module JWT::Algos::HmacRbNaClFixed
Constants
- MAPPING
- SUPPORTED
Public Instance Methods
padded_key_bytes(key, bytesize)
click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 47 def padded_key_bytes(key, bytesize) key.bytes.fill(0, key.bytesize...bytesize).pack('C*') end
resolve_algorithm(algorithm)
click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 43 def resolve_algorithm(algorithm) MAPPING.fetch(algorithm) end
sign(algorithm, msg, key)
click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 17 def sign(algorithm, msg, key) key ||= '' raise JWT::DecodeError, 'HMAC key expected to be a String' unless key.is_a?(String) if (hmac = resolve_algorithm(algorithm)) && key.bytesize <= hmac.key_bytes hmac.auth(padded_key_bytes(key, hmac.key_bytes), msg.encode('binary')) else Hmac.sign(algorithm, msg, key) end end
verify(algorithm, key, signing_input, signature)
click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 29 def verify(algorithm, key, signing_input, signature) key ||= '' raise JWT::DecodeError, 'HMAC key expected to be a String' unless key.is_a?(String) if (hmac = resolve_algorithm(algorithm)) && key.bytesize <= hmac.key_bytes hmac.verify(padded_key_bytes(key, hmac.key_bytes), signature.encode('binary'), signing_input.encode('binary')) else Hmac.verify(algorithm, key, signing_input, signature) end rescue ::RbNaCl::BadAuthenticatorError false end