[−][src]Enum openidconnect::core::CoreJwsSigningAlgorithm
OpenID Connect Core JWS signing algorithms.
These algorithms represent the alg
header parameter values for JSON Web Signature.
They are used to digitally sign or create a MAC of the contents of the JWS Protected Header and
the JWS Payload. The values are described in
Section 3.1 of RFC 7518.
Variants
HmacSha256
HMAC using SHA-256 (currently unsupported).
HmacSha384
HMAC using SHA-384 (currently unsupported).
HmacSha512
HMAC using SHA-512 (currently unsupported).
RsaSsaPkcs1V15Sha256
RSA SSA PKCS#1 v1.5 using SHA-256.
RsaSsaPkcs1V15Sha384
RSA SSA PKCS#1 v1.5 using SHA-384.
RsaSsaPkcs1V15Sha512
RSA SSA PKCS#1 v1.5 using SHA-512.
EcdsaP256Sha256
ECDSA using P-256 and SHA-256 (currently unsupported).
EcdsaP384Sha384
ECDSA using P-384 and SHA-384 (currently unsupported).
EcdsaP521Sha512
ECDSA using P-521 and SHA-512 (currently unsupported).
RsaSsaPssSha256
RSA SSA-PSS using SHA-256 and MGF1 with SHA-256.
RsaSsaPssSha384
RSA SSA-PSS using SHA-384 and MGF1 with SHA-384.
RsaSsaPssSha512
RSA SSA-PSS using SHA-512 and MGF1 with SHA-512.
None
No digital signature or MAC performed.
Security Warning
This algorithm provides no security over the integrity of the JSON Web Token. Clients should be careful not to rely on unsigned JWT's for security purposes. See Critical vulnerabilities in JSON Web Token libraries for further discussion.
Trait Implementations
impl JsonWebKey<CoreJwsSigningAlgorithm, CoreJsonWebKeyType, CoreJsonWebKeyUse> for CoreJsonWebKey
[src]
fn key_id(&self) -> Option<&JsonWebKeyId>
[src]
fn key_type(&self) -> &CoreJsonWebKeyType
[src]
fn key_use(&self) -> Option<&CoreJsonWebKeyUse>
[src]
fn new_symmetric(key: Vec<u8>) -> Self
[src]
fn verify_signature(
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8],
signature: &[u8]
) -> Result<(), SignatureVerificationError>
[src]
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8],
signature: &[u8]
) -> Result<(), SignatureVerificationError>
impl PrivateSigningKey<CoreJwsSigningAlgorithm, CoreJsonWebKeyType, CoreJsonWebKeyUse, CoreJsonWebKey> for CoreHmacKey
[src]
fn sign(
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8]
) -> Result<Vec<u8>, SigningError>
[src]
&self,
signature_alg: &CoreJwsSigningAlgorithm,
message: &[u8]
) -> Result<Vec<u8>, SigningError>
fn as_verification_key(&self) -> CoreJsonWebKey
[src]
impl PrivateSigningKey<CoreJwsSigningAlgorithm, CoreJsonWebKeyType, CoreJsonWebKeyUse, CoreJsonWebKey> for CoreRsaPrivateSigningKey
[src]
fn sign(
&self,
signature_alg: &CoreJwsSigningAlgorithm,
msg: &[u8]
) -> Result<Vec<u8>, SigningError>
[src]
&self,
signature_alg: &CoreJwsSigningAlgorithm,
msg: &[u8]
) -> Result<Vec<u8>, SigningError>
fn as_verification_key(&self) -> CoreJsonWebKey
[src]
impl JwsSigningAlgorithm<CoreJsonWebKeyType> for CoreJwsSigningAlgorithm
[src]
fn key_type(&self) -> Option<CoreJsonWebKeyType>
[src]
fn uses_shared_secret(&self) -> bool
[src]
fn hash_bytes(&self, bytes: &[u8]) -> Result<Vec<u8>, String>
[src]
fn rsa_sha_256() -> Self
[src]
impl Eq for CoreJwsSigningAlgorithm
[src]
impl Clone for CoreJwsSigningAlgorithm
[src]
fn clone(&self) -> CoreJwsSigningAlgorithm
[src]
fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl PartialEq<CoreJwsSigningAlgorithm> for CoreJwsSigningAlgorithm
[src]
fn eq(&self, other: &CoreJwsSigningAlgorithm) -> bool
[src]
#[must_use]
fn ne(&self, other: &Rhs) -> bool
1.0.0[src]
impl Hash for CoreJwsSigningAlgorithm
[src]
fn hash<__H: Hasher>(&self, state: &mut __H)
[src]
fn hash_slice<H>(data: &[Self], state: &mut H) where
H: Hasher,
1.3.0[src]
H: Hasher,
impl Debug for CoreJwsSigningAlgorithm
[src]
impl Serialize for CoreJwsSigningAlgorithm
[src]
fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
__S: Serializer,
[src]
__S: Serializer,
impl<'de> Deserialize<'de> for CoreJwsSigningAlgorithm
[src]
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
[src]
__D: Deserializer<'de>,
Auto Trait Implementations
impl Unpin for CoreJwsSigningAlgorithm
impl Sync for CoreJwsSigningAlgorithm
impl Send for CoreJwsSigningAlgorithm
impl UnwindSafe for CoreJwsSigningAlgorithm
impl RefUnwindSafe for CoreJwsSigningAlgorithm
Blanket Implementations
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
fn to_owned(&self) -> T
[src]
fn clone_into(&self, target: &mut T)
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> From<T> for T
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,
type Error = <U as TryFrom<T>>::Error
The type returned in the event of a conversion error.
fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>
[src]
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> DeserializeOwned for T where
T: Deserialize<'de>,
[src]
T: Deserialize<'de>,
impl<T> Same<T> for T
type Output = T
Should always be Self
impl<Q, K> Equivalent<K> for Q where
K: Borrow<Q> + ?Sized,
Q: Eq + ?Sized,
[src]
K: Borrow<Q> + ?Sized,
Q: Eq + ?Sized,
fn equivalent(&self, key: &K) -> bool
[src]
impl<T> Erased for T
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
U: TryFrom<T>,