1use std::fmt::{Debug, Formatter};
2
3use base64::{
4 Engine,
5 engine::general_purpose::{STANDARD, URL_SAFE},
6};
7use serde::ser::Serialize;
8
9use crate::algorithms::AlgorithmFamily;
10use crate::crypto::CryptoProvider;
11use crate::errors::{ErrorKind, Result, new_error};
12use crate::header::Header;
13#[cfg(feature = "use_pem")]
14use crate::pem::decoder::PemEncodedKey;
15use crate::serialization::{b64_encode, b64_encode_part};
16
17#[derive(Clone)]
20pub struct EncodingKey {
21 family: AlgorithmFamily,
22 content: Vec<u8>,
23}
24
25impl EncodingKey {
26 pub fn family(&self) -> AlgorithmFamily {
28 self.family
29 }
30
31 pub fn from_secret(secret: &[u8]) -> Self {
33 EncodingKey { family: AlgorithmFamily::Hmac, content: secret.to_vec() }
34 }
35
36 pub fn from_base64_secret(secret: &str) -> Result<Self> {
38 let out = STANDARD.decode(secret)?;
39 Ok(EncodingKey { family: AlgorithmFamily::Hmac, content: out })
40 }
41
42 pub fn from_urlsafe_base64_secret(secret: &str) -> Result<Self> {
44 let out = URL_SAFE.decode(secret)?;
45 Ok(EncodingKey { family: AlgorithmFamily::Hmac, content: out })
46 }
47
48 #[cfg(feature = "use_pem")]
58 pub fn from_rsa_pem(key: &[u8]) -> Result<Self> {
59 let pem_key = PemEncodedKey::new(key)?;
60 let content = pem_key.as_rsa_key()?;
61 Ok(EncodingKey { family: AlgorithmFamily::Rsa, content: content.to_vec() })
62 }
63
64 #[cfg(feature = "use_pem")]
79 pub fn from_ec_pem(key: &[u8]) -> Result<Self> {
80 let pem_key = PemEncodedKey::new(key)?;
81 let content = pem_key.as_ec_private_key()?;
82 Ok(EncodingKey { family: AlgorithmFamily::Ec, content: content.to_vec() })
83 }
84
85 #[cfg(feature = "use_pem")]
89 pub fn from_ed_pem(key: &[u8]) -> Result<Self> {
90 let pem_key = PemEncodedKey::new(key)?;
91 let content = pem_key.as_ed_private_key()?;
92 Ok(EncodingKey { family: AlgorithmFamily::Ed, content: content.to_vec() })
93 }
94
95 pub fn from_rsa_der(der: &[u8]) -> Self {
97 EncodingKey { family: AlgorithmFamily::Rsa, content: der.to_vec() }
98 }
99
100 pub fn from_ec_der(der: &[u8]) -> Self {
102 EncodingKey { family: AlgorithmFamily::Ec, content: der.to_vec() }
103 }
104
105 pub fn from_ed_der(der: &[u8]) -> Self {
107 EncodingKey { family: AlgorithmFamily::Ed, content: der.to_vec() }
108 }
109
110 pub fn inner(&self) -> &[u8] {
112 &self.content
113 }
114
115 pub fn try_get_hmac_secret(&self) -> Result<&[u8]> {
117 if self.family == AlgorithmFamily::Hmac {
118 Ok(self.inner())
119 } else {
120 Err(new_error(ErrorKind::InvalidKeyFormat))
121 }
122 }
123}
124
125impl Debug for EncodingKey {
126 fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
127 f.debug_struct("EncodingKey")
128 .field("family", &self.family)
129 .field("content", &"[redacted]")
130 .finish()
131 }
132}
133
134pub fn encode<T: Serialize>(header: &Header, claims: &T, key: &EncodingKey) -> Result<String> {
157 if key.family != header.alg.family() {
158 return Err(new_error(ErrorKind::InvalidAlgorithm));
159 }
160
161 let signing_provider = (CryptoProvider::get_default().signer_factory)(&header.alg, key)?;
162
163 if signing_provider.algorithm() != header.alg {
164 return Err(new_error(ErrorKind::InvalidAlgorithm));
165 }
166
167 let encoded_header = b64_encode_part(&header)?;
168 let encoded_claims = b64_encode_part(claims)?;
169 let message = [encoded_header, encoded_claims].join(".");
170
171 let signature = b64_encode(signing_provider.try_sign(message.as_bytes())?);
172
173 Ok([message, signature].join("."))
174}