You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This issue outlines gaps in testing of various cryptographic capabilities. Tasks may have partial test coverage today (linked if true). If sufficient test coverage already exists, please close the task and link the relevant test.
Tasks may need discussion on the best way to approach them. The goal is to create a set of language agnostic test vectors that give us sufficient confidence in maintaining interoperability of features between implementations.
it saysa jwk/bytes but I guess that means one or the other right?
We have at least one success import success sign and verify and then a lot of error cases, so if this covers it these could potentially get a check mark
I think we can be more grainular here actually for each of these. :
generate new keys (from a known seed)
round trip import/export keys in common formats (JWK)
sign bytes (convert from hex string format in vector) today's coverage
verify bytes (convert from hex string format in vector) today's coverage
And I'll check the sign and verify bits because I think we have significant enough coverage (but will need some agreement on this) for the algs we have
This issue outlines gaps in testing of various cryptographic capabilities. Tasks may have partial test coverage today (linked if true). If sufficient test coverage already exists, please close the task and link the relevant test.
Tasks may need discussion on the best way to approach them. The goal is to create a set of language agnostic test vectors that give us sufficient confidence in maintaining interoperability of features between implementations.
https://tbd54566975.github.io/web5-spec/#cryptographic-primitives
secp256k1
ed25519
secp256r1 / P-256
x25519
I believe we can keep ecdh-es+a256kw operations out of scope for now
JWS / JWT
For all key types and algorithms we support...
The text was updated successfully, but these errors were encountered: