Sha256: 65b28cce8a09259f9bfb928a4bbff15e4175b0cfb9468973613dc2b6ffc79cad
Contents?: true
Size: 1.48 KB
Versions: 1
Compression:
Stored size: 1.48 KB
Contents
# frozen_string_literal: true module JWT module JWK class HMAC < KeyBase KTY = 'oct' KTYS = [KTY, String].freeze attr_reader :signing_key def initialize(signing_key, options = {}) raise ArgumentError, 'signing_key must be of type String' unless signing_key.is_a?(String) @signing_key = signing_key super(options) end def private? true end def public_key nil end # See https://tools.ietf.org/html/rfc7517#appendix-A.3 def export(options = {}) exported_hash = { kty: KTY, kid: kid } return exported_hash unless private? && options[:include_private] == true exported_hash.merge( k: signing_key ) end def members { kty: KTY, k: signing_key } end alias keypair signing_key # for backwards compatibility def key_digest sequence = OpenSSL::ASN1::Sequence([OpenSSL::ASN1::UTF8String.new(signing_key), OpenSSL::ASN1::UTF8String.new(KTY)]) OpenSSL::Digest::SHA256.hexdigest(sequence.to_der) end class << self def import(jwk_data) jwk_k = jwk_data[:k] || jwk_data['k'] jwk_kid = jwk_data[:kid] || jwk_data['kid'] raise JWT::JWKError, 'Key format is invalid for HMAC' unless jwk_k new(jwk_k, kid: jwk_kid) end end end end end
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
jwt-2.5.0 | lib/jwt/jwk/hmac.rb |