Available on crate feature
aws_lc_rs
only.Expand description
Hybrid public key encryption (HPKE).
Structs§
HpkeAwsLcRs
holds the concrete instantiations of the algorithms specified by the HpkeSuite.
Statics§
- Default [RFC 9180] Hybrid Public Key Encryption (HPKE) suites supported by aws-lc-rs cryptography.
- HPKE suite using ECDH P-256 for agreement, HKDF SHA-256 for key derivation, and AEAD AES-128-GCM for symmetric encryption.
- HPKE suite using ECDH P-256 for agreement, HKDF SHA-256 for key derivation and AEAD AES-256-GCM for symmetric encryption.
- HPKE suite using ECDH P-256 for agreement, HKDF SHA-256 for key derivation, and AEAD CHACHA20-POLY-1305 for symmetric encryption.
- HPKE suite using ECDH P-384 for agreement, HKDF SHA-384 for key derivation, and AEAD AES-128-GCM for symmetric encryption.
- HPKE suite using ECDH P-384 for agreement, HKDF SHA-384 for key derivation, and AEAD AES-256-GCM for symmetric encryption.
- HPKE suite using ECDH P-384 for agreement, HKDF SHA-384 for key derivation, and AEAD CHACHA20-POLY-1305 for symmetric encryption.
- HPKE suite using ECDH P-521 for agreement, HKDF SHA-512 for key derivation, and AEAD AES-128-GCM for symmetric encryption.
- HPKE suite using ECDH P-521 for agreement, HKDF SHA-512 for key derivation, and AEAD AES-256-GCM for symmetric encryption.
- HPKE suite using ECDH P-521 for agreement, HKDF SHA-512 for key derivation, and AEAD CHACHA20-POLY-1305 for symmetric encryption.
- HPKE suite using ECDH X25519 for agreement, HKDF SHA-256 for key derivation, and AEAD AES-128-GCM for symmetric encryption.
- HPKE suite using ECDH X25519 for agreement, HKDF SHA-256 for key derivation, and AEAD AES-256-GCM for symmetric encryption.
- HPKE suite using ECDH X25519 for agreement, HKDF SHA-256 for key derivation, and AEAD CHACHA20-POLY-1305 for symmetric encryption.