Module: JWT::Algos::Eddsa
- Defined in:
- lib/jwt/algos/eddsa.rb
Constant Summary collapse
- SUPPORTED =
%w[ED25519 EdDSA].freeze
Class Method Summary collapse
- .sign(algorithm, msg, key) ⇒ Object
- .verify(algorithm, public_key, signing_input, signature) ⇒ Object
Class Method Details
.sign(algorithm, msg, key) ⇒ Object
10 11 12 13 14 15 16 17 18 19 |
# File 'lib/jwt/algos/eddsa.rb', line 10 def sign(algorithm, msg, key) if key.class != RbNaCl::Signatures::Ed25519::SigningKey raise EncodeError, "Key given is a #{key.class} but has to be an RbNaCl::Signatures::Ed25519::SigningKey" end unless SUPPORTED.map(&:downcase).map(&:to_sym).include?(algorithm.downcase.to_sym) raise IncorrectAlgorithm, "payload algorithm is #{algorithm} but #{key.primitive} signing key was provided" end key.sign(msg) end |
.verify(algorithm, public_key, signing_input, signature) ⇒ Object
21 22 23 24 25 26 27 28 29 30 |
# File 'lib/jwt/algos/eddsa.rb', line 21 def verify(algorithm, public_key, signing_input, signature) unless SUPPORTED.map(&:downcase).map(&:to_sym).include?(algorithm.downcase.to_sym) raise IncorrectAlgorithm, "payload algorithm is #{algorithm} but #{key.primitive} signing key was provided" end raise DecodeError, "key given is a #{public_key.class} but has to be a RbNaCl::Signatures::Ed25519::VerifyKey" if public_key.class != RbNaCl::Signatures::Ed25519::VerifyKey public_key.verify(signature, signing_input) rescue RbNaCl::CryptoError false end |