libtrust
libtrust copied to clipboard
Primitives for identity and authorization
Hello, Could you please help me with some additional information about the documentation license? The README.md file contains only the below mentioned details, without clarifying the version of the Creative...
At the moment, neither P-384 nor P-521 have constant-time implementations in Go. Because signature private keys are used repeatedly, it is unsafe to use either of these curves (unfortunately w.r.t....
Now the root or some user starts the docker daemon and have full control of all docker containers. This should be changed in the future because we always want the...
Managing certificates and keys in some sort of public key infrastructure is a good starting point, but when you come with node compromission it is really important to manage certificates...
First iteration of the trust tool to register and manage grants
Hello, is there a reason the algorithms are restricted to SHA2? SHA3 is enumerated in crypto these days and would be a nice option for ECDSA, given it can (according...
Still incomplete, but review may start on the parts that are in there. Fingerprint definition if still missing ping @jlhawn
Update permissions to use scopes as described by #36 Still need to determine how to represent long-lived revocations which do not overwrite an existing permissions but limit a wider permission.
Document detailing the design of the trust server and its role in the global trust graph. Since no existing global trust graph documentation exists there is more detail about how...
@jlhawn this only increases test coverage. Before none of the JWS format or parse code was covered.