Expand description
Implementations of JWT signing / verification algorithms. Also contains generic traits for signing and verifying keys.
Structs§
- Integrity algorithm using digital signatures on the Ed25519 elliptic curve.
ES256signing algorithm. Implements elliptic curve digital signatures (ECDSA) on the secp256r1 curve (aka P-256).- Algorithm implementing elliptic curve digital signatures (ECDSA) on the secp256k1 curve.
HS256signing algorithm.HS384signing algorithm.HS512signing algorithm.- Signing / verifying key for
HS256algorithm. Zeroed on drop. - Signature produced by the
Hs256algorithm. - Signing / verifying key for
HS384algorithm. Zeroed on drop. - Signature produced by the
Hs384algorithm. - Signing / verifying key for
HS512algorithm. Zeroed on drop. - Signature produced by the
Hs512algorithm. - Error type returned when a conversion of an integer into
ModulusBitsfails. - Rsa
rsaIntegrity algorithm using RSA digital signatures. - Errors that can occur when parsing an
Rsaalgorithm from a string. - Represents a whole RSA key, public and private parts.
- RsaPublic
Key rsaRepresents the public part of an RSA key. - RsaSignature
rsaRSA signature. - Generic container for secret bytes, which can be either owned or borrowed. If owned, bytes are zeroized on drop.
- Wrapper around a JWT algorithm signalling that it supports only
StrongKeys. - Wrapper around keys allowing to enforce key strength requirements.
- Error type used for fallible conversion into a
StrongKey.
Enums§
- Modulus
Bits rsaBit length of an RSA key modulus (aka RSA key length). - RsaError
rsaError types
Traits§
- Signing key for a specific signature cryptosystem. In the case of public-key cryptosystems, this is a private key.
- Verifying key for a specific signature cryptosystem. In the case of public-key cryptosystems, this is a public key.