[−][src]Enum openidconnect::core::CoreJwsSigningAlgorithm
OpenID Connect Core JWS signing algorithms.
These algorithms represent the alg
header parameter values for JSON Web Signature.
They are used to digitally sign or create a MAC of the contents of the JWS Protected Header and
the JWS Payload. The values are described in
Section 3.1 of RFC 7518.
Variants
HMAC using SHA-256 (currently unsupported).
HMAC using SHA-384 (currently unsupported).
HMAC using SHA-512 (currently unsupported).
RSA SSA PKCS#1 v1.5 using SHA-256.
RSA SSA PKCS#1 v1.5 using SHA-384.
RSA SSA PKCS#1 v1.5 using SHA-512.
ECDSA using P-256 and SHA-256 (currently unsupported).
ECDSA using P-384 and SHA-384 (currently unsupported).
ECDSA using P-521 and SHA-512 (currently unsupported).
RSA SSA-PSS using SHA-256 and MGF1 with SHA-256.
RSA SSA-PSS using SHA-384 and MGF1 with SHA-384.
RSA SSA-PSS using SHA-512 and MGF1 with SHA-512.
No digital signature or MAC performed.
Security Warning
This algorithm provides no security over the integrity of the JSON Web Token. Clients should be careful not to rely on unsigned JWT's for security purposes. See Critical vulnerabilities in JSON Web Token libraries for further discussion.
Trait Implementations
impl JsonWebKey<CoreJwsSigningAlgorithm, CoreJsonWebKeyType, CoreJsonWebKeyUse> for CoreJsonWebKey
[src]
fn key_id(&self) -> Option<&JsonWebKeyId>
[src]
fn key_type(&self) -> &CoreJsonWebKeyType
[src]
fn key_use(&self) -> Option<&CoreJsonWebKeyUse>
[src]
fn new_symmetric(key: Vec<u8>) -> Self
[src]
fn verify_signature(
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8],
signature: &[u8]
) -> Result<(), SignatureVerificationError>
[src]
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8],
signature: &[u8]
) -> Result<(), SignatureVerificationError>
impl PrivateSigningKey<CoreJwsSigningAlgorithm, CoreJsonWebKeyType, CoreJsonWebKeyUse, CoreJsonWebKey> for CoreHmacKey
[src]
fn sign(
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8]
) -> Result<Vec<u8>, SigningError>
[src]
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8]
) -> Result<Vec<u8>, SigningError>
fn as_verification_key(&self) -> CoreJsonWebKey
[src]
impl PrivateSigningKey<CoreJwsSigningAlgorithm, CoreJsonWebKeyType, CoreJsonWebKeyUse, CoreJsonWebKey> for CoreRsaPrivateSigningKey
[src]
fn sign(
&self,
signature_alg: &CoreJwsSigningAlgorithm,
msg: &[u8]
) -> Result<Vec<u8>, SigningError>
[src]
&self,
signature_alg: &CoreJwsSigningAlgorithm,
msg: &[u8]
) -> Result<Vec<u8>, SigningError>
fn as_verification_key(&self) -> CoreJsonWebKey
[src]
impl JwsSigningAlgorithm<CoreJsonWebKeyType> for CoreJwsSigningAlgorithm
[src]
fn key_type(&self) -> Option<CoreJsonWebKeyType>
[src]
fn uses_shared_secret(&self) -> bool
[src]
fn hash_bytes(&self, bytes: &[u8]) -> Result<Vec<u8>, String>
[src]
fn rsa_sha_256() -> Self
[src]
impl Clone for CoreJwsSigningAlgorithm
[src]
fn clone(&self) -> CoreJwsSigningAlgorithm
[src]
fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl Eq for CoreJwsSigningAlgorithm
[src]
impl PartialEq<CoreJwsSigningAlgorithm> for CoreJwsSigningAlgorithm
[src]
fn eq(&self, other: &CoreJwsSigningAlgorithm) -> bool
[src]
#[must_use]
fn ne(&self, other: &Rhs) -> bool
1.0.0[src]
impl Debug for CoreJwsSigningAlgorithm
[src]
impl Hash for CoreJwsSigningAlgorithm
[src]
fn hash<__H: Hasher>(&self, state: &mut __H)
[src]
fn hash_slice<H>(data: &[Self], state: &mut H) where
H: Hasher,
1.3.0[src]
H: Hasher,
impl StructuralPartialEq for CoreJwsSigningAlgorithm
[src]
impl StructuralEq for CoreJwsSigningAlgorithm
[src]
impl Serialize for CoreJwsSigningAlgorithm
[src]
fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
__S: Serializer,
[src]
__S: Serializer,
impl<'de> Deserialize<'de> for CoreJwsSigningAlgorithm
[src]
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
[src]
__D: Deserializer<'de>,
Auto Trait Implementations
impl Send for CoreJwsSigningAlgorithm
impl Sync for CoreJwsSigningAlgorithm
impl Unpin for CoreJwsSigningAlgorithm
impl UnwindSafe for CoreJwsSigningAlgorithm
impl RefUnwindSafe for CoreJwsSigningAlgorithm
Blanket Implementations
impl<T> From<T> for T
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
fn to_owned(&self) -> T
[src]
fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = !
The type returned in the event of a conversion error.
fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,
type Error = <U as TryFrom<T>>::Error
The type returned in the event of a conversion error.
fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>
[src]
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> DeserializeOwned for T where
T: Deserialize<'de>,
[src]
T: Deserialize<'de>,
impl<Q, K> Equivalent<K> for Q where
K: Borrow<Q> + ?Sized,
Q: Eq + ?Sized,
[src]
K: Borrow<Q> + ?Sized,
Q: Eq + ?Sized,
fn equivalent(&self, key: &K) -> bool
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
U: TryFrom<T>,
impl<T> Same<T> for T
type Output = T
Should always be Self