Module io.inverno.mod.security.jose
Package io.inverno.mod.security.jose.jwa
package io.inverno.mod.security.jose.jwa
JSON Web Algorithms API.

ClassDescriptionA direct Key Management algorithm that derives the Content Encryption Key which is used directly to encrypt a JWE payload.A direct CEK composed of a derived encryption key and a map of specific parameters resulting from the key derivation and required by a recipient to derive the key.Elliptic Curve algorithms as defined by RFC7518.Elliptic Curves as defined by RFC7518.Edwardcurve digital signature algorithms as defined by RFC8037 Section 3.1.An encrypting Key Management algorithm used to encrypt a generated CEK used to encrypt a JWE payload.An encrypted CEK composed of the encrypted key and a map of specific parameters resulting from the CEK encryption and required by the recipient to decrypt the key.Base JSON Web Algorithm as specified by RFC7518.JWAAlgorithm<A extends JWK>Base JWA algorithm as specified by RFC7518.A JWA cipher is used to encrypt and decrypt content.An encrypted data composed of the initialization vector, the authentication tag and the cipher text.Thrown by a
JWACipher
to indicate an error while encrypting or decrypting data.A JSON Web Algorithm for Key Management when performing JSON Web Encrption as specified by RFC7518 Section 4.Thrown by aJWAKeyManager
to indicate an error while encrypting or decrypting data.Thrown to indicate a general JWA processing error.Thrown by aJWASigner
to indicate an error while signing data or verifying signature.A JWA signer is used to sign data and or verify data signature.NoOp algorithms as defined by RFC7518.Octect symmetric algorithms as defined by RFC7518.Octet Key Pair Elliptic curves as defined by RFC8037Passwordbased encryption key management algorithms as defined by RFC7518.RSA algorithms as defined by RFC7518.A wrapping Key Management algorithm used to wrap a generated CEK used to encrypt a JWE payload.A wrapped CEK composed of the wrapped key and a map of specific parameters resulting from the CEK wrapping and required by the recipient to unwrap the key.OKP Elliptic curve key management algorithms as defined by RFC8037 Section 3.1.