From 44a7829536390c177f44943794de7c7711b1804c Mon Sep 17 00:00:00 2001 From: "Dylan K. Taylor" Date: Wed, 13 May 2020 20:50:41 +0100 Subject: [PATCH] VerifyLoginException: fixed rogue usage in JwtUtils --- src/network/mcpe/JwtUtils.php | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/src/network/mcpe/JwtUtils.php b/src/network/mcpe/JwtUtils.php index 3e847f859..d1715418e 100644 --- a/src/network/mcpe/JwtUtils.php +++ b/src/network/mcpe/JwtUtils.php @@ -31,7 +31,6 @@ use Mdanter\Ecc\Serializer\PrivateKey\PemPrivateKeySerializer; use Mdanter\Ecc\Serializer\PublicKey\DerPublicKeySerializer; use Mdanter\Ecc\Serializer\PublicKey\PemPublicKeySerializer; use Mdanter\Ecc\Serializer\Signature\DerSignatureSerializer; -use pocketmine\network\mcpe\auth\VerifyLoginException; use pocketmine\utils\AssumptionFailedError; use function base64_decode; use function base64_encode; @@ -96,7 +95,7 @@ final class JwtUtils{ $plainSignature = self::b64UrlDecode($signature); if(strlen($plainSignature) !== 96){ - throw new VerifyLoginException("JWT signature has unexpected length, expected 96, got " . strlen($plainSignature)); + throw new \UnexpectedValueException("JWT signature has unexpected length, expected 96, got " . strlen($plainSignature)); } [$rString, $sString] = str_split($plainSignature, 48);