|
secure_vector< uint8_t > | decrypt (const uint8_t encap_key[], size_t encap_key_len, size_t desired_shared_key_len) |
|
secure_vector< uint8_t > | decrypt (const uint8_t encap_key[], size_t encap_key_len, size_t desired_shared_key_len, const uint8_t salt[], size_t salt_len) |
|
secure_vector< uint8_t > | decrypt (std::span< const uint8_t > encap_key, size_t desired_shared_key_len, std::span< const uint8_t > salt) |
|
PK_KEM_Decryptor & | operator= (const PK_KEM_Decryptor &)=delete |
|
PK_KEM_Decryptor & | operator= (PK_KEM_Decryptor &&)=delete |
|
| PK_KEM_Decryptor (const PK_KEM_Decryptor &)=delete |
|
| PK_KEM_Decryptor (const Private_Key &key, RandomNumberGenerator &rng, std::string_view kem_param="", std::string_view provider="") |
|
| PK_KEM_Decryptor (PK_KEM_Decryptor &&)=delete |
|
size_t | shared_key_length (size_t desired_shared_key_len) const |
|
| ~PK_KEM_Decryptor () |
|
Public Key Key Encapsulation Mechanism Decryption.
Definition at line 727 of file pubkey.h.
size_t Botan::PK_KEM_Decryptor::shared_key_length |
( |
size_t |
desired_shared_key_len | ) |
const |
Return the length of the shared key returned by this KEM
If this KEM was used with a KDF, then it will always return exactly the desired key length, because the output of the KEM will be hashed by the KDF.
However if the KEM was used with "Raw" kdf, to request the algorithmic output of the KEM directly, then the desired key length will be ignored and a bytestring that depends on the algorithm is returned
- Parameters
-
desired_shared_key_len | is the requested length. |
Definition at line 183 of file pubkey.cpp.
184 {
185 return m_op->shared_key_length(desired_shared_key_len);
186 }