Closed Hannes-Kunnen closed 4 months ago
Attention: Patch coverage is 37.50000%
with 10 lines
in your changes missing coverage. Please review.
Project coverage is 75.03%. Comparing base (
0a15b4d
) to head (458bea5
). Report is 84 commits behind head on develop/v2.
Files | Patch % | Lines |
---|---|---|
jwe/internal/keyenc/keyenc.go | 16.66% | 10 Missing :warning: |
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.
LGTM! I'll merge, but please note that I won't be making a release anytime soon. I usually like to wait and see if anything breaks before making releases.
Thanks!
P.S.
I am not sure which one would be preferred (I assumed the method that was already used).
It doesn't really matter. They end up calling the same thing. The rest is stylistic, but for this particular part I didn't have a preference :)
This pull request would add support for the
RSA-OAEP-384
andRSA-OAEP-512
key encryption algorithms. I think this is just a minor change as the base algorithmsRSA-OAEP
andRSA-OAEP-256
are already implemented. The only difference these new algorithms have is that they use a different hashing algorithmSHA384
andSHA512
respectively instead ofSHA1
orSHA256
.The hashing algorithms
SHA384
andSHA512
are already used in different algorithms, so these are not new. The only thing I wasn't sure about it how the following case should be handled: permalinkIn the original code the
'hash'.New()
method was used, so I continued this usage, however when searching where theSHA384
andSHA512
algorithms were used already I found an other method which would result in this diff:I am not sure which one would be preferred (I assumed the method that was already used).
If I missed something or there is a reason these algorithms weren't implemented I would love to hear it.