AES256GCM

tsec.cipher.symmetric.jca.AES256GCM$
See theAES256GCM companion trait

Attributes

Companion
trait
Source
AESGCM.scala
Graph
Supertypes
Self type
AES256GCM.type

Members list

Value members

Inherited methods

def buildKey[F[_]](rawKey: Array[Byte])(implicit S: SymmetricKeyGen[F, AES256GCM, SecretKey]): F[K[Alg]]

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala
def defaultIvStrategy[F[_] : Sync](implicit evidence$2: Sync[F], c: AES[AES256GCM]): IvGen[F, A]

Our default Iv strategy for GCM mode produces randomized IVs

Our default Iv strategy for GCM mode produces randomized IVs

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
CipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AuthCipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AuthCipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AuthCipherAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala

Attributes

Inherited from:
AEADAPI
Source
CipherAPI.scala
def generateKey[F[_]](implicit S: SymmetricKeyGen[F, AES256GCM, SecretKey]): F[K[Alg]]

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala
def incrementalIvStrategy[F[_]](implicit F: Sync[F]): CounterIvGen[F, A]

An incremental iv strategy, as referenced in the nist recommendations for the GCM mode of operation http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf where:

An incremental iv strategy, as referenced in the nist recommendations for the GCM mode of operation http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf where:

The fixed field(nonce) is the leftmost 4 bytes of the IV The invocation field starts as a zeroed out array as the rightmost 8 bytes

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala
def unsafeGenerateKey(implicit S: IdKeyGen[AES256GCM, SecretKey]): K[Alg]

Attributes

Inherited from:
SymmetricKeyGenAPI (hidden)
Source
SymmetricKeyGenAPI.scala

Inherited fields

Attributes

Inherited from:
AES
Source
package.scala

Attributes

Inherited from:
AES
Source
package.scala

Attributes

Inherited from:
AES256
Source
AES256.scala

Attributes

Inherited from:
AES
Source
package.scala

Implicits

Inherited implicits

implicit val ae: AESGCM[AES256GCM]

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala
implicit def genEncryptor[F[_] : Sync](implicit evidence$1: Sync[F], c: AES[AES256GCM]): AADEncryptor[F, A, SecretKey]

Attributes

Inherited from:
AESGCM
Source
AESGCM.scala
implicit def idKeyGen(implicit B: BlockCipher[AES256GCM]): IdKeyGen[A, SecretKey]

Attributes

Inherited from:
JCAKeyGen (hidden)
Source
BlockCipherEV.scala
implicit def newKeyGen[F[_]](implicit F: Sync[F], B: BlockCipher[AES256GCM]): SymmetricKeyGen[F, A, SecretKey]

Attributes

Inherited from:
JCAKeyGen (hidden)
Source
BlockCipherEV.scala