util.getPath
, util.setPath
, and util.deletePath
.util.setPath
had a potential prototype pollution security issue when usedforge
itself. They dateforge
was targeted at providing general helperget
, set
, and unset
util.setPath
security note to function docs and to README.util.setPath
function has the potential to causeforge
.util.getPath
and util.setPath
.get
and set
from lodash if you needconst
.new Buffer
with Buffer.from
and Buffer.alloc
.notBefore
and notAfter
dates lesspki.verifyCertificateChain
:validityCheckDate
option to allow checking the certificate validityDate
or null
for no check at all. Thetls.createConnection
:verifyOptions
option that passes through topki.verifyCertificateChain
. Can be used for the above validityCheckDate
rsa.generateKeyPair
:crypto.generateKeyPair
/crypto.generateKeyPairSync
on Node.js ifrsa.generateKeyPair
if prng
option specified sincepki.verifyCertificateChain
:(caStore, chain, options)
. Older (caStore, chain, verify)
signature is still supported. New style is to to pass in averify
option.const
.1.2.840.10040.4.3'
/dsa-with-sha1
OID.asn1.equals
loop bug.toDer()
. More tests.asn1.prettyPrint()
BIT STRING display.npm run build
:.js
, .min.js
, and basic sourcemaps.forge.js
.forge.all.js
.prime.worker.js
.forge.options
field.forge.options.usePureJavaScript
flag.forge.util.isNodejs
flag (used to select "native" APIs).md.all.js
which includes all digest algorithms.equals()
and copy()
.validate()
capture options for BIT STRING contents and value.forge({...})
to create new instances.forge.options.usePureJavaScript
.forge/js/pki
you should eitherforge
and access forge.pki
or update toforge/lib/pki
.forge/js/pki
you should switch toforge
and access forge.pki
. The bower release bundles/bower_components/forge/js/prime.worker.js
will need to change to/bower_components/forge/dist/prime.worker.min.js
.md.all.js
file to include allpbdkf2.js
has a sha1
defaultsha256
without the overhead of sha1
andsha512
.