Read and write JSON Web Keys (JWK, rfc7517), generate and verify JSON Web Signatures (JWS, rfc7515) and encode/decode JSON Web Tokens (JWT, rfc7519). These standards provide modern signing and encryption formats that are natively supported by browsers via the JavaScript WebCryptoAPI, and used by services like OAuth 2.0, LetsEncrypt, and Github Apps.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 10.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 10.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 10.0 | aarch64eb | R-jose-1.2.0.tgz |
NetBSD 10.0 | aarch64eb | R-jose-1.2.0.tgz |
NetBSD 10.0 | earmv7hf | R-jose-1.2.0.tgz |
NetBSD 10.0 | earmv7hf | R-jose-1.2.0.tgz |
NetBSD 10.0 | earmv7hf | R-jose-1.2.0.tgz |
NetBSD 10.0 | i386 | R-jose-1.2.0.tgz |
NetBSD 10.0 | i386 | R-jose-1.2.0.tgz |
NetBSD 10.0 | powerpc | R-jose-1.2.0.tgz |
NetBSD 10.0 | powerpc | R-jose-1.2.0.tgz |
NetBSD 10.0 | powerpc | R-jose-1.2.0.tgz |
NetBSD 10.0 | x86_64 | R-jose-1.2.0.tgz |
NetBSD 10.0 | x86_64 | R-jose-1.2.0.tgz |
NetBSD 9.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 9.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 9.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 9.0 | aarch64 | R-jose-1.2.0.tgz |
NetBSD 9.0 | earmv7hf | R-jose-1.2.0.tgz |
NetBSD 9.0 | earmv7hf | R-jose-1.2.0.tgz |
NetBSD 9.0 | i386 | R-jose-1.2.0.tgz |
NetBSD 9.0 | i386 | R-jose-1.2.0.tgz |
NetBSD 9.0 | powerpc | R-jose-1.2.0.tgz |
NetBSD 9.0 | powerpc | R-jose-1.2.0.tgz |
NetBSD 9.0 | powerpc | R-jose-1.2.0.tgz |
NetBSD 9.0 | x86_64 | R-jose-1.2.0.tgz |
NetBSD 9.0 | x86_64 | R-jose-1.2.0.tgz |
NetBSD 9.3 | x86_64 | R-jose-1.2.0.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.