Enum sequoia_openpgp::packet::PKESK
source · #[non_exhaustive]pub enum PKESK {
V3(PKESK3),
}
Expand description
Holds an asymmetrically encrypted session key.
The session key is used to decrypt the actual ciphertext, which is typically stored in a SEIP or AED packet. See Section 5.1 of RFC 4880 for details.
A PKESK packet is not normally instantiated directly. In most
cases, you’ll create one as a side-effect of encrypting a message
using the streaming serializer, or parsing an encrypted message
using the PacketParser
.
Note: This enum cannot be exhaustively matched to allow future extensions.
Variants (Non-exhaustive)§
This enum is marked as non-exhaustive
Implementations§
Methods from Deref<Target = PKESK3>§
sourcepub fn set_recipient(&mut self, recipient: KeyID) -> KeyID
pub fn set_recipient(&mut self, recipient: KeyID) -> KeyID
Sets the recipient.
sourcepub fn pk_algo(&self) -> PublicKeyAlgorithm
pub fn pk_algo(&self) -> PublicKeyAlgorithm
Gets the public key algorithm.
sourcepub fn set_pk_algo(&mut self, algo: PublicKeyAlgorithm) -> PublicKeyAlgorithm
pub fn set_pk_algo(&mut self, algo: PublicKeyAlgorithm) -> PublicKeyAlgorithm
Sets the public key algorithm.
sourcepub fn esk(&self) -> &Ciphertext
pub fn esk(&self) -> &Ciphertext
Gets the encrypted session key.
sourcepub fn set_esk(&mut self, esk: Ciphertext) -> Ciphertext
pub fn set_esk(&mut self, esk: Ciphertext) -> Ciphertext
Sets the encrypted session key.
sourcepub fn decrypt(
&self,
decryptor: &mut dyn Decryptor,
sym_algo_hint: Option<SymmetricAlgorithm>,
) -> Option<(SymmetricAlgorithm, SessionKey)>
pub fn decrypt( &self, decryptor: &mut dyn Decryptor, sym_algo_hint: Option<SymmetricAlgorithm>, ) -> Option<(SymmetricAlgorithm, SessionKey)>
Decrypts the encrypted session key.
If the symmetric algorithm used to encrypt the message is known in advance, it should be given as argument. This allows us to reduce the side-channel leakage of the decryption operation for RSA.
Returns the session key and symmetric algorithm used to encrypt the following payload.
Returns None
on errors. This prevents leaking information
to an attacker, which could lead to compromise of secret key
material with certain algorithms (RSA). See Section 14 of
RFC 4880.
Trait Implementations§
source§impl Any<PKESK> for Packet
impl Any<PKESK> for Packet
source§impl IntoIterator for PKESK
impl IntoIterator for PKESK
Implement IntoIterator
so that
cert::insert_packets(sig)
just works.
source§impl MarshalInto for PKESK
impl MarshalInto for PKESK
source§fn serialized_len(&self) -> usize
fn serialized_len(&self) -> usize
source§fn serialize_into(&self, buf: &mut [u8]) -> Result<usize>
fn serialize_into(&self, buf: &mut [u8]) -> Result<usize>
source§impl<'a> Parse<'a, PKESK> for PKESK
impl<'a> Parse<'a, PKESK> for PKESK
source§fn from_buffered_reader<R>(reader: R) -> Result<Self>where
R: BufferedReader<Cookie> + 'a,
fn from_buffered_reader<R>(reader: R) -> Result<Self>where
R: BufferedReader<Cookie> + 'a,
source§fn from_reader<R: 'a + Read + Send + Sync>(reader: R) -> Result<Self>
fn from_reader<R: 'a + Read + Send + Sync>(reader: R) -> Result<Self>
source§impl PartialEq for PKESK
impl PartialEq for PKESK
impl Eq for PKESK
impl StructuralPartialEq for PKESK
Auto Trait Implementations§
impl Freeze for PKESK
impl RefUnwindSafe for PKESK
impl Send for PKESK
impl Sync for PKESK
impl Unpin for PKESK
impl UnwindSafe for PKESK
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§default unsafe fn clone_to_uninit(&self, dst: *mut T)
default unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)