Provides implementations of the AEAD primitive.
AEAD encryption assures the confidentiality and authenticity of the data. This primitive is CPA secure.
Provides subtle implementations of the
KmsEnvelopeAead represents an instance of Envelope AEAD.
Maximal version of AES-CTR-HMAC keys.
Type URL of AES-CTR-HMAC keys that Tink supports.
Maximal version of AES-GCM keys.
Maximal version of AES-GCM-SIV keys.
Type URL of AES-GCM-SIV keys that Tink supports.
Type URL of AES-GCM keys that Tink supports.
Maximal version of ChaCha20Poly1305 keys.
Type URL of ChaCha20Poly1305 keys that Tink supports.
Maximal version of KMS-wrapped keys.
Type URL of KMS-wrapped keys that Tink supports.
Maximal version of XChaCha20Poly1305 keys.
Type URL of XChaCha20Poly1305 keys that Tink supports.
tink-aead crate, registering its primitives so they are available via
KeyTemplate that generates a
KmsEnvelopeAead key for a given KEK in remote KMS.
Keys generated by this key template uses RAW output prefix to make them compatible with the
remote KMS’ encrypt/decrypt operations. Unlike other templates, when you generate new keys with
this template, Tink does not generate new key material, but only creates a reference to the