win_crypto_ng

Module asymmetric

Source
Expand description

Asymmetric algorithms

Asymmetric algorithms (also known as public-key algorithms) use pairs of keys: public key, which can be known by others, and private key, which is known only to the owner. The most common usages include encryption and digital signing.

Modules§

agreement
Functionality related to secret agreement and key derivation.
builder
Type-safe asymmetric key generation.
ecc
Elliptic curve cryptography (ECC) primitives.
signature
Digital signature facilities.

Structs§

AsymmetricAlgorithm
Asymmetric algorithm provider.
AsymmetricKey
Asymmetric key handle.
Dh
Marker type representing the DH (Diffie-Hellman) algorithm.
Dsa
Marker type representing the DSA (Digital Signature Algorithm).
Ecdh
Marker type representing the ECDH (Elliptic Curve Diffie-Hellman) algorithm.
Ecdsa
Marker type representing the ECDSA (Elliptic Curve Digital Signature Algorithm).
OaepPadding
OAEP (Optimal Asymmetric Encryption Padding) data.
Private
Marker type used to denote private key parts.
Public
Marker type used to denote public key parts.
Rsa
Marker type representing the RSA (Rivest-Shamir-Adleman) algorithm.

Enums§

AsymmetricAlgorithmId
Asymmetric algorithm identifiers.
DsaPrivateBlob
Raw private DSA key data blob.
DsaPublicBlob
Raw public DSA key data blob.
EncryptionPadding
Supported encryption padding schemes.

Traits§

Algorithm
Marker trait for an asymmetric algorithm.
Export
Export asymmetric key to the raw key data format.
Import
Import asymmetric key using the raw key data format.
Parts
Marker trait used to denote whether a key holds public or private parts.