Sha256: 41afc84e2b10626b5933afe8b7f89114f21ff371df645d159f0fc20625bb12b5
Contents?: true
Size: 1.78 KB
Versions: 3
Compression:
Stored size: 1.78 KB
Contents
module JWE module Enc module AesGcm attr_accessor :cek attr_accessor :iv attr_accessor :tag def initialize(cek = nil, iv = nil) self.iv = iv self.cek = cek end def encrypt(cleartext, authenticated_data) raise JWE::BadCEK.new("The supplied key is too short. Required length: #{key_length}") if cek.length < key_length cipher.encrypt cipher.key = cek cipher.iv = iv cipher.auth_data = authenticated_data ciphertext = cipher.update(cleartext) + cipher.final self.tag = cipher.auth_tag ciphertext end def decrypt(ciphertext, authenticated_data) raise JWE::BadCEK.new("The supplied key is too short. Required length: #{key_length}") if cek.length < key_length cipher.decrypt cipher.key = cek cipher.iv = iv cipher.auth_tag = tag cipher.auth_data = authenticated_data cipher.update(ciphertext) + cipher.final rescue OpenSSL::Cipher::CipherError raise JWE::InvalidData.new('Invalid ciphertext or authentication tag') end def iv @iv ||= SecureRandom.random_bytes(12) end def cek @cek ||= SecureRandom.random_bytes(key_length) end def cipher @cipher ||= OpenSSL::Cipher.new(cipher_name) rescue RuntimeError raise JWE::NotImplementedError.new("The version of OpenSSL linked to your Ruby does not support the cipher #{cipher_name}.") end def tag @tag || '' end def self.included(base) base.extend(ClassMethods) end module ClassMethods def available? new.cipher true rescue JWE::NotImplementedError false end end end end end
Version data entries
3 entries across 3 versions & 1 rubygems
Version | Path |
---|---|
jwe-0.3.0 | lib/jwe/enc/aes_gcm.rb |
jwe-0.2.0 | lib/jwe/enc/aes_gcm.rb |
jwe-0.1.1 | lib/jwe/enc/aes_gcm.rb |