module JWT::Algos::HmacRbNaClFixed

Constants

MAPPING
SUPPORTED

Public Instance Methods

padded_key_bytes(key, bytesize) click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 47
def padded_key_bytes(key, bytesize)
  key.bytes.fill(0, key.bytesize...bytesize).pack('C*')
end
resolve_algorithm(algorithm) click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 43
def resolve_algorithm(algorithm)
  MAPPING.fetch(algorithm)
end
sign(algorithm, msg, key) click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 17
def sign(algorithm, msg, key)
  key ||= ''

  raise JWT::DecodeError, 'HMAC key expected to be a String' unless key.is_a?(String)

  if (hmac = resolve_algorithm(algorithm)) && key.bytesize <= hmac.key_bytes
    hmac.auth(padded_key_bytes(key, hmac.key_bytes), msg.encode('binary'))
  else
    Hmac.sign(algorithm, msg, key)
  end
end
verify(algorithm, key, signing_input, signature) click to toggle source
# File lib/jwt/algos/hmac_rbnacl_fixed.rb, line 29
def verify(algorithm, key, signing_input, signature)
  key ||= ''

  raise JWT::DecodeError, 'HMAC key expected to be a String' unless key.is_a?(String)

  if (hmac = resolve_algorithm(algorithm)) && key.bytesize <= hmac.key_bytes
    hmac.verify(padded_key_bytes(key, hmac.key_bytes), signature.encode('binary'), signing_input.encode('binary'))
  else
    Hmac.verify(algorithm, key, signing_input, signature)
  end
rescue ::RbNaCl::BadAuthenticatorError
  false
end