|
| 1 | +use base64::{engine::general_purpose::STANDARD, Engine}; |
1 | 2 | use hmac::{Hmac, Mac};
|
2 | 3 | use sha2::{Sha256, Sha384, Sha512};
|
3 |
| -use signature::Signer; |
| 4 | +use signature::{Signer, Verifier}; |
4 | 5 |
|
5 | 6 | use crate::errors::Result;
|
6 |
| -use crate::serialization::{b64_decode, b64_encode}; |
7 | 7 | use crate::Algorithm;
|
8 | 8 |
|
9 |
| -use super::JwtSigner; |
| 9 | +use super::{JwtSigner, JwtVerifier}; |
10 | 10 |
|
11 | 11 | type HmacSha256 = Hmac<Sha256>;
|
12 | 12 | type HmacSha384 = Hmac<Sha384>;
|
13 | 13 | type HmacSha512 = Hmac<Sha512>;
|
14 | 14 |
|
15 |
| -pub(crate) struct HmacSha256Trait(HmacSha256); |
| 15 | +pub(crate) struct HmacSecret(Vec<u8>); |
16 | 16 |
|
17 |
| -impl HmacSha256Trait { |
18 |
| - pub(crate) fn new(key: &[u8]) -> Result<Self> { |
19 |
| - let inner = HmacSha256::new_from_slice(key) |
| 17 | +impl HmacSecret { |
| 18 | + /// If you're using an HMAC secret that is not base64, use that. |
| 19 | + pub fn from_secret(secret: &[u8]) -> Self { |
| 20 | + Self(secret.to_vec()) |
| 21 | + } |
| 22 | + |
| 23 | + /// If you have a base64 HMAC secret, use that. |
| 24 | + pub fn from_base64_secret(secret: &str) -> Result<Self> { |
| 25 | + Ok(Self(STANDARD.decode(secret)?)) |
| 26 | + } |
| 27 | +} |
| 28 | + |
| 29 | +pub struct Hs256(HmacSha256); |
| 30 | + |
| 31 | +impl Hs256 { |
| 32 | + pub(crate) fn new(secret: HmacSecret) -> Result<Self> { |
| 33 | + let inner = HmacSha256::new_from_slice(&secret.0) |
20 | 34 | .map_err(|_e| crate::errors::ErrorKind::InvalidKeyFormat)?;
|
21 | 35 |
|
22 | 36 | Ok(Self(inner))
|
23 | 37 | }
|
24 | 38 | }
|
25 | 39 |
|
26 |
| -impl Signer<Vec<u8>> for HmacSha256Trait { |
| 40 | +impl Signer<Vec<u8>> for Hs256 { |
27 | 41 | fn try_sign(&self, msg: &[u8]) -> std::result::Result<Vec<u8>, signature::Error> {
|
28 | 42 | let mut signer = self.0.clone();
|
| 43 | + signer.reset(); |
| 44 | + signer.update(msg); |
29 | 45 |
|
30 |
| - Ok(signer.sign(msg)) |
| 46 | + Ok(signer.finalize().into_bytes().to_vec()) |
31 | 47 | }
|
32 | 48 | }
|
33 | 49 |
|
34 |
| -impl JwtSigner for HmacSha256Trait { |
| 50 | +impl JwtSigner for Hs256 { |
35 | 51 | fn algorithm(&self) -> Algorithm {
|
36 | 52 | Algorithm::HS256
|
37 | 53 | }
|
38 | 54 | }
|
39 | 55 |
|
40 |
| -pub(crate) fn sign_hmac(alg: Algorithm, key: &[u8], message: &[u8]) -> Result<String> { |
41 |
| - let mut hmac = create_hmac(alg, key)?; |
42 |
| - let digest = hmac.sign(message); |
43 |
| - Ok(b64_encode(digest)) |
44 |
| -} |
| 56 | +impl Verifier<Vec<u8>> for Hs256 { |
| 57 | + fn verify(&self, msg: &[u8], signature: &Vec<u8>) -> std::result::Result<(), signature::Error> { |
| 58 | + let mut verifier = self.0.clone(); |
| 59 | + verifier.reset(); |
| 60 | + verifier.update(msg); |
45 | 61 |
|
46 |
| -pub(crate) fn hmac_verify( |
47 |
| - alg: Algorithm, |
48 |
| - signature: &str, |
49 |
| - key: &[u8], |
50 |
| - message: &[u8], |
51 |
| -) -> Result<bool> { |
52 |
| - let mut hmac = create_hmac(alg, key)?; |
53 |
| - let signature = b64_decode(signature)?; |
54 |
| - Ok(hmac.verify(&signature, message)) |
| 62 | + verifier.verify_slice(signature).map_err(|e| signature::Error::from_source(e)) |
| 63 | + } |
55 | 64 | }
|
56 | 65 |
|
57 |
| -fn create_hmac(alg: Algorithm, key: &[u8]) -> Result<Box<dyn HmacAlgorithm>> { |
58 |
| - let hmac: Box<dyn HmacAlgorithm> = match alg { |
59 |
| - Algorithm::HS256 => { |
60 |
| - let sha256 = HmacSha256::new_from_slice(key) |
61 |
| - .map_err(|_e| crate::errors::ErrorKind::InvalidKeyFormat)?; |
62 |
| - Box::new(sha256) |
63 |
| - } |
64 |
| - Algorithm::HS384 => { |
65 |
| - let sha384 = HmacSha384::new_from_slice(key) |
66 |
| - .map_err(|_e| crate::errors::ErrorKind::InvalidKeyFormat)?; |
67 |
| - Box::new(sha384) |
68 |
| - } |
69 |
| - Algorithm::HS512 => { |
70 |
| - let sha512 = HmacSha512::new_from_slice(key) |
71 |
| - .map_err(|_e| crate::errors::ErrorKind::InvalidKeyFormat)?; |
72 |
| - Box::new(sha512) |
73 |
| - } |
74 |
| - _ => { |
75 |
| - return Err(crate::errors::new_error(crate::errors::ErrorKind::InvalidAlgorithm)); |
76 |
| - } |
77 |
| - }; |
78 |
| - Ok(hmac) |
| 66 | +impl JwtVerifier for Hs256 { |
| 67 | + fn algorithm(&self) -> Algorithm { |
| 68 | + Algorithm::HS256 |
| 69 | + } |
79 | 70 | }
|
80 | 71 |
|
81 |
| -trait HmacAlgorithm { |
82 |
| - fn sign(&mut self, message: &[u8]) -> Vec<u8>; |
83 |
| - fn verify(&mut self, signature: &[u8], message: &[u8]) -> bool; |
84 |
| -} |
| 72 | +pub(crate) struct Hs384(HmacSha384); |
85 | 73 |
|
86 |
| -impl HmacAlgorithm for Box<dyn HmacAlgorithm + '_> { |
87 |
| - fn sign(&mut self, message: &[u8]) -> Vec<u8> { |
88 |
| - (**self).sign(message) |
89 |
| - } |
| 74 | +impl Hs384 { |
| 75 | + pub(crate) fn new(secret: HmacSecret) -> Result<Self> { |
| 76 | + let inner = HmacSha384::new_from_slice(&secret.0) |
| 77 | + .map_err(|_e| crate::errors::ErrorKind::InvalidKeyFormat)?; |
90 | 78 |
|
91 |
| - fn verify(&mut self, signature: &[u8], message: &[u8]) -> bool { |
92 |
| - (**self).verify(signature, message) |
| 79 | + Ok(Self(inner)) |
93 | 80 | }
|
94 | 81 | }
|
95 | 82 |
|
96 |
| -impl HmacAlgorithm for HmacSha256 { |
97 |
| - fn sign(&mut self, message: &[u8]) -> Vec<u8> { |
98 |
| - self.reset(); |
99 |
| - self.update(message); |
100 |
| - self.clone().finalize().into_bytes().to_vec() |
101 |
| - } |
102 |
| - fn verify(&mut self, signature: &[u8], message: &[u8]) -> bool { |
103 |
| - self.reset(); |
104 |
| - self.update(message); |
105 |
| - self.clone().verify_slice(signature).is_ok() |
| 83 | +impl Signer<Vec<u8>> for Hs384 { |
| 84 | + fn try_sign(&self, msg: &[u8]) -> std::result::Result<Vec<u8>, signature::Error> { |
| 85 | + let mut signer = self.0.clone(); |
| 86 | + signer.reset(); |
| 87 | + signer.update(msg); |
| 88 | + |
| 89 | + Ok(signer.finalize().into_bytes().to_vec()) |
106 | 90 | }
|
107 | 91 | }
|
108 | 92 |
|
109 |
| -impl HmacAlgorithm for HmacSha384 { |
110 |
| - fn sign(&mut self, message: &[u8]) -> Vec<u8> { |
111 |
| - self.reset(); |
112 |
| - self.update(message); |
113 |
| - self.clone().finalize().into_bytes().to_vec() |
114 |
| - } |
115 |
| - fn verify(&mut self, signature: &[u8], message: &[u8]) -> bool { |
116 |
| - self.reset(); |
117 |
| - self.update(message); |
118 |
| - self.clone().verify_slice(signature).is_ok() |
| 93 | +impl JwtSigner for Hs384 { |
| 94 | + fn algorithm(&self) -> Algorithm { |
| 95 | + Algorithm::HS384 |
119 | 96 | }
|
120 | 97 | }
|
121 | 98 |
|
122 |
| -impl HmacAlgorithm for HmacSha512 { |
123 |
| - fn sign(&mut self, message: &[u8]) -> Vec<u8> { |
124 |
| - self.reset(); |
125 |
| - self.update(message); |
126 |
| - self.clone().finalize().into_bytes().to_vec() |
| 99 | +impl Verifier<Vec<u8>> for Hs384 { |
| 100 | + fn verify(&self, msg: &[u8], signature: &Vec<u8>) -> std::result::Result<(), signature::Error> { |
| 101 | + let mut verifier = self.0.clone(); |
| 102 | + verifier.reset(); |
| 103 | + verifier.update(msg); |
| 104 | + |
| 105 | + verifier.verify_slice(signature).map_err(|e| signature::Error::from_source(e)) |
127 | 106 | }
|
| 107 | +} |
128 | 108 |
|
129 |
| - fn verify(&mut self, signature: &[u8], message: &[u8]) -> bool { |
130 |
| - self.reset(); |
131 |
| - self.update(message); |
132 |
| - self.clone().verify_slice(signature).is_ok() |
| 109 | +impl JwtVerifier for Hs384 { |
| 110 | + fn algorithm(&self) -> Algorithm { |
| 111 | + Algorithm::HS384 |
133 | 112 | }
|
134 | 113 | }
|
0 commit comments