VerifyLoginException: fixed rogue usage in JwtUtils

This commit is contained in:
Dylan K. Taylor 2020-05-13 20:50:41 +01:00
parent d7eb4f9651
commit 44a7829536

View File

@ -31,7 +31,6 @@ use Mdanter\Ecc\Serializer\PrivateKey\PemPrivateKeySerializer;
use Mdanter\Ecc\Serializer\PublicKey\DerPublicKeySerializer; use Mdanter\Ecc\Serializer\PublicKey\DerPublicKeySerializer;
use Mdanter\Ecc\Serializer\PublicKey\PemPublicKeySerializer; use Mdanter\Ecc\Serializer\PublicKey\PemPublicKeySerializer;
use Mdanter\Ecc\Serializer\Signature\DerSignatureSerializer; use Mdanter\Ecc\Serializer\Signature\DerSignatureSerializer;
use pocketmine\network\mcpe\auth\VerifyLoginException;
use pocketmine\utils\AssumptionFailedError; use pocketmine\utils\AssumptionFailedError;
use function base64_decode; use function base64_decode;
use function base64_encode; use function base64_encode;
@ -96,7 +95,7 @@ final class JwtUtils{
$plainSignature = self::b64UrlDecode($signature); $plainSignature = self::b64UrlDecode($signature);
if(strlen($plainSignature) !== 96){ if(strlen($plainSignature) !== 96){
throw new VerifyLoginException("JWT signature has unexpected length, expected 96, got " . strlen($plainSignature)); throw new \UnexpectedValueException("JWT signature has unexpected length, expected 96, got " . strlen($plainSignature));
} }
[$rString, $sString] = str_split($plainSignature, 48); [$rString, $sString] = str_split($plainSignature, 48);