Sha256: 42bb15d4970c1113c514caa48d3eaf9655681a83ae2404167d503df84b77ea9a
Contents?: true
Size: 1.19 KB
Versions: 4
Compression:
Stored size: 1.19 KB
Contents
# frozen_string_literal: true module JWT module Algos module Eddsa module_function SUPPORTED = %w[ED25519 EdDSA].freeze def sign(algorithm, msg, key) if key.class != RbNaCl::Signatures::Ed25519::SigningKey raise EncodeError, "Key given is a #{key.class} but has to be an RbNaCl::Signatures::Ed25519::SigningKey" end unless SUPPORTED.map(&:downcase).map(&:to_sym).include?(algorithm.downcase.to_sym) raise IncorrectAlgorithm, "payload algorithm is #{algorithm} but #{key.primitive} signing key was provided" end key.sign(msg) end def verify(algorithm, public_key, signing_input, signature) unless SUPPORTED.map(&:downcase).map(&:to_sym).include?(algorithm.downcase.to_sym) raise IncorrectAlgorithm, "payload algorithm is #{algorithm} but #{key.primitive} signing key was provided" end raise DecodeError, "key given is a #{public_key.class} but has to be a RbNaCl::Signatures::Ed25519::VerifyKey" if public_key.class != RbNaCl::Signatures::Ed25519::VerifyKey public_key.verify(signature, signing_input) rescue RbNaCl::CryptoError false end end end end
Version data entries
4 entries across 4 versions & 2 rubygems