pub struct DecodingKey { /* private fields */ }
Expand description

All the different kind of keys we can use to decode a JWT This key can be re-used so make sure you only initialize it once if you can for better performance

Implementations

If you’re using HMAC, use this.

If you’re using HMAC with a base64 encoded secret, use this.

If you have (n, e) RSA public key components as strings, use this.

If you have (n, e) RSA public key components already decoded, use this.

If you have (x,y) ECDSA key components

If you know what you’re doing and have a RSA DER encoded public key, use this.

If you know what you’re doing and have a RSA EC encoded public key, use this.

If you know what you’re doing and have a Ed DER encoded public key, use this.

From x part (base64 encoded) of the JWK encoding

If you have a key in Jwk format

Trait Implementations

Returns a copy of the value. Read more
Performs copy-assignment from source. Read more

Auto Trait Implementations

Blanket Implementations

Gets the TypeId of self. Read more
Immutably borrows from an owned value. Read more
Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

The resulting type after obtaining ownership.
Creates owned data from borrowed data, usually by cloning. Read more
Uses borrowed data to replace owned data, usually by cloning. Read more
The type returned in the event of a conversion error.
Performs the conversion.
The type returned in the event of a conversion error.
Performs the conversion.