| Package | Description |
|---|---|
| com.google.crypto.tink | |
| com.google.crypto.tink.aead | |
| com.google.crypto.tink.aead.internal | |
| com.google.crypto.tink.aead.subtle | |
| com.google.crypto.tink.subtle |
| Modifier and Type | Method and Description |
|---|---|
Aead |
KmsClient.getAead(String keyUri)
Gets an
Aead backed by keyUri. |
| Modifier and Type | Method and Description |
|---|---|
static KeysetHandle |
TinkProtoKeysetFormat.parseEncryptedKeyset(byte[] serializedEncryptedKeyset,
Aead keysetEncryptionAead,
byte[] associatedData) |
static KeysetHandle |
LegacyKeysetSerialization.parseEncryptedKeyset(KeysetReader reader,
Aead aead,
byte[] associatedData)
Parse an encrypted keyset from the reader.
|
static KeysetHandle |
TinkJsonProtoKeysetFormat.parseEncryptedKeyset(String serializedEncryptedKeyset,
Aead keysetEncryptionAead,
byte[] associatedData) |
static KeysetHandle |
KeysetHandle.read(KeysetReader reader,
Aead masterKey)
Deprecated.
New users should prefer TinkProtoKeysetFormat. Existing users can use
LegacyKeysetSerialization for exactly the same behavior.
|
static KeysetHandle |
KeysetHandle.readWithAssociatedData(KeysetReader reader,
Aead masterKey,
byte[] associatedData)
Deprecated.
New users should prefer TinkProtoKeysetFormat. Existing users can use
LegacyKeysetSerialization for exactly the same behavior.
|
static byte[] |
TinkProtoKeysetFormat.serializeEncryptedKeyset(KeysetHandle keysetHandle,
Aead keysetEncryptionAead,
byte[] associatedData) |
static String |
TinkJsonProtoKeysetFormat.serializeEncryptedKeyset(KeysetHandle keysetHandle,
Aead keysetEncryptionAead,
byte[] associatedData) |
static void |
LegacyKeysetSerialization.serializeEncryptedKeyset(KeysetHandle keysetHandle,
KeysetWriter writer,
Aead aead,
byte[] associatedData)
Serialize a keyset in an encrypted format to the writer.
|
void |
KeysetHandle.write(KeysetWriter keysetWriter,
Aead masterKey)
Deprecated.
New users should prefer TinkProtoKeysetFormat. Existing users can use
LegacyKeysetSerialization for exactly the same behavior.
|
void |
KeysetHandle.writeWithAssociatedData(KeysetWriter keysetWriter,
Aead masterKey,
byte[] associatedData)
Deprecated.
New users should prefer TinkProtoKeysetFormat. Existing users can use
LegacyKeysetSerialization for exactly the same behavior.
|
| Modifier and Type | Class and Description |
|---|---|
class |
KmsEnvelopeAead
This primitive implements
envelope encryption.
|
| Modifier and Type | Method and Description |
|---|---|
static Aead |
KmsEnvelopeAead.create(AeadParameters dekParameters,
Aead remote)
Creates a new instance of Tink's KMS Envelope AEAD.
|
static Aead |
AeadFactory.getPrimitive(KeysetHandle keysetHandle)
Deprecated.
Use
keysetHandle.getPrimitive(RegistryConfiguration.get(), Aead.class)
after registering the AeadWrapper instead. |
Aead |
AeadWrapper.wrap(PrimitiveSet<Aead> pset) |
| Modifier and Type | Method and Description |
|---|---|
Class<Aead> |
AeadWrapper.getInputPrimitiveClass() |
Class<Aead> |
AeadWrapper.getPrimitiveClass() |
| Modifier and Type | Method and Description |
|---|---|
static Aead |
KmsEnvelopeAead.create(AeadParameters dekParameters,
Aead remote)
Creates a new instance of Tink's KMS Envelope AEAD.
|
| Modifier and Type | Method and Description |
|---|---|
Aead |
AeadWrapper.wrap(PrimitiveSet<Aead> pset) |
| Constructor and Description |
|---|
KmsEnvelopeAead(KeyTemplate dekTemplate,
Aead remote)
Deprecated.
Instead, call
KmsEnvelopeAead.create as explained above. |
| Modifier and Type | Class and Description |
|---|---|
class |
ChaCha20Poly1305Jce
ChaCha20Poly1305Jce implements an AEAD for ChaCha20Poly1305, as described in RFC 8439, section 2.8.
|
class |
LegacyFullAead
Takes an arbitrary raw AEAD and makes it a full primitive.
|
class |
XAesGcm
This primitive implements XAesGcm.
|
class |
XChaCha20Poly1305Jce
ChaCha20Poly1305Jce implements an AEAD for ChaCha20Poly1305, as described in RFC 8439, section 2.8.
|
| Modifier and Type | Method and Description |
|---|---|
static Aead |
LegacyFullAead.create(Aead rawAead,
Bytes outputPrefix) |
static Aead |
ChaCha20Poly1305Jce.create(ChaCha20Poly1305Key key) |
static Aead |
LegacyFullAead.create(LegacyProtoKey key)
This method covers the cases where users created their own aead/key classes.
|
static Aead |
XAesGcm.create(XAesGcmKey key) |
static Aead |
XChaCha20Poly1305Jce.create(XChaCha20Poly1305Key key) |
| Modifier and Type | Method and Description |
|---|---|
static Aead |
LegacyFullAead.create(Aead rawAead,
Bytes outputPrefix) |
| Modifier and Type | Class and Description |
|---|---|
class |
AesGcmSiv
This primitive implements AES-GCM-SIV (as defined in RFC 8452) using JCE.
|
| Modifier and Type | Method and Description |
|---|---|
static Aead |
AesGcmSiv.create(AesGcmSivKey key) |
Aead |
AesGcmFactory.createAead(byte[] symmetricKey) |
Aead |
AeadFactory.createAead(byte[] symmetricKey)
Creates a new
Aead-primitive that uses the key material given in symmetricKey,
which must be of length AeadFactory.getKeySizeInBytes(). |
| Modifier and Type | Class and Description |
|---|---|
class |
AesEaxJce
This class implements the EAX mode using AES.
|
class |
AesGcmJce
This primitive implements AesGcm using JCE.
|
class |
ChaCha20Poly1305
ChaCha20Poly1305 AEAD construction, as described in RFC 8439, section 2.8.
|
class |
EncryptThenAuthenticate
This primitive performs an encrypt-then-Mac operation on plaintext and associated data (ad).
|
class |
XChaCha20Poly1305
XChaCha20Poly1305 AEAD construction, as described in
https://tools.ietf.org/html/draft-arciszewski-xchacha-01.
|
| Modifier and Type | Method and Description |
|---|---|
static Aead |
EncryptThenAuthenticate.create(AesCtrHmacAeadKey key)
Create an AES CTR HMAC instance.
|
static Aead |
AesEaxJce.create(AesEaxKey key) |
static Aead |
AesGcmJce.create(AesGcmKey key) |
static Aead |
ChaCha20Poly1305.create(ChaCha20Poly1305Key key) |
static Aead |
XChaCha20Poly1305.create(XChaCha20Poly1305Key key) |
static Aead |
EncryptThenAuthenticate.newAesCtrHmac(byte[] aesCtrKey,
int ivSize,
String hmacAlgorithm,
byte[] hmacKey,
int tagSize)
Returns a new
EncryptThenAuthenticate instance using AES-CTR and HMAC. |