#[non_exhaustive]pub enum ConnectionTrafficSecrets {
Aes128Gcm {
key: AeadKey,
iv: Iv,
},
Aes256Gcm {
key: AeadKey,
iv: Iv,
},
Chacha20Poly1305 {
key: AeadKey,
iv: Iv,
},
}
Expand description
Secrets used to encrypt/decrypt data in a TLS session.
These can be used to configure kTLS for a socket in one direction. The only other piece of information needed is the sequence number, which is in ExtractedSecrets.
Variants (Non-exhaustive)§
This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.
Aes128Gcm
Secrets for the AES_128_GCM AEAD algorithm
Aes256Gcm
Secrets for the AES_256_GCM AEAD algorithm
Chacha20Poly1305
Secrets for the CHACHA20_POLY1305 AEAD algorithm
Auto Trait Implementations§
impl Freeze for ConnectionTrafficSecrets
impl RefUnwindSafe for ConnectionTrafficSecrets
impl Send for ConnectionTrafficSecrets
impl Sync for ConnectionTrafficSecrets
impl Unpin for ConnectionTrafficSecrets
impl UnwindSafe for ConnectionTrafficSecrets
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more