c5679da3a1
to address CVE-2020-26160
full diff: a601269ab7
...v3.2.2
3.2.1 release notes
---------------------------------------
- Import Path Change: See MIGRATION_GUIDE.md for tips on updating your code
Changed the import path from github.com/dgrijalva/jwt-go to github.com/golang-jwt/jwt
- Fixed type confusion issue between string and []string in VerifyAudience.
This fixes CVE-2020-26160
3.2.2 release notes
---------------------------------------
- Starting from this release, we are adopting the policy to support the most 2
recent versions of Go currently available. By the time of this release, this
is Go 1.15 and 1.16.
- Fixed a potential issue that could occur when the verification of exp, iat
or nbf was not required and contained invalid contents, i.e. non-numeric/date.
Thanks for @thaJeztah for making us aware of that and @giorgos-f3 for originally
reporting it to the formtech fork.
- Added support for EdDSA / ED25519.
- Optimized allocations.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
64 lines
1.3 KiB
Go
64 lines
1.3 KiB
Go
package jwt
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/ed25519"
|
|
"crypto/x509"
|
|
"encoding/pem"
|
|
"errors"
|
|
)
|
|
|
|
var (
|
|
ErrNotEdPrivateKey = errors.New("Key is not a valid Ed25519 private key")
|
|
ErrNotEdPublicKey = errors.New("Key is not a valid Ed25519 public key")
|
|
)
|
|
|
|
// Parse PEM-encoded Edwards curve private key
|
|
func ParseEdPrivateKeyFromPEM(key []byte) (crypto.PrivateKey, error) {
|
|
var err error
|
|
|
|
// Parse PEM block
|
|
var block *pem.Block
|
|
if block, _ = pem.Decode(key); block == nil {
|
|
return nil, ErrKeyMustBePEMEncoded
|
|
}
|
|
|
|
// Parse the key
|
|
var parsedKey interface{}
|
|
if parsedKey, err = x509.ParsePKCS8PrivateKey(block.Bytes); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var pkey ed25519.PrivateKey
|
|
var ok bool
|
|
if pkey, ok = parsedKey.(ed25519.PrivateKey); !ok {
|
|
return nil, ErrNotEdPrivateKey
|
|
}
|
|
|
|
return pkey, nil
|
|
}
|
|
|
|
// Parse PEM-encoded Edwards curve public key
|
|
func ParseEdPublicKeyFromPEM(key []byte) (crypto.PublicKey, error) {
|
|
var err error
|
|
|
|
// Parse PEM block
|
|
var block *pem.Block
|
|
if block, _ = pem.Decode(key); block == nil {
|
|
return nil, ErrKeyMustBePEMEncoded
|
|
}
|
|
|
|
// Parse the key
|
|
var parsedKey interface{}
|
|
if parsedKey, err = x509.ParsePKIXPublicKey(block.Bytes); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var pkey ed25519.PublicKey
|
|
var ok bool
|
|
if pkey, ok = parsedKey.(ed25519.PublicKey); !ok {
|
|
return nil, ErrNotEdPublicKey
|
|
}
|
|
|
|
return pkey, nil
|
|
}
|