Experimental
Experimental
Protected
Experimental
_kdfProtected
Experimental
_primExperimental
enc33
Experimental
idKemId.DhkemSecp256k1HkdfSha256 (0x0013) EXPERIMENTAL
Experimental
private32
Experimental
public33
Experimental
secret32
Experimental
Recovers the ephemeral symmetric key from its encapsulated representation enc
.
If the error occurred, throws DecapError.
A set of parameters for the recipient context.
A shared secret as the output of the decapsulation step.
Experimental
Generates an ephemeral, fixed-length symmetric key and
a fixed-length encapsulation of the key that can be decapsulated
by the holder of the private key corresponding to pkR
.
If the error occurred, throws EncapError.
A set of parameters for the sender context.
A shared secret and an encapsulated key as the output of the encapsulation step.
Experimental
Imports a public or private key and converts to a CryptoKey.
Since key parameters for createSenderContext or createRecipientContext are CryptoKey format, you have to use this function to convert provided keys to CryptoKey.
Basically, this is a thin wrapper function of SubtleCrypto.importKey.
If the error occurred, throws DeserializeError.
For now, 'raw'
and 'jwk'
are supported.
A byte string of a raw key or A JsonWebKey object.
The indicator whether the provided key is a public key or not, which is used only for 'raw'
format.
A public or private CryptoKey.
The DHKEM(secp256k1, HKDF-SHA256) for HPKE KEM implementing KemInterface.
This class is implemented using @noble/curves.
The public keys are assumed to be compressed.
The instance of this class can be specified to the CipherSuiteParams as follows:
Example: Use with `@hpke/core`:
Note that it is experimental and not standardized.