Closed andrewbaxter closed 5 months ago
My (limited) real world testing worked.
Obviously splitting the bytes is a hack, but I wasn't able to find the ring internal methods that extract that data. I may continue to look, but I think this is relatively safe.
https://github.com/andrewbaxter/fork-jsonwebtoken/pull/2 targetted at the ACME/JWS branch
Per #357
I excluded Ed25519 for now, but the rest works as expected I believe. I'm going to test it with the code I wanted to use it in originally for now.