Module: JWT::Algos::HmacRbNaClFixed

Defined in:
lib/jwt/algos/hmac_rbnacl_fixed.rb

Constant Summary collapse

MAPPING =
{
  'HS256' => ::RbNaCl::HMAC::SHA256,
  'HS512256' => ::RbNaCl::HMAC::SHA512256,
  'HS384' => nil,
  'HS512' => ::RbNaCl::HMAC::SHA512
}.freeze
SUPPORTED =
MAPPING.keys

Class Method Summary collapse

Class Method Details

.padded_key_bytes(key, bytesize) ⇒ Object



47
48
49
# File 'lib/jwt/algos/hmac_rbnacl_fixed.rb', line 47

def padded_key_bytes(key, bytesize)
  key.bytes.fill(0, key.bytesize...bytesize).pack('C*')
end

.resolve_algorithm(algorithm) ⇒ Object



43
44
45
# File 'lib/jwt/algos/hmac_rbnacl_fixed.rb', line 43

def resolve_algorithm(algorithm)
  MAPPING.fetch(algorithm)
end

.sign(algorithm, msg, key) ⇒ Object

Raises:



17
18
19
20
21
22
23
24
25
26
27
# File 'lib/jwt/algos/hmac_rbnacl_fixed.rb', line 17

def sign(algorithm, msg, key)
  key ||= ''

  raise JWT::DecodeError, 'HMAC key expected to be a String' unless key.is_a?(String)

  if (hmac = resolve_algorithm(algorithm)) && key.bytesize <= hmac.key_bytes
    hmac.auth(padded_key_bytes(key, hmac.key_bytes), msg.encode('binary'))
  else
    Hmac.sign(algorithm, msg, key)
  end
end

.verify(algorithm, key, signing_input, signature) ⇒ Object



29
30
31
32
33
34
35
36
37
38
39
40
41
# File 'lib/jwt/algos/hmac_rbnacl_fixed.rb', line 29

def verify(algorithm, key, signing_input, signature)
  key ||= ''

  raise JWT::DecodeError, 'HMAC key expected to be a String' unless key.is_a?(String)

  if (hmac = resolve_algorithm(algorithm)) && key.bytesize <= hmac.key_bytes
    hmac.verify(padded_key_bytes(key, hmac.key_bytes), signature.encode('binary'), signing_input.encode('binary'))
  else
    Hmac.verify(algorithm, key, signing_input, signature)
  end
rescue ::RbNaCl::BadAuthenticatorError, ::RbNaCl::LengthError
  false
end