Enum sequoia_openpgp::packet::PKESK [−][src]
#[non_exhaustive] pub enum PKESK { V3(PKESK3), }
Holds an asymmetrically encrypted session key.
The session key is used to decrypt the actual ciphertext, which is typically stored in a SEIP or AED packet. See Section 5.1 of RFC 4880 for details.
A PKESK packet is not normally instantiated directly. In most
cases, you’ll create one as a side-effect of encrypting a message
using the streaming serializer, or parsing an encrypted message
using the PacketParser
.
Note: This enum cannot be exhaustively matched to allow future extensions.
Variants (Non-exhaustive)
V3(PKESK3)
PKESK packet version 3.
Implementations
Methods from Deref<Target = PKESK3>
pub fn set_recipient(&mut self, recipient: KeyID) -> KeyID
[src]
pub fn set_recipient(&mut self, recipient: KeyID) -> KeyID
[src]Sets the recipient.
pub fn pk_algo(&self) -> PublicKeyAlgorithm
[src]
pub fn pk_algo(&self) -> PublicKeyAlgorithm
[src]Gets the public key algorithm.
pub fn set_pk_algo(&mut self, algo: PublicKeyAlgorithm) -> PublicKeyAlgorithm
[src]
pub fn set_pk_algo(&mut self, algo: PublicKeyAlgorithm) -> PublicKeyAlgorithm
[src]Sets the public key algorithm.
pub fn esk(&self) -> &Ciphertext
[src]
pub fn esk(&self) -> &Ciphertext
[src]Gets the encrypted session key.
pub fn set_esk(&mut self, esk: Ciphertext) -> Ciphertext
[src]
pub fn set_esk(&mut self, esk: Ciphertext) -> Ciphertext
[src]Sets the encrypted session key.
pub fn decrypt(
&self,
decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>
) -> Option<(SymmetricAlgorithm, SessionKey)>
[src]
pub fn decrypt(
&self,
decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>
) -> Option<(SymmetricAlgorithm, SessionKey)>
[src]Decrypts the encrypted session key.
If the symmetric algorithm used to encrypt the message is known in advance, it should be given as argument. This allows us to reduce the side-channel leakage of the decryption operation for RSA.
Returns the session key and symmetric algorithm used to encrypt the following payload.
Returns None
on errors. This prevents leaking information
to an attacker, which could lead to compromise of secret key
material with certain algorithms (RSA). See Section 14 of
RFC 4880.
Trait Implementations
impl IntoIterator for PKESK
[src]
impl IntoIterator for PKESK
[src]Implement IntoIterator
so that
cert::insert_packets(sig)
just works.
impl MarshalInto for PKESK
[src]
impl MarshalInto for PKESK
[src]impl<'a> Parse<'a, PKESK> for PKESK
[src]
impl<'a> Parse<'a, PKESK> for PKESK
[src]impl Eq for PKESK
[src]
impl StructuralEq for PKESK
[src]
impl StructuralPartialEq for PKESK
[src]
Auto Trait Implementations
impl RefUnwindSafe for PKESK
impl Send for PKESK
impl Sync for PKESK
impl Unpin for PKESK
impl UnwindSafe for PKESK
Blanket Implementations
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]pub fn borrow_mut(&mut self) -> &mut T
[src]
pub fn borrow_mut(&mut self) -> &mut T
[src]Mutably borrows from an owned value. Read more
impl<T> Same<T> for T
impl<T> Same<T> for T
type Output = T
type Output = T
Should always be Self
impl<T> ToOwned for T where
T: Clone,
[src]
impl<T> ToOwned for T where
T: Clone,
[src]type Owned = T
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn to_owned(&self) -> T
[src]Creates owned data from borrowed data, usually by cloning. Read more
pub fn clone_into(&self, target: &mut T)
[src]
pub fn clone_into(&self, target: &mut T)
[src]🔬 This is a nightly-only experimental API. (toowned_clone_into
)
recently added
Uses borrowed data to replace owned data, usually by cloning. Read more