Struct sequoia_openpgp::packet::skesk::SKESK5 [−][src]
pub struct SKESK5 { /* fields omitted */ }
Expand description
Holds an symmetrically encrypted session key version 5.
Holds an symmetrically encrypted session key. The session key is needed to decrypt the actual ciphertext. See [Section 5.3 of RFC 4880bis] for details.
This feature is experimental.
Implementations
Creates a new SKESK version 5 packet.
The given symmetric algorithm is the one used to encrypt the session key.
pub fn with_password(
payload_algo: SymmetricAlgorithm,
esk_algo: SymmetricAlgorithm,
esk_aead: AEADAlgorithm,
s2k: S2K,
session_key: &SessionKey,
password: &Password
) -> Result<Self>
[src]
pub fn with_password(
payload_algo: SymmetricAlgorithm,
esk_algo: SymmetricAlgorithm,
esk_aead: AEADAlgorithm,
s2k: S2K,
session_key: &SessionKey,
password: &Password
) -> Result<Self>
[src]Creates a new SKESK version 5 packet with the given password.
This function takes two SymmetricAlgorithm
arguments: The
first, payload_algo
, is the algorithm used to encrypt the
message’s payload (i.e. the one used in the SEIP
or
AED
packet), and the second, esk_algo
, is used to
encrypt the session key. Usually, one should use the same
algorithm, but if they differ, the esk_algo
should be at
least as strong as the payload_algo
as not to weaken the
security of the payload encryption.
Derives the key inside this SKESK5
from password
.
Returns a tuple containing a placeholder symmetric cipher and
the key itself. SKESK5
packets do not contain the symmetric
cipher algorithm and instead rely on the AED
packet that
contains it.
Gets the AEAD algorithm.
Sets the AEAD algorithm.
Gets the AEAD initialization vector.
If the S2K
mechanism is not supported by Sequoia, this
function will fail. Note that the information is not lost,
but stored in the packet. If the packet is serialized again,
it is written out.
Sets the AEAD initialization vector.
Gets the AEAD digest.
pub fn set_aead_digest(&mut self, digest: Box<[u8]>) -> Box<[u8]>ⓘNotable traits for Box<R, Global>
impl<R> Read for Box<R, Global> where
R: Read + ?Sized, impl<W> Write for Box<W, Global> where
W: Write + ?Sized, impl<I, A> Iterator for Box<I, A> where
I: Iterator + ?Sized,
A: Allocator, type Item = <I as Iterator>::Item;impl<F, A> Future for Box<F, A> where
A: Allocator + 'static,
F: Future + Unpin + ?Sized, type Output = <F as Future>::Output;
[src]
pub fn set_aead_digest(&mut self, digest: Box<[u8]>) -> Box<[u8]>ⓘNotable traits for Box<R, Global>
impl<R> Read for Box<R, Global> where
R: Read + ?Sized, impl<W> Write for Box<W, Global> where
W: Write + ?Sized, impl<I, A> Iterator for Box<I, A> where
I: Iterator + ?Sized,
A: Allocator, type Item = <I as Iterator>::Item;impl<F, A> Future for Box<F, A> where
A: Allocator + 'static,
F: Future + Unpin + ?Sized, type Output = <F as Future>::Output;
[src]Sets the AEAD digest.
Methods from Deref<Target = SKESK4>
Gets the symmetric encryption algorithm.
Sets the symmetric encryption algorithm.
Gets the encrypted session key.
If the S2K
mechanism is not supported by Sequoia, this
function will fail. Note that the information is not lost,
but stored in the packet. If the packet is serialized again,
it is written out.
Sets the encrypted session key.
Derives the key inside this SKESK4 from password
.
Returns a tuple of the symmetric cipher to use with the key and the key itself.
Trait Implementations
Auto Trait Implementations
impl RefUnwindSafe for SKESK5
impl UnwindSafe for SKESK5
Blanket Implementations
Mutably borrows from an owned value. Read more
type Output = T
type Output = T
Should always be Self