGEX = /^[a-zA-Z0-9\-_]+?\.[a-zA-Z0-9\-_]+?\.([a-zA-Z0-9\-_]+)?$/;

Suggested change is to include the (=) sign as well -

const JWS_REGEX = "^[A-Za-z0-9-_=]+\.[A-Za-z0-9-_=]+\.?[A-Za-z0-9-_.+/=]*$";

Thanks

Failure to correctly serialize ECDSA signatures

When serializing an ECDSA signature, the correct procedure is to form two fixed-length bigints, each of octet length equal to the length of the representation of the prime which the curve is defined modulo to.

This package does not do so. E.g., try doing:

> jws.sign({header:{alg:'ES256'},payload:'testing',privateKey:key}).split('.')[2].length
94
> jws.sign({header:{alg:'ES256'},payload:'testing',privateKey:key}).split('.')[2].length
95

where

key = '-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIN8L9YcwuTY6DotH/gc8xP+oemVRj/uTQO6GjnLjSlgIoAoGCCqGSM49\nAwEHoUQDQgAE4nnUjvSzANAZ4l4wrWgpCPqEMDGoCPnEpm8093dDh6Uoww62quMA\nnLCpUSU56HuL5F0dHwuRXOdbQqo9P3hR6g==\n-----END EC PRIVATE KEY-----\n';

The length of the final part should always be the same, regardless of the numerical value of r or s. (In this case, ((4 * 64) + 2) // 3 == 86, so...I'm fairly confused by what this package is doing exactly.

UTF8 encoding problem

Your library is used by node-jsonwebtoken, and when it signs the token using your library it seems that it breaks the payload if there is an UTF8 character in the payload.
When I retrieve the token and decode it, and when I parse with JSON.parse() I get 'Unexpected token' error if the payload contained UTF8 chars.
In my case it was char 'ć' .
Can you verify?

RS256 keys do not create signatures causes runtime error

this is similar to issue #15: #15

No matter how I slice it, Reading the key from a file, adding it to code directly, removing \n line terminations, the RS256 encryption does not work correctly. For instance, reading the file directly:

Here's the value of the key

-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY
 post: function() {
    var date, expiration, nonce, ref, ref1, secret, signature, userId;
    secret = fs.readFileSync('/Users/Patrick_/beautywire_api/beautywire.pem');
    userId = (ref = this.bodyParams) != null ? ref.userId : void 0;
    nonce = (ref1 = this.bodyParams) != null ? ref1.nonce : void 0;
    date = new Date(new Date().setHours(24 * 7 * 2)).toISOString();
    expiration = new Date(new Date(new Date().setHours(24 * 7 * 2)).toISOString());
    console.log(secret.toString());
    signature = jws.sign({
      header: {
        alg: 'RS256',
        typ: 'JWT',
        kid: Config.appLayerKeyId,
        cty: "layer-eit;v=1"
      },
      payload: {
        prn: userId,
        nce: nonce,
        exp: expiration
      },
      secret: secret.toString()
    });
    return {
      statusCode: 201,
      body: {
        success: true,
        data: {
          identityToken: signature
        },
        message: "Here's your token - have fun"
      }
    };
  }

W20160415-14:00:45.945(-7)? (STDERR) 140735103415040:error:0906D066:PEM routines:PEM_read_bio:bad end line:../deps/openssl/openssl/crypto/pem/pem_lib.c:804:
W20160415-14:00:45.998(-7)? (STDERR) Error: SignFinal error
W20160415-14:00:45.998(-7)? (STDERR) at Sign.sign (crypto.js:426:27)
W20160415-14:00:45.999(-7)? (STDERR) at Object.sign (/Users/Patrick_/beautywire_api/node_modules/jws/node_modules/jwa/index.js:54:45)
W20160415-14:00:45.999(-7)? (STDERR) at Object.jwsSign as sign
W20160415-14:00:46.000(-7)? (STDERR) at Object.App.api.addRoute.post as action

Removing \n:

I20160415-14:07:26.235(-7)? -----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY
W20160415-14:07:26.236(-7)? (STDERR) 140735103415040:error:0906D06C:PEM routines:PEM_read_bio:no start line:../deps/openssl/openssl/crypto/pem/pem_lib.c:696:Expecting: ANY PRIVATE KEY
W20160415-14:07:26.296(-7)? (STDERR) Error: SignFinal error
W20160415-14:07:26.296(-7)? (STDERR) at Sign.sign (crypto.js:426:27)
W20160415-14:07:26.296(-7)? (STDERR) at Object.sign (/Users/Patrick_/beautywire_api/node_modules/jws/node_modules/jwa/index.js:54:45)
W20160415-14:07:26.297(-7)? (STDERR) at Object.jwsSign as sign

  post: function() {
    var date, expiration, nonce, ref, ref1, secret, signature, userId;
    secret = fs.readFileSync('/Users/Patrick_/beautywire_api/beautywire.pem');
    userId = (ref = this.bodyParams) != null ? ref.userId : void 0;
    nonce = (ref1 = this.bodyParams) != null ? ref1.nonce : void 0;
    date = new Date(new Date().setHours(24 * 7 * 2)).toISOString();
    expiration = new Date(new Date(new Date().setHours(24 * 7 * 2)).toISOString());
    console.log(secret.toString().replace(/\n/g, ''));
    signature = jws.sign({
      header: {
        alg: 'RS256',
        typ: 'JWT',
        kid: Config.appLayerKeyId,
        cty: "layer-eit;v=1"
      },
      payload: {
        prn: userId,
        nce: nonce,
        exp: expiration
      },
      secret: secret.toString().replace(/\n/g, '')
    });
    return {
      statusCode: 201,
      body: {
        success: true,
        data: {
          identityToken: signature
        },
        message: "Here's your token - have fun"
      }
    };
  }

Following the other issue, exactly from your response, this should create a signed key.

Does JWS support verification with a PKCS#8 public key?

I know that JWS can support reading a PEM key using the PCKS#1 encoding - a public key looks like this:

-----BEGIN RSA PUBLIC KEY-----
MIIBCgKCAQEAwEYqf3HAL+h0CbcM6cnVfT6hDw0nNPkLYKld54qRYhJa+txnI8so
bIhP4/1l3TnNZldFFOatRlZAxuNG8Dk4L/QQmDeIsOkYQ5oiytSCbUrJv44aOPjL
G72XhVOaOLMT2vp/guOVAjTYOyF83asoOpPVtFeiBHhKudMrpPzeq3qwGMxfVVPy
NlztFjnTlkAKMtkbkwcpzdTn4y/pDo47+LgkDckReoqTIK4Z1bp86Oa6eBOa7/6w
hIXG3aCQiMQfJUBEBRA7mmV4g+jNWMhCBMEsOZj+KUErfilPv1FL4zP3E8kNCu+B
GYCSuj0doIxreVHDifXd+5Lmhr6NDkhG5QIDAQAB
-----END RSA PUBLIC KEY-----

Does it support the PCKS#8 encoding, which defines the key type within the payload itself? (Note that these are the same - this format includes the Object Identifier as part of the key and omits 'RSA').

-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAwEYqf3HAL+h0CbcM6cnVfT6hDw0nNPkLYKld54qRYhJa+txnI8so
bIhP4/1l3TnNZldFFOatRlZAxuNG8Dk4L/QQmDeIsOkYQ5oiytSCbUrJv44aOPjL
G72XhVOaOLMT2vp/guOVAjTYOyF83asoOpPVtFeiBHhKudMrpPzeq3qwGMxfVVPy
NlztFjnTlkAKMtkbkwcpzdTn4y/pDo47+LgkDckReoqTIK4Z1bp86Oa6eBOa7/6w
hIXG3aCQiMQfJUBEBRA7mmV4g+jNWMhCBMEsOZj+KUErfilPv1FL4zP3E8kNCu+B
GYCSuj0doIxreVHDifXd+5Lmhr6NDkhG5QIDAQAB
-----END PUBLIC KEY-----

Error: The first argument must be one of type...

If you pass a random string like 'test' to jws.verify, you get this error. Instead it should just return false.

  TypeError [ERR_INVALID_ARG_TYPE]: The first argument must be one of type string, Buffer, ArrayBuffer, Array, or Array-like Object. Received type undefined
      at Function.from (buffer.js:199:11)
      at Object.verify (....../node_modules/jwa/index.js:43:31)
      at Object.jwsVerify [as verify] (....../node_modules/jws/lib/verify-stream.js:54:15)

issue using RS512

Hello,
whenever I try to use a RSA 512 certificates I'm crashing with the following error:

error:0906D06C:PEM routines:PEM_read_bio:no start line:../deps/openssl/openssl/crypto/pem/pem_lib.c:703:Expecting: ANY PRIVATE KEY

it works fine using a 256 one :(

any suggestion?

Algorithm names should be case-sensitive and uppercase

http://self-issued.info/docs/draft-ietf-jose-json-web-signature.html
Section 4.1.1. "alg" (Algorithm) Header Parameter:
"The alg value is a case-sensitive string containing a StringOrURI value."

The examples provided in readme.md use lowercase algorithm names, and node-jws does not convert them to uppercase, leading to standard-compliant implementations determining them to be invalid JWS signatures.

The list of names in here is all uppercase (except "none") (3.1. "alg" (Algorithm) Header Parameter Values for JWS): http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-26

AWS KMS Support

Hi,
I would like to add support to AWS KMS to jsonwebtoken library.
I was wondering if the play to add this support is in this library.

I have updated other jwt library (https://github.com/fjcabello/jwt-kms) but I would prefer to add this feature in a more standard library.

What do you think?

Thanks,

Paco

Throw an error if a decoded jws signature does not contain an alg field

I recently stumbled upon an issue where if a base64 encoded json object that does not include an alg field is passed to algoFromJWS, the following error will be thrown:

TypeError: Cannot call method 'match' of undefined
    at jwa (/Users/tescherm/stuff/node_modules/jsonwebtoken/node_modules/jws/node_modules/jwa/index.js:91:27)
    at Object.jwsVerify [as verify] (/Users/tescherm/stuff/node_modules/jsonwebtoken/node_modules/jws/index.js:97:16)
    at Object.module.exports.verify (/Users/tescherm/stuff/node_modules/jsonwebtoken/index.js:39:17)

I'm pretty sure the fix involves an existence check on header.alg. If it doesn't exist a more meaningful error can be thrown:

https://github.com/brianloveswords/node-jws/blob/master/index.js#L72

build error while using jsonwebtokens in Angular6

ERROR in ./node_modules/jws/lib/verify-stream.js
Module not found: Error: Can't resolve 'stream' in 'E:\My Code\mycode\pwa\node_modules\jws\lib'
ERROR in ./node_modules/jws/lib/data-stream.js
Module not found: Error: Can't resolve 'stream' in 'E:\My Code\mycode\pwa\node_modules\jws\lib'
ERROR in ./node_modules/jws/lib/sign-stream.js
Module not found: Error: Can't resolve 'stream' in 'E:\My Code\mycode\pwa\node_modules\jws\lib'

siginging with RSA256 result in empty signature

I'm trying to sign with RSA256 with the following:

var jws = require('jws');
var o = jws.sign({
header: {alg: 'RS256', typ: 'JWT'},
payload: payload,
secret: key
});

console.log(o);

the result signature is empty (only header and payload segments, and the token ends with a '.')

ReferenceError: global is not defined

Trying to use the sign function in an Angular application. Have installed jws and @types/jws packages.

This is the reference from my app

sign({
      header: { alg: 'HS256' },
      payload: testuser,
      secret: 'local auth secret'
    });

This is the error stack thrown in the browser console

index.js:43 Uncaught ReferenceError: global is not defined
    at Object.../../node_modules/buffer/index.js (index.js:43)
    at __webpack_require__ (bootstrap:84)
    at Object.../../node_modules/safe-buffer/index.js (index.js:2)
    at __webpack_require__ (bootstrap:84)
    at Object.../../node_modules/jws/lib/sign-stream.js (sign-stream.js:2)
    at __webpack_require__ (bootstrap:84)
    at Object.../../node_modules/jws/index.js (index.js:2)
    at __webpack_require__ (bootstrap:84)
    at Module.../../libs/auth/src/lib/auth-local.service.ts (auth-local.module.ts:10)
    at __webpack_require__ (bootstrap:84)
../../node_modules/buffer/index.js	@	index.js:43
__webpack_require__	@	bootstrap:84
../../node_modules/safe-buffer/index.js	@	index.js:2
__webpack_require__	@	bootstrap:84
../../node_modules/jws/lib/sign-stream.js	@	sign-stream.js:2
__webpack_require__	@	bootstrap:84
../../node_modules/jws/index.js	@	index.js:2
__webpack_require__	@	bootstrap:84
../../libs/auth/src/lib/auth-local.service.ts	@	auth-local.module.ts:10
__webpack_require__	@	bootstrap:84
../../libs/auth/src/lib/auth.service.provider.ts	@	auth.interceptor.ts:13
__webpack_require__	@	bootstrap:84
../../libs/auth/src/index.ts	@	okta-config.ts:10
__webpack_require__	@	bootstrap:84
./src/app/app.module.ts	@	app.component.ts:10
__webpack_require__	@	bootstrap:84
./src/main.ts	@	environment.ts:18
__webpack_require__	@	bootstrap:84
0	@	main.ts:31
__webpack_require__	@	bootstrap:84
checkDeferredModules	@	bootstrap:45
webpackJsonpCallback	@	bootstrap:32
(anonymous)	@	main.js:1

Support for custom sign / verify algorithms

Would you consider accepting an object for the algorithm parameter in jwsVerify, as well checking for the presence of opts.algo in jwsSign? This would involve checking for string vs object to decide whether to use jwa or use it as is.

This way someone could pass {sign: function, verify: function} to support custom algorithms without needing to rewrite this module.

Fix for Issue #50 not released for over two years

Can you make a new release that fixes #50 (PR #52)? The issue has been solved, but unreleased, since Jul 18, 2017...

I just ran into this issue again, trying to sign a compressed payload: https://runkit.com/embed/mnbqn7bakltj

const pako = require('pako');
const jws = require('jws');

//function copy pasted from https://github.com/brianloveswords/node-jws/blob/master/lib/sign-stream.js#L8
function base64url(buf) {
    return buf
        .toString('base64')
        .replace(/=/g, '')
        .replace(/\+/g, '-')
        .replace(/\//g, '_');
}

const payload = Buffer.from(
    pako.deflateRaw('asdfasdfasdfasdf') //returns a Uint8Array
);

//expected: "SyxOSUtEwgA"
console.log(
    base64url(
        payload
    )
);
//actual: "SyxOSUtE77-9AA"
console.log(
    jws.sign({
        header: { alg: 'none' },
        payload,
        encoding: 'utf8'
    }).split('.')[1]
);

SignFinal error

I'm trying to generate a signature with jws.sign and I keep getting an error that seems to be coming from crypto.js.

My node code is as follows:


var jws = require('jws');

function getIdentityToken(userID, nonce) {
// Get Provider, Key ID, and private key from Heroku Environment Variables
        var layerProviderID = process.env.LAYER_PROVIDER_ID;  // looks something like ed47c64a-a74f-11e4-85ff-d2a153003309
        var layerKeyID = process.env.LAYER_KEY_ID;  // looks something like ed47c64a-a74f-11e4-85ff-d2a153003309
        var privateKey = process.env.LAYER_KEY;  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

        if (!layerProviderID || !layerKeyID || !privateKey) {
            res.send(500, { status: 500, message: err.message });
        } 

        var header =  {
      typ: "JWS", 
      alg: "RS256", 
      cty: "layer-eit;v=1", 
      kid: layerKeyID,
    };

    var currentTimeInSeconds = Math.round(new Date() / 1000);
    var expirationTime = currentTimeInSeconds + 10000;

    var payload = JSON.stringify({
      iss: layerProviderID,
      prn: userID,
      iat: currentTimeInSeconds,
      exp: expirationTime,
      nce: nonce,
    });

    var signature = jws.sign({ 
      header: header, 
      payload: payload, 
      secret: privateKey.toString()
    });

    return signature;
};
exports.getIdentityToken = getIdentityToken;

The error I'm getting is:

40735208461056:error:0906D06C:PEM routines:PEM_read_bio:no start line:../deps/openssl/openssl/crypto/pem/pem_lib.c:703:Expecting: ANY PRIVATE KEY
Error: SignFinal error
    at Sign.sign (crypto.js:429:27)
    at Object.sign (/work/dif-api/node_modules/jws/node_modules/jwa/index.js:51:47)
    at Object.jwsSign [as sign] (/work/dif-api/node_modules/jws/index.js:34:26)
    at Object.getIdentityToken (/work/dif-api/lib/layerAuth.js:35:25)
    at /work/dif-api/routes/users.js:118:41
    at Layer.handle [as handle_request] (/work/dif-api/node_modules/express/lib/router/layer.js:82:5)
    at next (/work/dif-api/node_modules/express/lib/router/route.js:100:13)
    at Route.dispatch (/work/dif-api/node_modules/express/lib/router/route.js:81:3)
    at Layer.handle [as handle_request] (/work/dif-api/node_modules/express/lib/router/layer.js:82:5)
    at /work/dif-api/node_modules/express/lib/router/index.js:235:24

Do you see anything wrong with the call to jws.sign()? Or any clues as to why this error is being generated?

Question about timing

Does this library have constant time failures?

Is the computation time the same if it's the first OR last byte of a signature that fails?

Cannot sign with empty string as secret

When secret is falsy, no signing is performed and a misleading error is given:

require("jws").sign({header: {alg: "HS256"}, payload: "data", secret: ""});
// TypeError: secret must be a string or buffer

The equivalent with an empty Buffer works:

require("jws").sign({header: {alg: "HS256"}, payload: "data", secret: Buffer("")});
// 'eyJhbGciOiJIUzI1NiJ9.ZGF0YQ.KTmgoUPBPfznrnLx1xjRnlmzfIKWZV4x9cXIi6_RopQ'

Use a better algorithm than UTF-8 to derive keys from string secrets.

Using UTF8 "string to bytes" to derive the key used for signing is not secure. Even with long secrets, this prevents the derived key to be properly randomized when converted to a byte array for signing. Any binary value is not necessarily a valid UTF-8 character sequence, and given most secrets are ASCII passphrases, the possible value range is even narrower.

A better approach would be to use PBKDF2 as a key derivation mechanism, but this would introduce a breaking change in the library.

Edit:
Right now, the most secure way to use a truly random key is to generate a binary key using a good random number generator, convert it to base64, and use the following code to generate the JWT:

function getSignedJwt(payload) {
    const keyAsBase64String = getKeyFromConfig();
    const key = Buffer.from(keyAsBase64String, "base64");
    return jws.sign({
        header: { alg: "HS256" },
        payload: payload,
        secret: key
    });
}

verifyStream

If the signature is empty in the object passed to this method it fails silently. I think maybe there is an issue with the error not being emitted. It may not being caught here in this test.

Binary payload is ruined by toString()

Despite ostensibly supporting a binary payload, the bytes of the payload are mangled by including a toString() call before encoding the payload (sign-stream.js:12).

var encodedPayload = base64url(toString(payload), encoding);

A Buffer is binary data - it is not supposed to be transformed into a string, as strings are not capable of containing arbitrary binary data. Right now, this defect mangles bytes outside some safe range (ASCII?).

Example code:

let jws = require("jws");
let payload = Buffer.from("TkJyotZe8NFpgdfnmgINqg==", "base64");
let secret = Buffer.from("8NRxgIkVxP8LyyXSL4b1dg==", "base64");

console.log(payload);

let token = jws.sign({
    "header": {
        "alg": "HS256"
    },
    "payload": payload,
    "secret": secret
});

console.log(token);

Expected result:

eyJhbGciOiJIUzI1NiJ9.TkJyotZe8NFpgdfnmgINqg.9XilaLN_sXqWFtlUCdAlGI85PCEbJZSIQpakyAle-vo

Actual result:

eyJhbGciOiJIUzI1NiJ9.TkJy_f1e_f1p_f39_QIN_Q.plu4DeDn9-SUCZvoneyACF3PXMc3F7wvb4P5gGKZagQ

JTI Support

I'd like to see the JTI (JWT ID) claim implemented so that I could, say, keep track of 'active' tokens out in the wild. And like the spec says it could be used to help prevent any replay attacks.

Are there any plans for this?

Fix for security flaw

I saw this was implemented for disallowing arbitrary algorithms to be verified, I guess to prevent the none one to always go through. Though this breaks the spec which says the server should not have prior knowledge of the algorithm.

Would you consider disabling none by default rather than changing the signature of verify()?

PrivateKey Encrypted

Hello,
JWT accept an object like this one:
{key: your key, passphrase: your passphrase}

But with jws no way to use a private key encrypted because we can't add an object..
How can we handle this case ?

Need to specify encoding on decode.

My JWS payload is some raw bytes, which I pass to the encode function as base64, using the supported "base64" encoding option:

jws.sign({
  header: {
    alg: "HS256"
  },
  payload: "myPayloadBase64=",
  secret: "secret",
  encoding: "base64"
})
// 'eyJhbGciOiJIUzI1NiJ9.myPayloadBase64.rFU9W9o-1Mw3jEudDOFjQZHrxOOmMZdTRnLbXTL2VY8'

When I decode this, there's no corresponding option to decode directly to base64. Decode gives me a string using the encoded bytes, but it contains some escaped character values and is not compatible with Buffer:

const decodedPayload = jws.decode('eyJhbGciOiJIUzI1NiJ9.myPayloadBase64.rFU9W9o-1Mw3jEudDOFjQZHrxOOmMZdTRnLbXTL2VY8')
// '�#��Z\u001at\u0016�{�'

Buffer.from(decodedPayload, "utf8").toString("base64")
//'77+9I++/ve+/vVoadBbvv71777+9'
// should be 'myPayloadBase64='

My workaround right now is to not use decode at all. Instead, I just split('.')[1] and then require('base64-url') to decode the bytes or convert it to normal base64.

It would be much easier if I were able to pass the encoding I used to the decode method to get my base64 (or whatever other encoding) directly.

jws.decode(jwsStr, "base64" /* any supported encoding */)
/*
  {
    header: { alg: "HS256" },
    payload: "myPayloadBase64=",
    signature: "rFU9W9o-1Mw3jEudDOFjQZHrxOOmMZdTRnLbXTL2VY8"
  }
*/

As an additional feature suggestion, this would also let people ask decode to automatically parse JSON payloads:

const encoded = jws.sign({header:{alg: "HS256"}, payload: {test: "value"}, secret: "secret"})
jws.decode(encoded, "json")
// {test: 'value'}

Question: implementing the package with react native

Hi,
I don't know if this is the right location because currently I am focusing on the client side, but:
I want to add digital signature to a react native application.
The application receive data in JSON format and should validate that data while the application will hold the public key.

I am using RN version 0.45.1

Thanks,

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.