Module win_crypto_ng::asymmetric
source · Expand description
Asymmetric algorithms
Asymmetric algorithms (also known as public-key algorithms) use pairs of keys: public key, which can be known by others, and private key, which is known only to the owner. The most common usages include encryption and digital signing.
Modules
- Functionality related to secret agreement and key derivation.
- Type-safe asymmetric key generation.
- Elliptic curve cryptography (ECC) primitives.
- Digital signature facilities.
Structs
- Asymmetric algorithm provider.
- Asymmetric key handle.
- Marker type representing the DH (Diffie-Hellman) algorithm.
- Marker type representing the DSA (Digital Signature Algorithm).
- Marker type representing the ECDH (Elliptic Curve Diffie-Hellman) algorithm.
- Marker type representing the ECDSA (Elliptic Curve Digital Signature Algorithm).
- OAEP (Optimal Asymmetric Encryption Padding) data.
- Marker type used to denote private key parts.
- Marker type used to denote public key parts.
- Marker type representing the RSA (Rivest-Shamir-Adleman) algorithm.
Enums
- Asymmetric algorithm identifiers.
- Raw private DSA key data blob.
- Raw public DSA key data blob.
- Supported encryption padding schemes.
Traits
- Marker trait for an asymmetric algorithm.
- Export asymmetric key to the raw key data format.
- Import asymmetric key using the raw key data format.
- Marker trait used to denote whether a key holds public or private parts.