| Crates.io | paseto-v3-aws-lc |
| lib.rs | paseto-v3-aws-lc |
| version | 0.1.0-rc.3 |
| created_at | 2025-09-21 14:20:58.892997+00 |
| updated_at | 2025-09-21 14:20:58.892997+00 |
| description | PASETO/PASERK V3 based on AWS-LC |
| homepage | |
| repository | https://github.com/conradludgate/paseto-rs |
| max_upload_size | |
| id | 1848850 |
| size | 53,079 |
AWS-LC based PASETO V3 implementation.
use paseto_v3::{SignedToken, VerifiedToken};
use paseto_v3::key::{SecretKey, PublicKey, SealingKey};
use paseto_json::{RegisteredClaims, jiff};
// create a new keypair
let secret_key = SecretKey::random().unwrap();
let public_key = secret_key.unsealing_key();
// create a set of token claims
let now = jiff::Timestamp::now();
let claims = RegisteredClaims {
iss: Some("https://paseto.conrad.cafe/".to_string()),
iat: Some(now),
nbf: Some(now),
exp: Some(now + std::time::Duration::from_secs(3600)),
sub: Some("conradludgate".to_string()),
..RegisteredClaims::default()
};
// create and sign a new token
let signed_token = VerifiedToken::new(claims).sign(&secret_key).unwrap();
// serialize the token.
let token = signed_token.to_string();
// "v3.public..."
// serialize the public key.
let key = public_key.to_string();
// "k3.public..."
// parse the token
let signed_token: SignedToken<RegisteredClaims> = token.parse().unwrap();
// parse the key
let public_key: PublicKey = key.parse().unwrap();
// verify the token
let verified_token = signed_token.verify(&public_key).unwrap();
// TODO: verify the claims
let now = jiff::Timestamp::now();
if let Some(exp) = verified_token.message.exp && exp < now {
panic!("expired");
}
if let Some(nbf) = verified_token.message.nbf && now < nbf {
panic!("not yet available");
}