tsec.cipher.symmetric.jca.AES256GCM$
See theAES256GCM companion trait
Attributes
- Companion
- trait
- Source
- AESGCM.scala
- Graph
-
- Supertypes
-
trait AEADCipher[AES256GCM]trait BlockCipher[AES256GCM]class Objecttrait Matchableclass AnyShow all
- Self type
-
AES256GCM.type
Members list
Value members
Inherited methods
Attributes
- Inherited from:
- SymmetricKeyGenAPI (hidden)
- Source
- SymmetricKeyGenAPI.scala
Attributes
- Inherited from:
- AESGCM
- Source
- AESGCM.scala
Attributes
- Inherited from:
- CipherAPI
- Source
- CipherAPI.scala
final def decryptDetached[F[_]](cipherText: CipherText[AES256GCM], key: Type[AES256GCM], authTag: Type[AES256GCM])(implicit E: AuthEncryptor[F, AES256GCM, SecretKey]): F[PlainText]
Attributes
- Inherited from:
- AuthCipherAPI
- Source
- CipherAPI.scala
final def decryptWithAAD[F[_]](cipherText: CipherText[AES256GCM], key: Type[AES256GCM], aad: AAD)(implicit E: AADEncryptor[F, AES256GCM, SecretKey]): F[PlainText]
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
final def decryptWithAADDetached[F[_]](cipherText: CipherText[AES256GCM], key: Type[AES256GCM], aad: AAD, authTag: Type[AES256GCM])(implicit E: AADEncryptor[F, AES256GCM, SecretKey]): F[PlainText]
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
Our default Iv strategy for GCM mode produces randomized IVs
Our default Iv strategy for GCM mode produces randomized IVs
Attributes
- Inherited from:
- AESGCM
- Source
- AESGCM.scala
Attributes
- Inherited from:
- CipherAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- CipherAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- CipherAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- AuthCipherAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- AuthCipherAPI
- Source
- CipherAPI.scala
final def encryptDetached[F[_] : Monad](plainText: PlainText, key: Type[AES256GCM])(implicit evidence$3: Monad[F], E: AuthEncryptor[F, AES256GCM, SecretKey], ivStrategy: IvGen[F, AES256GCM]): F[(CipherText[A], Type[A])]
Attributes
- Inherited from:
- AuthCipherAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
final def encryptWithAAD[F[_] : Monad](plainText: PlainText, key: Type[AES256GCM], aad: AAD)(implicit evidence$4: Monad[F], E: AADEncryptor[F, AES256GCM, SecretKey], ivStrategy: IvGen[F, AES256GCM]): F[CipherText[A]]
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
final def encryptWithAADDetached[F[_] : Monad](plainText: PlainText, key: Type[AES256GCM], aad: AAD)(implicit evidence$5: Monad[F], E: AADEncryptor[F, AES256GCM, SecretKey], ivStrategy: IvGen[F, AES256GCM]): F[(CipherText[A], Type[A])]
Attributes
- Inherited from:
- AEADAPI
- Source
- CipherAPI.scala
Attributes
- Inherited from:
- SymmetricKeyGenAPI (hidden)
- Source
- SymmetricKeyGenAPI.scala
An incremental iv strategy, as referenced in the nist recommendations for the GCM mode of operation http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf where:
An incremental iv strategy, as referenced in the nist recommendations for the GCM mode of operation http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf where:
The fixed field(nonce) is the leftmost 4 bytes of the IV The invocation field starts as a zeroed out array as the rightmost 8 bytes
Attributes
- Inherited from:
- AESGCM
- Source
- AESGCM.scala
Attributes
- Inherited from:
- SymmetricKeyGenAPI (hidden)
- Source
- SymmetricKeyGenAPI.scala
Attributes
- Inherited from:
- SymmetricKeyGenAPI (hidden)
- Source
- SymmetricKeyGenAPI.scala
Inherited fields
Attributes
- Inherited from:
- AES
- Source
- package.scala
Attributes
- Inherited from:
- AES
- Source
- package.scala
Attributes
- Inherited from:
- AES256
- Source
- AES256.scala
Attributes
- Inherited from:
- AES
- Source
- package.scala
Implicits
Inherited implicits
Attributes
- Inherited from:
- AESGCM
- Source
- AESGCM.scala
implicit def genEncryptor[F[_] : Sync](implicit evidence$1: Sync[F], c: AES[AES256GCM]): AADEncryptor[F, A, SecretKey]
Attributes
- Inherited from:
- AESGCM
- Source
- AESGCM.scala
Attributes
- Inherited from:
- JCAKeyGen (hidden)
- Source
- BlockCipherEV.scala
implicit def newKeyGen[F[_]](implicit F: Sync[F], B: BlockCipher[AES256GCM]): SymmetricKeyGen[F, A, SecretKey]
Attributes
- Inherited from:
- JCAKeyGen (hidden)
- Source
- BlockCipherEV.scala
In this article