Struct biscuit::jwk::RSAKeyParameters
source · pub struct RSAKeyParameters {
pub key_type: RSAKeyType,
pub n: BigUint,
pub e: BigUint,
pub d: Option<BigUint>,
pub p: Option<BigUint>,
pub q: Option<BigUint>,
pub dp: Option<BigUint>,
pub dq: Option<BigUint>,
pub qi: Option<BigUint>,
pub other_primes_info: Option<Vec<OtherPrimesInfo>>,
}
Expand description
Parameters for a RSA Key
Fields
key_type: RSAKeyType
Key type value for a RSA Key
n: BigUint
The “n” (modulus) parameter contains the modulus value for the RSA
public key.
It is serialized as a Base64urlUInt
-encoded value.
e: BigUint
The “e” (exponent) parameter contains the exponent value for the RSA
public key.
It is serialized as a Base64urlUInt
-encoded value.
d: Option<BigUint>
The “d” (private exponent) parameter contains the private exponent
value for the RSA private key.
It is serialized as a Base64urlUInt
-encoded value.
p: Option<BigUint>
The “p” (first prime factor) parameter contains the first prime
factor.
It is serialized as a Base64urlUInt
-encoded value.
q: Option<BigUint>
The “q” (second prime factor) parameter contains the second prime
factor.
It is serialized as a Base64urlUInt
-encoded value.
dp: Option<BigUint>
The “dp” (first factor CRT exponent) parameter contains the Chinese
Remainder Theorem (CRT) exponent of the first factor.
It is serialized as a Base64urlUInt
-encoded value.
dq: Option<BigUint>
The “dq” (second factor CRT exponent) parameter contains the CRT
exponent of the second factor.
It is serialized as a Base64urlUInt
-encoded value.
qi: Option<BigUint>
The “qi” (first CRT coefficient) parameter contains the CRT
coefficient of the second factor
It is serialized as a Base64urlUInt
-encoded value.
other_primes_info: Option<Vec<OtherPrimesInfo>>
The “oth” (other primes info) parameter contains an array of information about any third and subsequent primes, should they exist.
Implementations
sourceimpl RSAKeyParameters
impl RSAKeyParameters
sourcepub fn jws_public_key_secret(&self) -> Secret
pub fn jws_public_key_secret(&self) -> Secret
Construct a jws::Secret
RSA public key for signature verification
Trait Implementations
sourceimpl Clone for RSAKeyParameters
impl Clone for RSAKeyParameters
sourcefn clone(&self) -> RSAKeyParameters
fn clone(&self) -> RSAKeyParameters
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresourceimpl Default for RSAKeyParameters
impl Default for RSAKeyParameters
sourcefn default() -> RSAKeyParameters
fn default() -> RSAKeyParameters
sourceimpl<'de> Deserialize<'de> for RSAKeyParameters
impl<'de> Deserialize<'de> for RSAKeyParameters
sourcefn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
sourceimpl From<RSAKeyParameters> for Secret
impl From<RSAKeyParameters> for Secret
sourcefn from(rsa: RSAKeyParameters) -> Self
fn from(rsa: RSAKeyParameters) -> Self
sourceimpl PartialEq<RSAKeyParameters> for RSAKeyParameters
impl PartialEq<RSAKeyParameters> for RSAKeyParameters
sourcefn eq(&self, other: &RSAKeyParameters) -> bool
fn eq(&self, other: &RSAKeyParameters) -> bool
sourceimpl Serialize for RSAKeyParameters
impl Serialize for RSAKeyParameters
impl Eq for RSAKeyParameters
impl StructuralEq for RSAKeyParameters
impl StructuralPartialEq for RSAKeyParameters
Auto Trait Implementations
impl RefUnwindSafe for RSAKeyParameters
impl Send for RSAKeyParameters
impl Sync for RSAKeyParameters
impl Unpin for RSAKeyParameters
impl UnwindSafe for RSAKeyParameters
Blanket Implementations
sourceimpl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
sourceimpl<Q, K> Equivalent<K> for Qwhere
Q: Eq + ?Sized,
K: Borrow<Q> + ?Sized,
impl<Q, K> Equivalent<K> for Qwhere
Q: Eq + ?Sized,
K: Borrow<Q> + ?Sized,
sourcefn equivalent(&self, key: &K) -> bool
fn equivalent(&self, key: &K) -> bool
key
and return true
if they are equal.