Commit Graph

113 Commits

Author SHA1 Message Date
Dave Grijalva 47b263f020 Merge pull request #38 from BugHerd/var-errors
Move errors to variables so they can be matched against
2014-11-03 13:11:22 -08:00
Alan Harper 1663b3c6c2 Move errors to variables so they can be matched against 2014-10-20 16:09:02 +11:00
Dave Grijalva 8c45ba33b0 version notes for 2.2.0 2014-10-11 13:58:31 -07:00
Dave Grijalva 4beb9b5850 gracefully handle a nil keyfunc passed to Parse. (and more tests) 2014-10-11 13:54:16 -07:00
Dave Grijalva e1571c8f04 Fixed issue #36 - out of date example code 2014-10-06 22:41:14 -07:00
Dave Grijalva d82ad649e4 version 2.1.0 2014-09-30 12:21:30 -07:00
TommyO e82659ca5b Updated to accept interface{} as supported by underlying Verify methods.
Needed to support precompiled public keys.
2014-09-29 14:00:25 -04:00
Dave Grijalva c0da491622 Merge pull request #32 from porjo/porjo
Lowercase error messages
2014-09-15 11:11:21 -07:00
Ian Bishop 0c21a058ab Lowercase error messages 2014-09-08 11:42:58 +10:00
Dave Grijalva ed42077928 Added note about 2.0.0 change. 2014-08-26 18:22:44 -07:00
Dave Grijalva 35c43501ff documentation 2014-08-26 15:30:37 -07:00
Dave Grijalva 2ef58916cc return an error if the requested hash method hasn't been compiled in 2014-08-26 15:00:15 -07:00
Dave Grijalva 48aa7e5db1 documentation 2014-08-26 14:41:32 -07:00
Dave Grijalva bcec7fbe47 documentation fix 2014-08-26 14:25:13 -07:00
Dave Grijalva 652b4be28c make helper methods more specific 2014-08-26 14:24:20 -07:00
Simon Jefford 1363e28b6a expose RSA key PEM parsing funcs 2014-08-26 14:21:38 -07:00
Simon Jefford 33523225e1 can now pass a PublicKey to SigningMethodRSA.Verify 2014-08-26 14:20:56 -07:00
Simon Jefford dc2f34cdb1 can now pass a PrivateKey to SigningMethodRSA.Sign
Conflicts:
	rsa.go
2014-08-26 14:20:28 -07:00
Dave Grijalva c9b532b51b cleanup and documentation updates 2014-08-26 14:18:59 -07:00
Simon Jefford 23cb3af02c pass keys as interface{} rather than []byte
This will allow clients to pass, for example, their own instances of
rsa.PublicKey if the key is not specified as some flavour of X509
cert. For example, Salesforce just specify the modulus and
exponent (https://login.salesforce.com/id/keys)
2014-08-26 14:14:17 -07:00
Dave Grijalva 0ed08007c3 working on version history 2014-08-26 14:12:21 -07:00
Dave Grijalva 94aeb012a4 version changes from PR #28 2014-08-26 13:58:07 -07:00
Dave Grijalva aeaaac5773 Merge branch 'master' into two_point_oh 2014-08-26 13:52:35 -07:00
Dave Grijalva 0987fb8fd4 v1.0.2 2014-08-26 13:51:41 -07:00
Dave Grijalva 82483208e1 removed 2.0 release notice from readme 2014-08-26 13:47:03 -07:00
Dave Grijalva 358ed97e4b Merge branch 'wider' into two_point_oh 2014-08-26 13:45:08 -07:00
Dave Grijalva ef77e106a6 Update README.md 2014-08-11 13:13:46 -07:00
Dave Grijalva 1482919d15 unit tests for parsePublicKey 2014-07-05 15:58:07 -07:00
Dave Grijalva 372e731f4c Merge branch 'master' into wider
Conflicts:
	rs256.go
2014-07-05 15:51:12 -07:00
Dave Grijalva 37329b525d cleaned up RS256 implementation. no functional changes 2014-07-05 15:50:46 -07:00
Dave Grijalva 629af62465 Added support for RS384 and RS512 signing methods
Renamed type SigningMethodRS256 to SigningMethodRSA
Added contstants SigningMethodRS256, SigningMethodRS384, and SigningMethodRS512 to support each of these methods
Added simple tests to support these new methods
2014-07-05 15:34:31 -07:00
Dave Grijalva 97430c0b8b cleaned up and flattened RS256 implementation 2014-07-05 15:25:29 -07:00
Dave Grijalva 5aed334e04 Added support for HS384 and HS512 signing methods
Renamed type SigningMethodHS256 to SigningMethodHMAC
Added contstants SigningMethodHS256, SigningMethodHS384, and SigningMethodHS512 to support each of these methods
Added simple tests to support these new methods
2014-07-05 15:08:42 -07:00
Dave Grijalva fbcb3e4b63 version history 2014-07-05 13:05:22 -07:00
Dave Grijalva f7a9d2e66e documentation about key requirements 2014-06-28 11:31:26 -07:00
Dave Grijalva bf910acaf8 fixed: SigningMethodRS256.Sign would panic if the provided key was not PEM encoded 2014-06-28 11:29:32 -07:00
Dave Grijalva e5f9e9c647 Merge pull request #19 from dgrijalva/semver
One Dot Oh™ and Semantic Versioning
2014-06-15 19:41:49 -07:00
Dave Grijalva a95c191bb4 documentation 2014-06-15 19:40:38 -07:00
Dave Grijalva 6174711902 updating documentation 2014-06-15 19:39:12 -07:00
Dave Grijalva 2c907dbb70 comments 2014-06-15 19:32:57 -07:00
Dave Grijalva 8800a8c28c package doc 2014-06-15 19:29:09 -07:00
Dave Grijalva 45070d60b9 Merge branch 'master' of github.com:cenkalti/jwt-go 2014-06-15 19:21:25 -07:00
Dave Grijalva b1c2dab94c Merge branch 'fixBase64PaddingInGo13rc1' of github.com:cryptix/jwt-go 2014-06-15 19:19:06 -07:00
Henry cdfe06219b use ioutil.ReadFile for reading test keys 2014-06-03 16:21:48 +02:00
Henry 679bf0f3c9 Fixes #22 - Padding issue in Go1.3 rc1 2014-06-03 16:15:11 +02:00
Cenk Alti 9360809320 indent error flow
https://code.google.com/p/go-wiki/wiki/CodeReviewComments#Indent_Error_Flow
2014-06-02 11:28:16 +03:00
Dave Grijalva 15d25a9820 updated documentation for 1.0.0 2014-05-27 14:23:32 -07:00
Dave Grijalva fecd9ab279 Merge pull request #18 from aspic/patch-1
Update jwt.go
2014-05-22 12:02:40 -07:00
Dave Grijalva cdec324455 Merge pull request #17 from cryptix/prettierPretty
change pretty to compact
2014-05-22 11:54:38 -07:00
Kjetil Mehl 83c2b30a8b Update jwt.go
Hi! I'm using Go 1.0.2 and encountered "src/github.com/dgrijalva/jwt-go/jwt.go:87: function ends without a return statement". This commit returns explicit at the end of the function.
2014-05-22 20:27:05 +02:00