public final class JwtRsaSsaPssPrivateKey extends JwtSignaturePrivateKey
Standard: https://datatracker.ietf.org/doc/html/rfc7518
| Modifier and Type | Class and Description |
|---|---|
static class |
JwtRsaSsaPssPrivateKey.Builder
Builder for JwtRsaSsaPssPrivateKey.
|
| Modifier and Type | Method and Description |
|---|---|
static JwtRsaSsaPssPrivateKey.Builder |
builder() |
boolean |
equalsKey(Key o)
Returns true if the key is guaranteed to be equal to
other. |
SecretBigInteger |
getCrtCoefficient()
Returns the CRT coefficient qInv.
|
JwtRsaSsaPssParameters |
getParameters()
Returns the key parameters.
|
SecretBigInteger |
getPrimeExponentP()
Returns the prime exponent dP.
|
SecretBigInteger |
getPrimeExponentQ()
Returns the prime exponent dQ.
|
SecretBigInteger |
getPrimeP()
Returns the prime factor p.
|
SecretBigInteger |
getPrimeQ()
Returns the prime factor q.
|
SecretBigInteger |
getPrivateExponent()
Returns the private exponent d.
|
JwtRsaSsaPssPublicKey |
getPublicKey()
Returns the public key.
|
getIdRequirementOrNull, getKidpublic static JwtRsaSsaPssPrivateKey.Builder builder()
public JwtRsaSsaPssParameters getParameters()
getParameters in class JwtSignaturePrivateKeypublic JwtRsaSsaPssPublicKey getPublicKey()
getPublicKey in interface PrivateKeygetPublicKey in class JwtSignaturePrivateKeypublic SecretBigInteger getPrimeP()
public SecretBigInteger getPrimeQ()
public SecretBigInteger getPrivateExponent()
public SecretBigInteger getPrimeExponentP()
public SecretBigInteger getPrimeExponentQ()
public SecretBigInteger getCrtCoefficient()
public boolean equalsKey(Key o)
Keyother.
Implementations are required to do this in constant time.
Note: this is allowed to return false even if two keys are guaranteed to represent the same function, but are represented differently. For example, a key is allowed to internally store the number of zero-bytes used as padding when a large number is represented as a byte array, and use this in the comparison.
Note: Tink Key objects should typically not override hashCode (because it
could risk leaking key material). Hence, they typically also should not override equals.