AES192GCM

tsec.cipher.symmetric.jca.AES192GCM$
See theAES192GCM companion trait

Attributes

Companion
trait
Source
AESGCM.scala
Graph
Supertypes
Self type
AES192GCM.type

Members list

Value members

Inherited methods

def buildKey[F[_]](rawKey: Array[Byte])(implicit S: SymmetricKeyGen[F, AES192GCM, SecretKey]): F[K[Alg]]

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala
def defaultIvStrategy[F[_] : Sync](implicit evidence$2: Sync[F], c: AES[AES192GCM]): IvGen[F, A]

Our default Iv strategy for GCM mode produces randomized IVs

Our default Iv strategy for GCM mode produces randomized IVs

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AuthCipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AuthCipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AuthCipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala
def generateKey[F[_]](implicit S: SymmetricKeyGen[F, AES192GCM, SecretKey]): F[K[Alg]]

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala
def incrementalIvStrategy[F[_]](implicit F: Sync[F]): CounterIvGen[F, A]

An incremental iv strategy, as referenced in the nist recommendations for the GCM mode of operation http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf where:

An incremental iv strategy, as referenced in the nist recommendations for the GCM mode of operation http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf where:

The fixed field(nonce) is the leftmost 4 bytes of the IV The invocation field starts as a zeroed out array as the rightmost 8 bytes

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala
def unsafeGenerateKey(implicit S: IdKeyGen[AES192GCM, SecretKey]): K[Alg]

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala

Inherited fields

Attributes

Inherited from:
AES
Source
package.scala

Attributes

Inherited from:
AES
Source
package.scala

Attributes

Inherited from:
AES192
Source
AES192.scala

Attributes

Inherited from:
AES
Source
package.scala

Implicits

Inherited implicits

implicit val ae: AESGCM[AES192GCM]

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala
implicit def genEncryptor[F[_] : Sync](implicit evidence$1: Sync[F], c: AES[AES192GCM]): AADEncryptor[F, A, SecretKey]

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala
implicit def idKeyGen(implicit B: BlockCipher[AES192GCM]): IdKeyGen[A, SecretKey]

Attributes

Inherited from:
JCAKeyGen (hidden)
Source
BlockCipherEV.scala
implicit def newKeyGen[F[_]](implicit F: Sync[F], B: BlockCipher[AES192GCM]): SymmetricKeyGen[F, A, SecretKey]

Attributes

Inherited from:
JCAKeyGen (hidden)
Source
BlockCipherEV.scala