summaryrefslogtreecommitdiff
path: root/vendor/github.com/golang-jwt/jwt/ed25519.go
diff options
context:
space:
mode:
authorLibravatar kim <grufwub@gmail.com>2025-06-06 15:14:37 +0200
committerLibravatar kim <gruf@noreply.codeberg.org>2025-06-06 15:14:37 +0200
commit77eddea3aff27ffebf53d2341609221d4c1924e7 (patch)
tree27ca0c930f93c12d2e36ea083c6dbf1eef8521b1 /vendor/github.com/golang-jwt/jwt/ed25519.go
parent[chore] blocklist -> allowlist config typo fix (#4242) (diff)
downloadgotosocial-77eddea3aff27ffebf53d2341609221d4c1924e7.tar.xz
[chore] updates code.superseriousbusiness.org/oauth2/v4 to ssb-v4.5.3-1 (#4245)
A brief note on the above change: Go does not seem to like version tagging outside of `v?[0-9\.]` formatting, so it translates `ssb-v4.5.3-1` to `v4.5.4-0.20250606121655-9d54ef189d42` and as such sees it as a "downgrade" compared to the previous `v4.9.0`. which functionally isn't a problem, everything still behaves as it should, but it means people can't just run `go get repo@latest` for this particular dependency. Reviewed-on: https://codeberg.org/superseriousbusiness/gotosocial/pulls/4245 Co-authored-by: kim <grufwub@gmail.com> Co-committed-by: kim <grufwub@gmail.com>
Diffstat (limited to 'vendor/github.com/golang-jwt/jwt/ed25519.go')
-rw-r--r--vendor/github.com/golang-jwt/jwt/ed25519.go81
1 files changed, 0 insertions, 81 deletions
diff --git a/vendor/github.com/golang-jwt/jwt/ed25519.go b/vendor/github.com/golang-jwt/jwt/ed25519.go
deleted file mode 100644
index a2f8ddbe9..000000000
--- a/vendor/github.com/golang-jwt/jwt/ed25519.go
+++ /dev/null
@@ -1,81 +0,0 @@
-package jwt
-
-import (
- "errors"
-
- "crypto/ed25519"
-)
-
-var (
- ErrEd25519Verification = errors.New("ed25519: verification error")
-)
-
-// Implements the EdDSA family
-// Expects ed25519.PrivateKey for signing and ed25519.PublicKey for verification
-type SigningMethodEd25519 struct{}
-
-// Specific instance for EdDSA
-var (
- SigningMethodEdDSA *SigningMethodEd25519
-)
-
-func init() {
- SigningMethodEdDSA = &SigningMethodEd25519{}
- RegisterSigningMethod(SigningMethodEdDSA.Alg(), func() SigningMethod {
- return SigningMethodEdDSA
- })
-}
-
-func (m *SigningMethodEd25519) Alg() string {
- return "EdDSA"
-}
-
-// Implements the Verify method from SigningMethod
-// For this verify method, key must be an ed25519.PublicKey
-func (m *SigningMethodEd25519) Verify(signingString, signature string, key interface{}) error {
- var err error
- var ed25519Key ed25519.PublicKey
- var ok bool
-
- if ed25519Key, ok = key.(ed25519.PublicKey); !ok {
- return ErrInvalidKeyType
- }
-
- if len(ed25519Key) != ed25519.PublicKeySize {
- return ErrInvalidKey
- }
-
- // Decode the signature
- var sig []byte
- if sig, err = DecodeSegment(signature); err != nil {
- return err
- }
-
- // Verify the signature
- if !ed25519.Verify(ed25519Key, []byte(signingString), sig) {
- return ErrEd25519Verification
- }
-
- return nil
-}
-
-// Implements the Sign method from SigningMethod
-// For this signing method, key must be an ed25519.PrivateKey
-func (m *SigningMethodEd25519) Sign(signingString string, key interface{}) (string, error) {
- var ed25519Key ed25519.PrivateKey
- var ok bool
-
- if ed25519Key, ok = key.(ed25519.PrivateKey); !ok {
- return "", ErrInvalidKeyType
- }
-
- // ed25519.Sign panics if private key not equal to ed25519.PrivateKeySize
- // this allows to avoid recover usage
- if len(ed25519Key) != ed25519.PrivateKeySize {
- return "", ErrInvalidKey
- }
-
- // Sign the string and return the encoded result
- sig := ed25519.Sign(ed25519Key, []byte(signingString))
- return EncodeSegment(sig), nil
-}