xref: /aosp_15_r20/external/tink/go/jwt/jwt_mac.go (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2022 Google LLC
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Changpackage jwt
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang// MAC is an interface for authenticating and verifying JSON Web Tokens (JWT) with JSON Web Signature (JWS) MAC.
20*e7b1675dSTing-Kang Chang// See RFC 7519 and RFC 7515. Security guarantees: similar to Message Authentication Code (MAC).
21*e7b1675dSTing-Kang Changtype MAC interface {
22*e7b1675dSTing-Kang Chang	// Computes a MAC and encodes the raw JWT token and the MAC in the JWS compact serialization format.
23*e7b1675dSTing-Kang Chang	ComputeMACAndEncode(token *RawJWT) (string, error)
24*e7b1675dSTing-Kang Chang
25*e7b1675dSTing-Kang Chang	// Verifies and decodes a JWT token in the JWS compact serialization format.
26*e7b1675dSTing-Kang Chang	//
27*e7b1675dSTing-Kang Chang	// The JWT is validated against the rules in validator. That is, every claim
28*e7b1675dSTing-Kang Chang	// in validator must also be present in the JWT. For example, if validator
29*e7b1675dSTing-Kang Chang	// contains an issuer (iss) claim, the JWT must contain an identical claim.
30*e7b1675dSTing-Kang Chang	// The JWT can contain claims that are NOT in the validator. However, if the
31*e7b1675dSTing-Kang Chang	// JWT contains a list of audiences, the validator must also contain an
32*e7b1675dSTing-Kang Chang	// audience in the list.
33*e7b1675dSTing-Kang Chang	//
34*e7b1675dSTing-Kang Chang	// If the JWT contains timestamp claims such as expiration (exp), issued_at
35*e7b1675dSTing-Kang Chang	// (iat) or not_before (nbf), they will also be validated. validator allows to
36*e7b1675dSTing-Kang Chang	// set a clock skew, to deal with small clock differences among different
37*e7b1675dSTing-Kang Chang	// machines.
38*e7b1675dSTing-Kang Chang	VerifyMACAndDecode(compact string, validator *Validator) (*VerifiedJWT, error)
39*e7b1675dSTing-Kang Chang}
40