Home | Trees | Indices | Help |
|
---|
|
object --+ | OcbMode
Instance Methods | |||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
Inherited from |
Instance Variables | |
block_size The block size of the underlying cipher, in bytes. |
|
nonce Nonce used for this session. |
Properties | |
Inherited from |
Method Details |
Process the associated data. If there is any associated data, the caller has to invoke this method one or more times, before using decrypt or encrypt. By associated data it is meant any data (e.g. packet headers) that will not be encrypted and will be transmitted in the clear. However, the receiver shall still able to detect modifications. If there is no associated data, this method must not be called. The caller may split associated data in segments of any size, and invoke this method multiple times, each time with the next segment.
|
Encrypt the next piece of plaintext. After the entire plaintext has been passed (but before digest), you must call this method one last time with no arguments to collect the final piece of ciphertext. If possible, use the method encrypt_and_digest instead.
|
Decrypt the next piece of ciphertext. After the entire ciphertext has been passed (but before verify), you must call this method one last time with no arguments to collect the remaining piece of plaintext. If possible, use the method decrypt_and_verify instead.
|
Compute the binary MAC tag. Call this method after the final encrypt (the one with no arguments) to obtain the MAC tag. The MAC tag is needed by the receiver to determine authenticity of the message.
|
Compute the printable MAC tag. This method is like digest.
|
Validate the binary MAC tag. Call this method after the final decrypt (the one with no arguments) to check if the message is authentic and valid.
|
Validate the printable MAC tag. This method is like verify.
|
|
|
Home | Trees | Indices | Help |
|
---|
Generated by Epydoc 3.0.1 on Thu Feb 16 14:05:21 2017 | http://epydoc.sourceforge.net |