mirror of
https://github.com/BitskiCo/jwk-rs
synced 2024-11-24 21:09:22 +00:00
Add docs
This commit is contained in:
parent
30ceb84639
commit
bca7f0a3ca
@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "jsonwebkey"
|
name = "jsonwebkey"
|
||||||
version = "0.0.2"
|
version = "0.0.3"
|
||||||
authors = ["Nick Hynes <nhynes@nhynes.com>"]
|
authors = ["Nick Hynes <nhynes@nhynes.com>"]
|
||||||
description = "JSON Web Key (JWK) (de)serialization, generation, and conversion."
|
description = "JSON Web Key (JWK) (de)serialization, generation, and conversion."
|
||||||
readme = "README.md"
|
readme = "README.md"
|
||||||
@ -15,7 +15,6 @@ derive_more = "0.99"
|
|||||||
jsonwebtoken = { version = "7.2", optional = true }
|
jsonwebtoken = { version = "7.2", optional = true }
|
||||||
num-bigint = { version = "0.2", optional = true }
|
num-bigint = { version = "0.2", optional = true }
|
||||||
p256 = { version = "0.3", optional = true }
|
p256 = { version = "0.3", optional = true }
|
||||||
paste = "0.1"
|
|
||||||
rand = { version = "0.7", optional = true }
|
rand = { version = "0.7", optional = true }
|
||||||
serde = { version = "1.0", features = ["derive"] }
|
serde = { version = "1.0", features = ["derive"] }
|
||||||
serde_json = "1.0"
|
serde_json = "1.0"
|
||||||
|
58
README.md
58
README.md
@ -8,32 +8,56 @@ Note: requires rustc nightly >= 1.45 for conveniences around fixed-size arrays.
|
|||||||
|
|
||||||
tl;dr: get keys into a format that can be used by other crates; be as safe as possible while doing so.
|
tl;dr: get keys into a format that can be used by other crates; be as safe as possible while doing so.
|
||||||
|
|
||||||
- [x] Serialization and deserialization of _Required_ and _Recommended_ key types (HS256, RS256, ES256)
|
- Serialization and deserialization of _Required_ and _Recommended_ key types (HS256, RS256, ES256)
|
||||||
- [x] Conversion to PEM for interop with existing JWT libraries (e.g., [jsonwebtoken](https://crates.io/crates/jsonwebtoken))
|
- Conversion to PEM for interop with existing JWT libraries (e.g., [jsonwebtoken](https://crates.io/crates/jsonwebtoken))
|
||||||
- [ ] Key generation (particularly for testing)
|
- Key generation (particularly useful for testing)
|
||||||
|
|
||||||
**Non-goals**
|
**Non-goals**
|
||||||
|
|
||||||
* be a fully-featured JOSE framework
|
- be a fully-featured JOSE framework
|
||||||
|
|
||||||
## Example
|
## Examples
|
||||||
|
|
||||||
|
### Deserializing from JSON
|
||||||
|
|
||||||
|
```rust
|
||||||
|
extern crate jsonwebkey as jwk;
|
||||||
|
// Generated using https://mkjwk.org/.
|
||||||
|
let jwt_str = r#"{
|
||||||
|
"kty": "oct",
|
||||||
|
"use": "sig",
|
||||||
|
"kid": "my signing key",
|
||||||
|
"k": "Wpj30SfkzM_m0Sa_B2NqNw",
|
||||||
|
"alg": "HS256"
|
||||||
|
}"#;
|
||||||
|
let jwk: jwk::JsonWebKey = jwt_str.parse().unwrap();
|
||||||
|
println!("{:#?}", jwk); // looks like `jwt_str` but with reordered fields.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Using with other crates
|
||||||
|
|
||||||
```rust
|
```rust
|
||||||
extern crate jsonwebtoken as jwt;
|
extern crate jsonwebtoken as jwt;
|
||||||
extern crate jsonwebkey as jwk;
|
extern crate jsonwebkey as jwk;
|
||||||
|
|
||||||
fn main() {
|
#[derive(serde::Serialize, serde::Deserialize)]
|
||||||
let jwk_str = r#"{
|
struct TokenClaims {}
|
||||||
"kty": "EC",
|
|
||||||
"d": "ZoKQ9j4dhIBlMRVrv-QG8P_T9sutv3_95eio9MtpgKg",
|
let mut my_jwk = jwk::JsonWebKey::new(jwk::Key::generate_p256());
|
||||||
"crv": "P-256",
|
my_jwk.set_algorithm(jwk::Algorithm::ES256);
|
||||||
"x": "QOMHmv96tVlJv-uNqprnDSKIj5AiLTXKRomXYnav0N0",
|
|
||||||
"y": "TjYZoHnctatEE6NCrKmXQdJJPnNzZEX8nBmZde3AY4k"
|
let encoding_key = jwt::EncodingKey::from_ec_der(&my_jwk.key.to_der().unwrap());
|
||||||
}"#;
|
let token = jwt::encode(
|
||||||
let jwk = jwk::JsonWebKey::from_str(jwk_str).unwrap();
|
&jwt::Header::new(my_jwk.algorithm.unwrap().into()),
|
||||||
let encoding_key = jwk::EncodingKey::from_ec_der(jwk.to_der().unwrap());
|
&TokenClaims {},
|
||||||
let token = jwt::encode(&jwt::Header::default(), &() /* claims */, encoding_key).unwrap();
|
&encoding_key,
|
||||||
}
|
).unwrap();
|
||||||
|
|
||||||
|
let public_pem = my_jwk.key.to_public().unwrap().to_pem().unwrap();
|
||||||
|
let decoding_key = jwt::DecodingKey::from_ec_pem(public_pem.as_bytes()).unwrap();
|
||||||
|
let mut validation = jwt::Validation::new(my_jwk.algorithm.unwrap().into());
|
||||||
|
validation.validate_exp = false;
|
||||||
|
jwt::decode::<TokenClaims>(&token, &decoding_key, &validation).unwrap();
|
||||||
```
|
```
|
||||||
|
|
||||||
## Features
|
## Features
|
||||||
|
@ -9,6 +9,7 @@ use zeroize::{Zeroize, Zeroizing};
|
|||||||
|
|
||||||
use crate::utils::{deserialize_base64, serialize_base64};
|
use crate::utils::{deserialize_base64, serialize_base64};
|
||||||
|
|
||||||
|
/// A zeroizing-on-drop container for a `[u8; N]` that deserializes from base64.
|
||||||
#[derive(Clone, Zeroize, Deref, AsRef, From)]
|
#[derive(Clone, Zeroize, Deref, AsRef, From)]
|
||||||
#[zeroize(drop)]
|
#[zeroize(drop)]
|
||||||
pub struct ByteArray<const N: usize>(pub [u8; N]);
|
pub struct ByteArray<const N: usize>(pub [u8; N]);
|
||||||
|
@ -9,6 +9,7 @@ use zeroize::Zeroize;
|
|||||||
|
|
||||||
use crate::utils::{deserialize_base64, serialize_base64};
|
use crate::utils::{deserialize_base64, serialize_base64};
|
||||||
|
|
||||||
|
/// A zeroizing-on-drop container for a `Vec<u8>` that deserializes from base64.
|
||||||
#[derive(Clone, PartialEq, Eq, Zeroize, Deref, AsRef, From)]
|
#[derive(Clone, PartialEq, Eq, Zeroize, Deref, AsRef, From)]
|
||||||
#[zeroize(drop)]
|
#[zeroize(drop)]
|
||||||
pub struct ByteVec(pub Vec<u8>);
|
pub struct ByteVec(pub Vec<u8>);
|
||||||
|
@ -4,13 +4,11 @@ use serde::{
|
|||||||
};
|
};
|
||||||
|
|
||||||
macro_rules! impl_key_ops {
|
macro_rules! impl_key_ops {
|
||||||
($(($key_op:ident, $i:literal)),+,) => {
|
($(($key_op:ident, $const_name:ident, $i:literal)),+,) => {
|
||||||
paste::item! {
|
bitflags::bitflags! {
|
||||||
bitflags::bitflags! {
|
#[derive(Default)]
|
||||||
#[derive(Default)]
|
pub struct KeyOps: u16 {
|
||||||
pub struct KeyOps: u16 {
|
$(const $const_name = $i;)*
|
||||||
$(const [<$key_op:upper>] = $i;)*
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -18,7 +16,7 @@ macro_rules! impl_key_ops {
|
|||||||
fn serialize<S: Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
fn serialize<S: Serializer>(&self, s: S) -> Result<S::Ok, S::Error> {
|
||||||
let mut seq = s.serialize_seq(Some(self.bits().count_ones() as usize))?;
|
let mut seq = s.serialize_seq(Some(self.bits().count_ones() as usize))?;
|
||||||
$(
|
$(
|
||||||
if self.contains(paste::expr! { KeyOps::[<$key_op:upper>] }) {
|
if self.contains(KeyOps::$const_name) {
|
||||||
seq.serialize_element(stringify!($key_op))?;
|
seq.serialize_element(stringify!($key_op))?;
|
||||||
}
|
}
|
||||||
)+
|
)+
|
||||||
@ -33,7 +31,7 @@ macro_rules! impl_key_ops {
|
|||||||
for op_str in op_strs {
|
for op_str in op_strs {
|
||||||
$(
|
$(
|
||||||
if op_str == stringify!($key_op) {
|
if op_str == stringify!($key_op) {
|
||||||
ops |= paste::expr! { KeyOps::[<$key_op:upper>] };
|
ops |= KeyOps::$const_name;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
)+
|
)+
|
||||||
@ -47,12 +45,12 @@ macro_rules! impl_key_ops {
|
|||||||
|
|
||||||
#[rustfmt::skip]
|
#[rustfmt::skip]
|
||||||
impl_key_ops!(
|
impl_key_ops!(
|
||||||
(sign, 0b00000001),
|
(sign, SIGN, 0b00000001),
|
||||||
(verify, 0b00000010),
|
(verify, VERIFY, 0b00000010),
|
||||||
(encrypt, 0b00000100),
|
(encrypt, ENCRYPT, 0b00000100),
|
||||||
(decrypt, 0b00001000),
|
(decrypt, DECRYPT, 0b00001000),
|
||||||
(wrapKey, 0b00010000),
|
(wrapKey, WRAP_KEY, 0b00010000),
|
||||||
(unwrapKey, 0b00100000),
|
(unwrapKey, UNWRAP_KEY, 0b00100000),
|
||||||
(deriveKey, 0b01000000),
|
(deriveKey, DERIVE_KEY, 0b01000000),
|
||||||
(deriveBits, 0b10000000),
|
(deriveBits, DERIVE_BITS, 0b10000000),
|
||||||
);
|
);
|
||||||
|
91
src/lib.rs
91
src/lib.rs
@ -1,6 +1,65 @@
|
|||||||
#![allow(incomplete_features)]
|
#![allow(incomplete_features)]
|
||||||
#![feature(box_syntax, const_generics, fixed_size_array)]
|
#![feature(box_syntax, const_generics, fixed_size_array)]
|
||||||
|
|
||||||
|
//! # jsonwebkey
|
||||||
|
//!
|
||||||
|
//! *[JSON Web Key (JWK)](https://tools.ietf.org/html/rfc7517#section-4.3) (de)serialization, generation, and conversion.*
|
||||||
|
//!
|
||||||
|
//! **Note**: this crate requires Rust nightly >= 1.45 because it uses
|
||||||
|
//! `feature(const_generics, fixed_size_array)` to enable statically-checked key lengths.
|
||||||
|
//!
|
||||||
|
//! ## Examples
|
||||||
|
//!
|
||||||
|
//! ### Deserializing from JSON
|
||||||
|
//!
|
||||||
|
//! ```
|
||||||
|
//! extern crate jsonwebkey as jwk;
|
||||||
|
//! // Generated using https://mkjwk.org/.
|
||||||
|
//! let jwt_str = r#"{
|
||||||
|
//! "kty": "oct",
|
||||||
|
//! "use": "sig",
|
||||||
|
//! "kid": "my signing key",
|
||||||
|
//! "k": "Wpj30SfkzM_m0Sa_B2NqNw",
|
||||||
|
//! "alg": "HS256"
|
||||||
|
//! }"#;
|
||||||
|
//! let jwk: jwk::JsonWebKey = jwt_str.parse().unwrap();
|
||||||
|
//! println!("{:#?}", jwk); // looks like `jwt_str` but with reordered fields.
|
||||||
|
//! ```
|
||||||
|
//!
|
||||||
|
//! ### Using with other crates
|
||||||
|
//!
|
||||||
|
//! ```
|
||||||
|
//! extern crate jsonwebtoken as jwt;
|
||||||
|
//! extern crate jsonwebkey as jwk;
|
||||||
|
//!
|
||||||
|
//! #[derive(serde::Serialize, serde::Deserialize)]
|
||||||
|
//! struct TokenClaims {}
|
||||||
|
//!
|
||||||
|
//! let mut my_jwk = jwk::JsonWebKey::new(jwk::Key::generate_p256());
|
||||||
|
//! my_jwk.set_algorithm(jwk::Algorithm::ES256);
|
||||||
|
//!
|
||||||
|
//! let encoding_key = jwt::EncodingKey::from_ec_der(&my_jwk.key.to_der().unwrap());
|
||||||
|
//! let token = jwt::encode(
|
||||||
|
//! &jwt::Header::new(my_jwk.algorithm.unwrap().into()),
|
||||||
|
//! &TokenClaims {},
|
||||||
|
//! &encoding_key,
|
||||||
|
//! ).unwrap();
|
||||||
|
//!
|
||||||
|
//! let public_pem = my_jwk.key.to_public().unwrap().to_pem().unwrap();
|
||||||
|
//! let decoding_key = jwt::DecodingKey::from_ec_pem(public_pem.as_bytes()).unwrap();
|
||||||
|
//! let mut validation = jwt::Validation::new(my_jwk.algorithm.unwrap().into());
|
||||||
|
//! validation.validate_exp = false;
|
||||||
|
//! jwt::decode::<TokenClaims>(&token, &decoding_key, &validation).unwrap();
|
||||||
|
//! ```
|
||||||
|
//!
|
||||||
|
//! ## Features
|
||||||
|
//!
|
||||||
|
//! * `convert` - enables `Key::{to_der, to_pem}`.
|
||||||
|
//! This pulls in the [yasna](https://crates.io/crates/yasna) crate.
|
||||||
|
//! * `generate` - enables `Key::{generate_p256, generate_symmetric}`.
|
||||||
|
//! This pulls in the [p256](https://crates.io/crates/p256) and [rand](https://crates.io/crates/rand) crates.
|
||||||
|
//! * `jsonwebtoken` - enables conversions to types in the [jsonwebtoken](https://crates.io/crates/jsonwebtoken) crate.
|
||||||
|
|
||||||
mod byte_array;
|
mod byte_array;
|
||||||
mod byte_vec;
|
mod byte_vec;
|
||||||
mod key_ops;
|
mod key_ops;
|
||||||
@ -8,10 +67,7 @@ mod key_ops;
|
|||||||
mod tests;
|
mod tests;
|
||||||
mod utils;
|
mod utils;
|
||||||
|
|
||||||
use std::array::FixedSizeArray;
|
|
||||||
|
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
use zeroize::Zeroize;
|
|
||||||
|
|
||||||
pub use byte_array::ByteArray;
|
pub use byte_array::ByteArray;
|
||||||
pub use byte_vec::ByteVec;
|
pub use byte_vec::ByteVec;
|
||||||
@ -32,7 +88,7 @@ pub struct JsonWebKey {
|
|||||||
pub key_id: Option<String>,
|
pub key_id: Option<String>,
|
||||||
|
|
||||||
#[serde(default, rename = "alg", skip_serializing_if = "Option::is_none")]
|
#[serde(default, rename = "alg", skip_serializing_if = "Option::is_none")]
|
||||||
pub algorithm: Option<JsonWebAlgorithm>,
|
pub algorithm: Option<Algorithm>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl JsonWebKey {
|
impl JsonWebKey {
|
||||||
@ -46,7 +102,7 @@ impl JsonWebKey {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn set_algorithm(&mut self, alg: JsonWebAlgorithm) -> Result<(), Error> {
|
pub fn set_algorithm(&mut self, alg: Algorithm) -> Result<(), Error> {
|
||||||
Self::validate_algorithm(alg, &*self.key)?;
|
Self::validate_algorithm(alg, &*self.key)?;
|
||||||
self.algorithm = Some(alg);
|
self.algorithm = Some(alg);
|
||||||
Ok(())
|
Ok(())
|
||||||
@ -56,8 +112,8 @@ impl JsonWebKey {
|
|||||||
Ok(serde_json::from_slice(bytes.as_ref())?)
|
Ok(serde_json::from_slice(bytes.as_ref())?)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn validate_algorithm(alg: JsonWebAlgorithm, key: &Key) -> Result<(), Error> {
|
fn validate_algorithm(alg: Algorithm, key: &Key) -> Result<(), Error> {
|
||||||
use JsonWebAlgorithm::*;
|
use Algorithm::*;
|
||||||
use Key::*;
|
use Key::*;
|
||||||
match (alg, key) {
|
match (alg, key) {
|
||||||
(
|
(
|
||||||
@ -199,6 +255,7 @@ impl Key {
|
|||||||
Some(private_point) => {
|
Some(private_point) => {
|
||||||
pkcs8::write_private(oids, |writer: &mut DERWriterSeq| {
|
pkcs8::write_private(oids, |writer: &mut DERWriterSeq| {
|
||||||
writer.next().write_i8(1); // version
|
writer.next().write_i8(1); // version
|
||||||
|
use std::array::FixedSizeArray;
|
||||||
writer.next().write_bytes(private_point.as_slice());
|
writer.next().write_bytes(private_point.as_slice());
|
||||||
// The following tagged value is optional. OpenSSL produces it,
|
// The following tagged value is optional. OpenSSL produces it,
|
||||||
// but many tools, including jwt.io and `jsonwebtoken`, don't like it,
|
// but many tools, including jwt.io and `jsonwebtoken`, don't like it,
|
||||||
@ -333,28 +390,32 @@ impl Key {
|
|||||||
#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
|
#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
|
||||||
#[serde(tag = "crv")]
|
#[serde(tag = "crv")]
|
||||||
pub enum Curve {
|
pub enum Curve {
|
||||||
/// prime256v1
|
/// Parameters of the prime256v1 (P256) curve.
|
||||||
#[serde(rename = "P-256")]
|
#[serde(rename = "P-256")]
|
||||||
P256 {
|
P256 {
|
||||||
/// Private point.
|
/// The private scalar.
|
||||||
#[serde(skip_serializing_if = "Option::is_none")]
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
d: Option<ByteArray<32>>,
|
d: Option<ByteArray<32>>,
|
||||||
|
/// The curve point x coordinate.
|
||||||
x: ByteArray<32>,
|
x: ByteArray<32>,
|
||||||
|
/// The curve point y coordinate.
|
||||||
y: ByteArray<32>,
|
y: ByteArray<32>,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
|
#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
|
||||||
pub struct RsaPublic {
|
pub struct RsaPublic {
|
||||||
/// Public exponent. Must be 65537.
|
/// The standard public exponent, 65537.
|
||||||
pub e: PublicExponent,
|
pub e: PublicExponent,
|
||||||
/// Modulus, p*q.
|
/// The modulus, p*q.
|
||||||
pub n: ByteVec,
|
pub n: ByteVec,
|
||||||
}
|
}
|
||||||
|
|
||||||
const PUBLIC_EXPONENT: u32 = 65537;
|
const PUBLIC_EXPONENT: u32 = 65537;
|
||||||
const PUBLIC_EXPONENT_B64: &str = "AQAB"; // little-endian, strip zeros
|
const PUBLIC_EXPONENT_B64: &str = "AQAB"; // little-endian, strip zeros
|
||||||
const PUBLIC_EXPONENT_B64_PADDED: &str = "AQABAA==";
|
const PUBLIC_EXPONENT_B64_PADDED: &str = "AQABAA==";
|
||||||
|
|
||||||
|
/// The standard RSA public exponent, 65537.
|
||||||
#[derive(Clone, Copy, Debug, PartialEq, Eq)]
|
#[derive(Clone, Copy, Debug, PartialEq, Eq)]
|
||||||
pub struct PublicExponent;
|
pub struct PublicExponent;
|
||||||
|
|
||||||
@ -391,7 +452,7 @@ pub struct RsaPrivate {
|
|||||||
/// First factor Chinese Remainder Theorem (CRT) exponent.
|
/// First factor Chinese Remainder Theorem (CRT) exponent.
|
||||||
#[serde(default, skip_serializing_if = "Option::is_none")]
|
#[serde(default, skip_serializing_if = "Option::is_none")]
|
||||||
pub dp: Option<ByteVec>,
|
pub dp: Option<ByteVec>,
|
||||||
/// Second factor Chinese Remainder Theorem (CRT) exponent.
|
/// Second factor CRT exponent.
|
||||||
#[serde(default, skip_serializing_if = "Option::is_none")]
|
#[serde(default, skip_serializing_if = "Option::is_none")]
|
||||||
pub dq: Option<ByteVec>,
|
pub dq: Option<ByteVec>,
|
||||||
/// First CRT coefficient.
|
/// First CRT coefficient.
|
||||||
@ -407,15 +468,15 @@ pub enum KeyUse {
|
|||||||
Encryption,
|
Encryption,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Clone, Copy, Debug, PartialEq, Eq, Serialize, Deserialize, Zeroize)]
|
#[derive(Clone, Copy, Debug, PartialEq, Eq, Serialize, Deserialize)]
|
||||||
pub enum JsonWebAlgorithm {
|
pub enum Algorithm {
|
||||||
HS256,
|
HS256,
|
||||||
RS256,
|
RS256,
|
||||||
ES256,
|
ES256,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(any(test, feature = "jsonwebtoken"))]
|
#[cfg(any(test, feature = "jsonwebtoken"))]
|
||||||
impl Into<jsonwebtoken::Algorithm> for JsonWebAlgorithm {
|
impl Into<jsonwebtoken::Algorithm> for Algorithm {
|
||||||
fn into(self) -> jsonwebtoken::Algorithm {
|
fn into(self) -> jsonwebtoken::Algorithm {
|
||||||
match self {
|
match self {
|
||||||
Self::HS256 => jsonwebtoken::Algorithm::HS256,
|
Self::HS256 => jsonwebtoken::Algorithm::HS256,
|
||||||
|
@ -24,6 +24,7 @@ static RSA_JWK_FIXTURE: &str = r#"{
|
|||||||
"qi": "adhQHH8IGXFfLEMnZ5t_TeCp5zgSwQktJ2lmylxUG0M",
|
"qi": "adhQHH8IGXFfLEMnZ5t_TeCp5zgSwQktJ2lmylxUG0M",
|
||||||
"dp": "qVnLiKeoSG_Olz17OGBGd4a2sqVFnrjh_51wuaQDdTk",
|
"dp": "qVnLiKeoSG_Olz17OGBGd4a2sqVFnrjh_51wuaQDdTk",
|
||||||
"dq": "GL_Ec6xYg2z1FRfyyGyU1lgf0BJFTZcfNI8ISIN5ssE",
|
"dq": "GL_Ec6xYg2z1FRfyyGyU1lgf0BJFTZcfNI8ISIN5ssE",
|
||||||
|
"key_ops": ["wrapKey"],
|
||||||
"n": "pCzbcd9kjvg5rfGHdEMWnXo49zbB6FLQ-m0B0BvVp0aojVWYa0xujC-ZP7ZhxByPxyc2PazwFJJi9ivZ_ggRww"
|
"n": "pCzbcd9kjvg5rfGHdEMWnXo49zbB6FLQ-m0B0BvVp0aojVWYa0xujC-ZP7ZhxByPxyc2PazwFJJi9ivZ_ggRww"
|
||||||
}"#;
|
}"#;
|
||||||
|
|
||||||
@ -56,7 +57,7 @@ fn deserialize_es256() {
|
|||||||
.into(),
|
.into(),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
algorithm: Some(JsonWebAlgorithm::ES256),
|
algorithm: Some(Algorithm::ES256),
|
||||||
key_id: Some("a key".into()),
|
key_id: Some("a key".into()),
|
||||||
key_ops: KeyOps::empty(),
|
key_ops: KeyOps::empty(),
|
||||||
key_use: Some(KeyUse::Encryption),
|
key_use: Some(KeyUse::Encryption),
|
||||||
@ -94,7 +95,7 @@ fn generate_p256() {
|
|||||||
struct TokenClaims {}
|
struct TokenClaims {}
|
||||||
|
|
||||||
let mut the_jwk = JsonWebKey::new(Key::generate_p256());
|
let mut the_jwk = JsonWebKey::new(Key::generate_p256());
|
||||||
the_jwk.set_algorithm(JsonWebAlgorithm::ES256).unwrap();
|
the_jwk.set_algorithm(Algorithm::ES256).unwrap();
|
||||||
|
|
||||||
let encoding_key = jwt::EncodingKey::from_ec_der(&the_jwk.key.to_der().unwrap());
|
let encoding_key = jwt::EncodingKey::from_ec_der(&the_jwk.key.to_der().unwrap());
|
||||||
let token = jwt::encode(
|
let token = jwt::encode(
|
||||||
@ -127,7 +128,7 @@ fn deserialize_hs256() {
|
|||||||
// The parameters were decoded using a 10-liner Rust script.
|
// The parameters were decoded using a 10-liner Rust script.
|
||||||
key: vec![180, 3, 141, 233].into(),
|
key: vec![180, 3, 141, 233].into(),
|
||||||
},
|
},
|
||||||
algorithm: Some(JsonWebAlgorithm::HS256),
|
algorithm: Some(Algorithm::HS256),
|
||||||
key_id: None,
|
key_id: None,
|
||||||
key_ops: KeyOps::SIGN | KeyOps::VERIFY,
|
key_ops: KeyOps::SIGN | KeyOps::VERIFY,
|
||||||
key_use: None,
|
key_use: None,
|
||||||
@ -219,7 +220,7 @@ fn deserialize_rs256() {
|
|||||||
},
|
},
|
||||||
algorithm: None,
|
algorithm: None,
|
||||||
key_id: None,
|
key_id: None,
|
||||||
key_ops: KeyOps::empty(),
|
key_ops: KeyOps::WRAP_KEY,
|
||||||
key_use: Some(KeyUse::Encryption),
|
key_use: Some(KeyUse::Encryption),
|
||||||
}
|
}
|
||||||
);
|
);
|
||||||
|
Loading…
Reference in New Issue
Block a user