[−][src]Struct sequoia_openpgp::packet::pkesk::PKESK3
Holds an asymmetrically encrypted session key.
The session key is needed to decrypt the actual ciphertext. See Section 5.1 of RFC 4880 for details.
Implementations
impl PKESK3
[src]
pub fn new(
recipient: KeyID,
pk_algo: PublicKeyAlgorithm,
encrypted_session_key: Ciphertext
) -> Result<PKESK3>
[src]
recipient: KeyID,
pk_algo: PublicKeyAlgorithm,
encrypted_session_key: Ciphertext
) -> Result<PKESK3>
Creates a new PKESK3 packet.
pub fn for_recipient<P, R>(
algo: SymmetricAlgorithm,
session_key: &SessionKey,
recipient: &Key<P, R>
) -> Result<PKESK3> where
P: KeyParts,
R: KeyRole,
[src]
algo: SymmetricAlgorithm,
session_key: &SessionKey,
recipient: &Key<P, R>
) -> Result<PKESK3> where
P: KeyParts,
R: KeyRole,
Creates a new PKESK3 packet for the given recipent.
The given symmetric algorithm must match the algorithm that is used to encrypt the payload.
pub fn recipient(&self) -> &KeyID
[src]
Gets the recipient.
pub fn set_recipient(&mut self, recipient: KeyID) -> KeyID
[src]
Sets the recipient.
pub fn pk_algo(&self) -> PublicKeyAlgorithm
[src]
Gets the public key algorithm.
pub fn set_pk_algo(&mut self, algo: PublicKeyAlgorithm) -> PublicKeyAlgorithm
[src]
Sets the public key algorithm.
pub fn esk(&self) -> &Ciphertext
[src]
Gets the encrypted session key.
pub fn set_esk(&mut self, esk: Ciphertext) -> Ciphertext
[src]
Sets the encrypted session key.
pub fn decrypt(
&self,
decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>
) -> Option<(SymmetricAlgorithm, SessionKey)>
[src]
&self,
decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>
) -> Option<(SymmetricAlgorithm, SessionKey)>
Decrypts the encrypted session key.
If the symmetric algorithm used to encrypt the message is known in advance, it should be given as argument. This allows us to reduce the side-channel leakage of the decryption operation for RSA.
Returns the session key and symmetric algorithm used to encrypt the following payload.
Returns None
on errors. This prevents leaking information
to an attacker, which could lead to compromise of secret key
material with certain algorithms (RSA). See Section 14 of
RFC 4880.
Trait Implementations
impl Clone for PKESK3
[src]
impl Debug for PKESK3
[src]
impl Eq for PKESK3
[src]
impl From<PKESK3> for PKESK
[src]
impl From<PKESK3> for Packet
[src]
impl Hash for PKESK3
[src]
pub fn hash<__H: Hasher>(&self, state: &mut __H)
[src]
pub fn hash_slice<H>(data: &[Self], state: &mut H) where
H: Hasher,
1.3.0[src]
H: Hasher,
impl Marshal for PKESK3
[src]
pub fn serialize(&self, o: &mut dyn Write) -> Result<()>
[src]
pub fn export(&self, o: &mut dyn Write) -> Result<()>
[src]
impl MarshalInto for PKESK3
[src]
pub fn serialized_len(&self) -> usize
[src]
pub fn serialize_into(&self, buf: &mut [u8]) -> Result<usize>
[src]
pub fn to_vec(&self) -> Result<Vec<u8>>
[src]
pub fn export_into(&self, buf: &mut [u8]) -> Result<usize>
[src]
pub fn export_to_vec(&self) -> Result<Vec<u8>>
[src]
impl<'a> Parse<'a, PKESK3> for PKESK3
[src]
pub fn from_reader<R: 'a + Read + Send + Sync>(reader: R) -> Result<Self>
[src]
pub fn from_file<P: AsRef<Path>>(path: P) -> Result<T>
[src]
pub fn from_bytes<D: AsRef<[u8]> + ?Sized + Send + Sync>(
data: &'a D
) -> Result<T>
[src]
data: &'a D
) -> Result<T>
impl PartialEq<PKESK3> for PKESK3
[src]
impl StructuralEq for PKESK3
[src]
impl StructuralPartialEq for PKESK3
[src]
Auto Trait Implementations
impl RefUnwindSafe for PKESK3
[src]
impl Send for PKESK3
[src]
impl Sync for PKESK3
[src]
impl Unpin for PKESK3
[src]
impl UnwindSafe for PKESK3
[src]
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> DynClone for T where
T: Clone,
[src]
T: Clone,
pub fn __clone_box(&self, Private) -> *mut ()
[src]
impl<T> From<T> for T
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> Same<T> for T
type Output = T
Should always be Self
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,