Commit graph

13 commits

Author SHA1 Message Date
Kim Alvefur
43531740f9 util: Prefix module imports with prosody namespace 2023-03-17 16:23:16 +01:00
Matthew Wild
e7bfb40a32 util.jwt: More robust ECDSA signature parsing, fail early on unexpected length 2022-09-30 20:38:31 +01:00
Matthew Wild
5ca81b0e3b util.jwt: Add support for ES512 (+ tests) 2022-09-29 23:17:42 +01:00
Matthew Wild
8695a72a66 util.crypto, util.jwt: Generate consistent signature sizes (via padding)
This fixes the signature parsing and building to work correctly. Sometimes
a signature was one or two bytes too short, and needed to be padded. OpenSSL
can do this for us.
2022-09-29 23:15:39 +01:00
Matthew Wild
ff54cc5bcf util.jwt: Add new init() convenience method to obtain both signer and verifier 2022-07-11 13:43:01 +01:00
Matthew Wild
d2ede10c5d util.jwt: Consolidate payload parsing, ensure it's always a valid object 2022-07-11 13:42:08 +01:00
Matthew Wild
23458111dc util.jwt: Provide built-in token expiry support (defaults to 3600s lifetime)
To avoid every user of the library needing to add and verify expiry info, this
is now handled by util.jwt itself (if not overridden or disabled).

Issuing tokens that are valid forever is bad practice and rarely desired, and
the default token lifetime is now 3600s (1 hour).
2022-07-11 13:28:29 +01:00
Matthew Wild
fad58c5ab2 util.jwt: All the algorithms (+ all the tests!)
Except 'none'. Not implementing that one.
2022-07-02 15:29:04 +01:00
Matthew Wild
5316b0005e util.crypto: More digests for sign/verify, use macros for clarity/consistency 2022-07-02 14:59:52 +01:00
Matthew Wild
0b0555c339 util.jwt: Add support for RSA-based algorithms (RS256, PS256) 2022-07-02 12:26:43 +01:00
Matthew Wild
ae16ddcac7 util.jwt: Add support/tests for ES256 via improved API and using util.crypto
In many cases code will be either signing or verifying. With asymmetric
algorithms it's clearer and more efficient to just state that once, instead of
passing keys (and possibly other parameters) with every sign/verify call.

This also allows earlier validation of the key used.

The previous (HS256-only) sign/verify methods continue to be exposed for
backwards-compatibility.
2022-07-01 18:51:15 +01:00
Matthew Wild
8048b53d18 util.jwt: Use constant-time comparison with expected signature 2021-05-13 14:13:07 +01:00
Kim Alvefur
0bcbbed753 util.jwt: Basic JSON Web Token library supporting HS256 tokens 2020-02-24 01:24:25 +01:00