Skip to content

Conversation

@ThisIsMissEm
Copy link

This implements #391, and I've tested it for compatibility with the JWTs that the AT Protocol codebase produces (it's a little complex on the node.js/javascript side, so I haven't included that but I can if need be).

The error I mentioned in that ticket was because I was accidentally doing Validation::new(Algorithm::ES256), instead of &Validation::new(Algorithm::ES256K), when decoding the JWT, which, super silly mistake, but I caught it today!

This would unblock: mike-engel/jwt-cli#402

@ThisIsMissEm ThisIsMissEm force-pushed the feat/implement-secp256k1-ES256K branch from 4c71cca to bcb6d41 Compare November 10, 2025 21:50
Copy link
Owner

@Keats Keats left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we shouldn't expose it when using the aws-ls-crypto feature since we can't actually use it there

ES384,

/// ECDSA using secp256k1
ES256K,
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should this be gated by rust_crypto feature since it's only available there? As well as all JWK operations?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure how to make this rust_crypto gated (that's a little beyond my current knowledge of rust)

would it be something like wrapping in: };
#[cfg(feature = "rust_crypto")]?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants