issues
search
veraison
/
go-cose
go library for CBOR Object Signing and Encryption (COSE)
Mozilla Public License 2.0
50
stars
26
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Update Readme Examples
#106
OR13
closed
1 year ago
3
Where is the `cty` tag registered
#105
OR13
closed
1 year ago
2
Reduce FuzzSign1 memory consumption
#104
qmuntal
closed
1 year ago
2
chore: upgrade ci to go 1.18 and go 1.19
#103
shizhMSFT
closed
1 year ago
1
Shift Go Support Window to [1.18, 1.19]
#102
shizhMSFT
closed
1 year ago
1
refactor!: accept message content instead of digest for sign and verify
#101
shizhMSFT
closed
2 years ago
4
Add ability to swap crypto implementation
#100
shizhMSFT
closed
2 years ago
0
Numerous paths within `NewVerifier` make invalid casts, appear to have not be exercised in tests
#99
dreemkiller
closed
1 year ago
6
Create 1.0.0 Release
#98
SteveLasker
closed
1 year ago
10
Add Trail of Bits Security Assessment
#97
yogeshbdeshpande
closed
2 years ago
3
Add Trail of Bits Security Review
#96
SteveLasker
closed
2 years ago
2
WIP: Some of the types in Verify seemed to be incorrect
#95
dreemkiller
closed
2 years ago
2
Upload the Trail of Bits public security assessment report
#94
ESultanik
closed
2 years ago
4
Enhance reports folder README.md and also top level README.md
#93
yogeshbdeshpande
closed
2 years ago
1
Update readme's for security reviews
#92
SteveLasker
closed
2 years ago
1
Update README.md and SECURITY.md from alpha.1 to rc.1
#91
FeynmanZhou
closed
2 years ago
1
Update README.md and SECURITY.md from alpha.1 to rc.1
#90
FeynmanZhou
closed
2 years ago
0
Increase headers type validation coverage
#89
qmuntal
closed
2 years ago
1
Create v1.0.0-rc.1 release
#88
SteveLasker
closed
2 years ago
12
Validate generic headers
#87
qmuntal
closed
2 years ago
0
add Mac0 support
#86
thomas-fossati
closed
5 months ago
4
Improve Sign1Message.Sign1() docs
#85
qmuntal
closed
2 years ago
0
upload coverage to codecov.io
#84
qmuntal
closed
2 years ago
1
Future
#83
SteveLasker
closed
2 years ago
0
Header types are not validated
#82
tjade273
closed
2 years ago
1
Error if unprotected header contains crit param
#81
qmuntal
closed
2 years ago
1
“crit” label is permitted in unprotected headers
#80
tjade273
closed
2 years ago
0
suspicious conversion
#79
thomas-fossati
closed
2 years ago
1
Ensure critical header contains valid labels
#78
qmuntal
closed
2 years ago
9
Upload NCC Public Report
#77
kevin-henry-ncc
closed
2 years ago
2
Untrusted input passed to CBOR Unmarshal() without bounds checking
#76
tolginator
closed
2 years ago
2
Missing hash function validation in RSA-PSS signatures
#75
tolginator
closed
2 years ago
0
Missing ed448 with EdDSA
#74
tolginator
closed
9 months ago
7
Deterministic ECDSA
#73
shizhMSFT
closed
1 year ago
9
Fail-safe check on RSA
#72
shizhMSFT
closed
2 years ago
0
Create Reports folder under go-cose
#70
yogeshbdeshpande
closed
2 years ago
0
Correct README to reflect the defork from mozilla/go-cose
#69
yogeshbdeshpande
closed
2 years ago
3
Consider Interface simplicity and safer usage of Sign1
#68
yogeshbdeshpande
closed
2 years ago
2
Remove cose.Verify1 and update cose.Sign1
#67
qmuntal
closed
2 years ago
0
Ensure IV and Partial IV are not both present
#66
qmuntal
closed
2 years ago
6
Update readme with release info
#65
SteveLasker
closed
2 years ago
4
Make Sign1 and Verify1 difficult to misuse
#64
qmuntal
closed
2 years ago
5
Fix integer range rendering
#63
qmuntal
closed
2 years ago
0
Guard against race conditions in RegisterAlgorithm
#62
qmuntal
closed
2 years ago
2
Documentation cleanup
#61
qmuntal
closed
2 years ago
0
Use curve modulo instead of field size to calculate ECDSA signature length
#60
qmuntal
closed
2 years ago
4
Field/order size confusion in ECDSA signature length
#59
pornin
closed
2 years ago
1
Mark COSE Sign as experimental
#58
thomas-fossati
closed
2 years ago
2
Remove design.md as remote signing has merged
#57
SteveLasker
closed
2 years ago
0
Remove design.md
#56
SteveLasker
closed
2 years ago
1
Previous
Next