diff options
| author | Rutger Broekhoff | 2024-01-02 18:56:31 +0100 |
|---|---|---|
| committer | Rutger Broekhoff | 2024-01-02 18:56:31 +0100 |
| commit | 8db41da676ac8368ef7c2549d56239a5ff5eedde (patch) | |
| tree | 09c427fd66de2ec1ebffc8342f5fdbb84b0701b5 /vendor/github.com/golang-jwt/jwt/v5/ed25519.go | |
| parent | d4f75fb6db22e57577867445a022227e70958931 (diff) | |
| download | gitolfs3-8db41da676ac8368ef7c2549d56239a5ff5eedde.tar.gz gitolfs3-8db41da676ac8368ef7c2549d56239a5ff5eedde.zip | |
Delete vendor directory
Diffstat (limited to 'vendor/github.com/golang-jwt/jwt/v5/ed25519.go')
| -rw-r--r-- | vendor/github.com/golang-jwt/jwt/v5/ed25519.go | 79 |
1 files changed, 0 insertions, 79 deletions
diff --git a/vendor/github.com/golang-jwt/jwt/v5/ed25519.go b/vendor/github.com/golang-jwt/jwt/v5/ed25519.go deleted file mode 100644 index c213811..0000000 --- a/vendor/github.com/golang-jwt/jwt/v5/ed25519.go +++ /dev/null | |||
| @@ -1,79 +0,0 @@ | |||
| 1 | package jwt | ||
| 2 | |||
| 3 | import ( | ||
| 4 | "crypto" | ||
| 5 | "crypto/ed25519" | ||
| 6 | "crypto/rand" | ||
| 7 | "errors" | ||
| 8 | ) | ||
| 9 | |||
| 10 | var ( | ||
| 11 | ErrEd25519Verification = errors.New("ed25519: verification error") | ||
| 12 | ) | ||
| 13 | |||
| 14 | // SigningMethodEd25519 implements the EdDSA family. | ||
| 15 | // Expects ed25519.PrivateKey for signing and ed25519.PublicKey for verification | ||
| 16 | type SigningMethodEd25519 struct{} | ||
| 17 | |||
| 18 | // Specific instance for EdDSA | ||
| 19 | var ( | ||
| 20 | SigningMethodEdDSA *SigningMethodEd25519 | ||
| 21 | ) | ||
| 22 | |||
| 23 | func init() { | ||
| 24 | SigningMethodEdDSA = &SigningMethodEd25519{} | ||
| 25 | RegisterSigningMethod(SigningMethodEdDSA.Alg(), func() SigningMethod { | ||
| 26 | return SigningMethodEdDSA | ||
| 27 | }) | ||
| 28 | } | ||
| 29 | |||
| 30 | func (m *SigningMethodEd25519) Alg() string { | ||
| 31 | return "EdDSA" | ||
| 32 | } | ||
| 33 | |||
| 34 | // Verify implements token verification for the SigningMethod. | ||
| 35 | // For this verify method, key must be an ed25519.PublicKey | ||
| 36 | func (m *SigningMethodEd25519) Verify(signingString string, sig []byte, key interface{}) error { | ||
| 37 | var ed25519Key ed25519.PublicKey | ||
| 38 | var ok bool | ||
| 39 | |||
| 40 | if ed25519Key, ok = key.(ed25519.PublicKey); !ok { | ||
| 41 | return newError("Ed25519 verify expects ed25519.PublicKey", ErrInvalidKeyType) | ||
| 42 | } | ||
| 43 | |||
| 44 | if len(ed25519Key) != ed25519.PublicKeySize { | ||
| 45 | return ErrInvalidKey | ||
| 46 | } | ||
| 47 | |||
| 48 | // Verify the signature | ||
| 49 | if !ed25519.Verify(ed25519Key, []byte(signingString), sig) { | ||
| 50 | return ErrEd25519Verification | ||
| 51 | } | ||
| 52 | |||
| 53 | return nil | ||
| 54 | } | ||
| 55 | |||
| 56 | // Sign implements token signing for the SigningMethod. | ||
| 57 | // For this signing method, key must be an ed25519.PrivateKey | ||
| 58 | func (m *SigningMethodEd25519) Sign(signingString string, key interface{}) ([]byte, error) { | ||
| 59 | var ed25519Key crypto.Signer | ||
| 60 | var ok bool | ||
| 61 | |||
| 62 | if ed25519Key, ok = key.(crypto.Signer); !ok { | ||
| 63 | return nil, newError("Ed25519 sign expects crypto.Signer", ErrInvalidKeyType) | ||
| 64 | } | ||
| 65 | |||
| 66 | if _, ok := ed25519Key.Public().(ed25519.PublicKey); !ok { | ||
| 67 | return nil, ErrInvalidKey | ||
| 68 | } | ||
| 69 | |||
| 70 | // Sign the string and return the result. ed25519 performs a two-pass hash | ||
| 71 | // as part of its algorithm. Therefore, we need to pass a non-prehashed | ||
| 72 | // message into the Sign function, as indicated by crypto.Hash(0) | ||
| 73 | sig, err := ed25519Key.Sign(rand.Reader, []byte(signingString), crypto.Hash(0)) | ||
| 74 | if err != nil { | ||
| 75 | return nil, err | ||
| 76 | } | ||
| 77 | |||
| 78 | return sig, nil | ||
| 79 | } | ||