xref: /aosp_15_r20/external/boringssl/src/include/openssl/hpke.h (revision 8fb009dc861624b67b6cdb62ea21f0f22d0c584b)
1*8fb009dcSAndroid Build Coastguard Worker /* Copyright (c) 2020, Google Inc.
2*8fb009dcSAndroid Build Coastguard Worker  *
3*8fb009dcSAndroid Build Coastguard Worker  * Permission to use, copy, modify, and/or distribute this software for any
4*8fb009dcSAndroid Build Coastguard Worker  * purpose with or without fee is hereby granted, provided that the above
5*8fb009dcSAndroid Build Coastguard Worker  * copyright notice and this permission notice appear in all copies.
6*8fb009dcSAndroid Build Coastguard Worker  *
7*8fb009dcSAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8*8fb009dcSAndroid Build Coastguard Worker  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9*8fb009dcSAndroid Build Coastguard Worker  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10*8fb009dcSAndroid Build Coastguard Worker  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11*8fb009dcSAndroid Build Coastguard Worker  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12*8fb009dcSAndroid Build Coastguard Worker  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13*8fb009dcSAndroid Build Coastguard Worker  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14*8fb009dcSAndroid Build Coastguard Worker 
15*8fb009dcSAndroid Build Coastguard Worker #ifndef OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H
16*8fb009dcSAndroid Build Coastguard Worker #define OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H
17*8fb009dcSAndroid Build Coastguard Worker 
18*8fb009dcSAndroid Build Coastguard Worker #include <openssl/aead.h>
19*8fb009dcSAndroid Build Coastguard Worker #include <openssl/base.h>
20*8fb009dcSAndroid Build Coastguard Worker #include <openssl/curve25519.h>
21*8fb009dcSAndroid Build Coastguard Worker #include <openssl/digest.h>
22*8fb009dcSAndroid Build Coastguard Worker 
23*8fb009dcSAndroid Build Coastguard Worker #if defined(__cplusplus)
24*8fb009dcSAndroid Build Coastguard Worker extern "C" {
25*8fb009dcSAndroid Build Coastguard Worker #endif
26*8fb009dcSAndroid Build Coastguard Worker 
27*8fb009dcSAndroid Build Coastguard Worker 
28*8fb009dcSAndroid Build Coastguard Worker // Hybrid Public Key Encryption.
29*8fb009dcSAndroid Build Coastguard Worker //
30*8fb009dcSAndroid Build Coastguard Worker // Hybrid Public Key Encryption (HPKE) enables a sender to encrypt messages to a
31*8fb009dcSAndroid Build Coastguard Worker // receiver with a public key.
32*8fb009dcSAndroid Build Coastguard Worker //
33*8fb009dcSAndroid Build Coastguard Worker // See RFC 9180.
34*8fb009dcSAndroid Build Coastguard Worker 
35*8fb009dcSAndroid Build Coastguard Worker 
36*8fb009dcSAndroid Build Coastguard Worker // Parameters.
37*8fb009dcSAndroid Build Coastguard Worker //
38*8fb009dcSAndroid Build Coastguard Worker // An HPKE context is parameterized by KEM, KDF, and AEAD algorithms,
39*8fb009dcSAndroid Build Coastguard Worker // represented by |EVP_HPKE_KEM|, |EVP_HPKE_KDF|, and |EVP_HPKE_AEAD| types,
40*8fb009dcSAndroid Build Coastguard Worker // respectively.
41*8fb009dcSAndroid Build Coastguard Worker 
42*8fb009dcSAndroid Build Coastguard Worker // The following constants are KEM identifiers.
43*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_DHKEM_X25519_HKDF_SHA256 0x0020
44*8fb009dcSAndroid Build Coastguard Worker 
45*8fb009dcSAndroid Build Coastguard Worker // The following functions are KEM algorithms which may be used with HPKE. Note
46*8fb009dcSAndroid Build Coastguard Worker // that, while some HPKE KEMs use KDFs internally, this is separate from the
47*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KDF| selection.
48*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KEM *EVP_hpke_x25519_hkdf_sha256(void);
49*8fb009dcSAndroid Build Coastguard Worker 
50*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_id returns the HPKE KEM identifier for |kem|, which
51*8fb009dcSAndroid Build Coastguard Worker // will be one of the |EVP_HPKE_KEM_*| constants.
52*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem);
53*8fb009dcSAndroid Build Coastguard Worker 
54*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_PUBLIC_KEY_LENGTH is the maximum length of an encoded public key
55*8fb009dcSAndroid Build Coastguard Worker // for all KEMs currently supported by this library.
56*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_PUBLIC_KEY_LENGTH 32
57*8fb009dcSAndroid Build Coastguard Worker 
58*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_public_key_len returns the length of a public key for |kem|.
59*8fb009dcSAndroid Build Coastguard Worker // This value will be at most |EVP_HPKE_MAX_PUBLIC_KEY_LENGTH|.
60*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem);
61*8fb009dcSAndroid Build Coastguard Worker 
62*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_PRIVATE_KEY_LENGTH is the maximum length of an encoded private
63*8fb009dcSAndroid Build Coastguard Worker // key for all KEMs currently supported by this library.
64*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_PRIVATE_KEY_LENGTH 32
65*8fb009dcSAndroid Build Coastguard Worker 
66*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_private_key_len returns the length of a private key for |kem|.
67*8fb009dcSAndroid Build Coastguard Worker // This value will be at most |EVP_HPKE_MAX_PRIVATE_KEY_LENGTH|.
68*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem);
69*8fb009dcSAndroid Build Coastguard Worker 
70*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_ENC_LENGTH is the maximum length of "enc", the encapsulated
71*8fb009dcSAndroid Build Coastguard Worker // shared secret, for all KEMs currently supported by this library.
72*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_ENC_LENGTH 32
73*8fb009dcSAndroid Build Coastguard Worker 
74*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_enc_len returns the length of the "enc", the encapsulated shared
75*8fb009dcSAndroid Build Coastguard Worker // secret, for |kem|. This value will be at most |EVP_HPKE_MAX_ENC_LENGTH|.
76*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem);
77*8fb009dcSAndroid Build Coastguard Worker 
78*8fb009dcSAndroid Build Coastguard Worker // The following constants are KDF identifiers.
79*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_HKDF_SHA256 0x0001
80*8fb009dcSAndroid Build Coastguard Worker 
81*8fb009dcSAndroid Build Coastguard Worker // The following functions are KDF algorithms which may be used with HPKE.
82*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KDF *EVP_hpke_hkdf_sha256(void);
83*8fb009dcSAndroid Build Coastguard Worker 
84*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KDF_id returns the HPKE KDF identifier for |kdf|.
85*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT uint16_t EVP_HPKE_KDF_id(const EVP_HPKE_KDF *kdf);
86*8fb009dcSAndroid Build Coastguard Worker 
87*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KDF_hkdf_md returns the HKDF hash function corresponding to |kdf|,
88*8fb009dcSAndroid Build Coastguard Worker // or NULL if |kdf| is not an HKDF-based KDF. All currently supported KDFs are
89*8fb009dcSAndroid Build Coastguard Worker // HKDF-based.
90*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_MD *EVP_HPKE_KDF_hkdf_md(const EVP_HPKE_KDF *kdf);
91*8fb009dcSAndroid Build Coastguard Worker 
92*8fb009dcSAndroid Build Coastguard Worker // The following constants are AEAD identifiers.
93*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_AES_128_GCM 0x0001
94*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_AES_256_GCM 0x0002
95*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_CHACHA20_POLY1305 0x0003
96*8fb009dcSAndroid Build Coastguard Worker 
97*8fb009dcSAndroid Build Coastguard Worker // The following functions are AEAD algorithms which may be used with HPKE.
98*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_hpke_aes_128_gcm(void);
99*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_hpke_aes_256_gcm(void);
100*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_hpke_chacha20_poly1305(void);
101*8fb009dcSAndroid Build Coastguard Worker 
102*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_AEAD_id returns the HPKE AEAD identifier for |aead|.
103*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT uint16_t EVP_HPKE_AEAD_id(const EVP_HPKE_AEAD *aead);
104*8fb009dcSAndroid Build Coastguard Worker 
105*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_AEAD_aead returns the |EVP_AEAD| corresponding to |aead|.
106*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_AEAD *EVP_HPKE_AEAD_aead(const EVP_HPKE_AEAD *aead);
107*8fb009dcSAndroid Build Coastguard Worker 
108*8fb009dcSAndroid Build Coastguard Worker 
109*8fb009dcSAndroid Build Coastguard Worker // Recipient keys.
110*8fb009dcSAndroid Build Coastguard Worker //
111*8fb009dcSAndroid Build Coastguard Worker // An HPKE recipient maintains a long-term KEM key. This library represents keys
112*8fb009dcSAndroid Build Coastguard Worker // with the |EVP_HPKE_KEY| type.
113*8fb009dcSAndroid Build Coastguard Worker 
114*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_zero sets an uninitialized |EVP_HPKE_KEY| to the zero state. The
115*8fb009dcSAndroid Build Coastguard Worker // caller should then use |EVP_HPKE_KEY_init|, |EVP_HPKE_KEY_copy|, or
116*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY_generate| to finish initializing |key|.
117*8fb009dcSAndroid Build Coastguard Worker //
118*8fb009dcSAndroid Build Coastguard Worker // It is safe, but not necessary to call |EVP_HPKE_KEY_cleanup| in this state.
119*8fb009dcSAndroid Build Coastguard Worker // This may be used for more uniform cleanup of |EVP_HPKE_KEY|.
120*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_zero(EVP_HPKE_KEY *key);
121*8fb009dcSAndroid Build Coastguard Worker 
122*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_cleanup releases memory referenced by |key|.
123*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_cleanup(EVP_HPKE_KEY *key);
124*8fb009dcSAndroid Build Coastguard Worker 
125*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_new returns a newly-allocated |EVP_HPKE_KEY|, or NULL on error.
126*8fb009dcSAndroid Build Coastguard Worker // The caller must call |EVP_HPKE_KEY_free| on the result to release it.
127*8fb009dcSAndroid Build Coastguard Worker //
128*8fb009dcSAndroid Build Coastguard Worker // This is a convenience function for callers that need a heap-allocated
129*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY|.
130*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT EVP_HPKE_KEY *EVP_HPKE_KEY_new(void);
131*8fb009dcSAndroid Build Coastguard Worker 
132*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_free releases memory associated with |key|, which must have been
133*8fb009dcSAndroid Build Coastguard Worker // created with |EVP_HPKE_KEY_new|.
134*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_free(EVP_HPKE_KEY *key);
135*8fb009dcSAndroid Build Coastguard Worker 
136*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_copy sets |dst| to a copy of |src|. It returns one on success
137*8fb009dcSAndroid Build Coastguard Worker // and zero on error. On success, the caller must call |EVP_HPKE_KEY_cleanup| to
138*8fb009dcSAndroid Build Coastguard Worker // release |dst|. On failure, calling |EVP_HPKE_KEY_cleanup| is safe, but not
139*8fb009dcSAndroid Build Coastguard Worker // necessary.
140*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_copy(EVP_HPKE_KEY *dst,
141*8fb009dcSAndroid Build Coastguard Worker                                      const EVP_HPKE_KEY *src);
142*8fb009dcSAndroid Build Coastguard Worker 
143*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_move sets |out|, which must be initialized or in the zero state,
144*8fb009dcSAndroid Build Coastguard Worker // to the key in |in|. |in| is mutated and left in the zero state.
145*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_move(EVP_HPKE_KEY *out, EVP_HPKE_KEY *in);
146*8fb009dcSAndroid Build Coastguard Worker 
147*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_init decodes |priv_key| as a private key for |kem| and
148*8fb009dcSAndroid Build Coastguard Worker // initializes |key| with the result. It returns one on success and zero if
149*8fb009dcSAndroid Build Coastguard Worker // |priv_key| was invalid. On success, the caller must call
150*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY_cleanup| to release the key. On failure, calling
151*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY_cleanup| is safe, but not necessary.
152*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem,
153*8fb009dcSAndroid Build Coastguard Worker                                      const uint8_t *priv_key,
154*8fb009dcSAndroid Build Coastguard Worker                                      size_t priv_key_len);
155*8fb009dcSAndroid Build Coastguard Worker 
156*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_generate sets |key| to a newly-generated key using |kem|.
157*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_generate(EVP_HPKE_KEY *key,
158*8fb009dcSAndroid Build Coastguard Worker                                          const EVP_HPKE_KEM *kem);
159*8fb009dcSAndroid Build Coastguard Worker 
160*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_kem returns the HPKE KEM used by |key|.
161*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KEM *EVP_HPKE_KEY_kem(const EVP_HPKE_KEY *key);
162*8fb009dcSAndroid Build Coastguard Worker 
163*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_public_key writes |key|'s public key to |out| and sets
164*8fb009dcSAndroid Build Coastguard Worker // |*out_len| to the number of bytes written. On success, it returns one and
165*8fb009dcSAndroid Build Coastguard Worker // writes at most |max_out| bytes. If |max_out| is too small, it returns zero.
166*8fb009dcSAndroid Build Coastguard Worker // Setting |max_out| to |EVP_HPKE_MAX_PUBLIC_KEY_LENGTH| will ensure the public
167*8fb009dcSAndroid Build Coastguard Worker // key fits. An exact size can also be determined by
168*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEM_public_key_len|.
169*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_public_key(const EVP_HPKE_KEY *key,
170*8fb009dcSAndroid Build Coastguard Worker                                            uint8_t *out, size_t *out_len,
171*8fb009dcSAndroid Build Coastguard Worker                                            size_t max_out);
172*8fb009dcSAndroid Build Coastguard Worker 
173*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_private_key writes |key|'s private key to |out| and sets
174*8fb009dcSAndroid Build Coastguard Worker // |*out_len| to the number of bytes written. On success, it returns one and
175*8fb009dcSAndroid Build Coastguard Worker // writes at most |max_out| bytes. If |max_out| is too small, it returns zero.
176*8fb009dcSAndroid Build Coastguard Worker // Setting |max_out| to |EVP_HPKE_MAX_PRIVATE_KEY_LENGTH| will ensure the
177*8fb009dcSAndroid Build Coastguard Worker // private key fits. An exact size can also be determined by
178*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEM_private_key_len|.
179*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_private_key(const EVP_HPKE_KEY *key,
180*8fb009dcSAndroid Build Coastguard Worker                                             uint8_t *out, size_t *out_len,
181*8fb009dcSAndroid Build Coastguard Worker                                             size_t max_out);
182*8fb009dcSAndroid Build Coastguard Worker 
183*8fb009dcSAndroid Build Coastguard Worker 
184*8fb009dcSAndroid Build Coastguard Worker // Encryption contexts.
185*8fb009dcSAndroid Build Coastguard Worker //
186*8fb009dcSAndroid Build Coastguard Worker // An HPKE encryption context is represented by the |EVP_HPKE_CTX| type.
187*8fb009dcSAndroid Build Coastguard Worker 
188*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_zero sets an uninitialized |EVP_HPKE_CTX| to the zero state. The
189*8fb009dcSAndroid Build Coastguard Worker // caller should then use one of the |EVP_HPKE_CTX_setup_*| functions to finish
190*8fb009dcSAndroid Build Coastguard Worker // setting up |ctx|.
191*8fb009dcSAndroid Build Coastguard Worker //
192*8fb009dcSAndroid Build Coastguard Worker // It is safe, but not necessary to call |EVP_HPKE_CTX_cleanup| in this state.
193*8fb009dcSAndroid Build Coastguard Worker // This may be used for more uniform cleanup of |EVP_HPKE_CTX|.
194*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_CTX_zero(EVP_HPKE_CTX *ctx);
195*8fb009dcSAndroid Build Coastguard Worker 
196*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_cleanup releases memory referenced by |ctx|. |ctx| must have
197*8fb009dcSAndroid Build Coastguard Worker // been initialized with |EVP_HPKE_CTX_zero| or one of the
198*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_setup_*| functions.
199*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_CTX_cleanup(EVP_HPKE_CTX *ctx);
200*8fb009dcSAndroid Build Coastguard Worker 
201*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_new returns a newly-allocated |EVP_HPKE_CTX|, or NULL on error.
202*8fb009dcSAndroid Build Coastguard Worker // The caller must call |EVP_HPKE_CTX_free| on the result to release it.
203*8fb009dcSAndroid Build Coastguard Worker //
204*8fb009dcSAndroid Build Coastguard Worker // This is a convenience function for callers that need a heap-allocated
205*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX|.
206*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT EVP_HPKE_CTX *EVP_HPKE_CTX_new(void);
207*8fb009dcSAndroid Build Coastguard Worker 
208*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_free releases memory associated with |ctx|, which must have been
209*8fb009dcSAndroid Build Coastguard Worker // created with |EVP_HPKE_CTX_new|.
210*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_CTX_free(EVP_HPKE_CTX *ctx);
211*8fb009dcSAndroid Build Coastguard Worker 
212*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_sender implements the SetupBaseS HPKE operation. It
213*8fb009dcSAndroid Build Coastguard Worker // encapsulates a shared secret for |peer_public_key| and sets up |ctx| as a
214*8fb009dcSAndroid Build Coastguard Worker // sender context. It writes the encapsulated shared secret to |out_enc| and
215*8fb009dcSAndroid Build Coastguard Worker // sets |*out_enc_len| to the number of bytes written. It writes at most
216*8fb009dcSAndroid Build Coastguard Worker // |max_enc| bytes and fails if the buffer is too small. Setting |max_enc| to at
217*8fb009dcSAndroid Build Coastguard Worker // least |EVP_HPKE_MAX_ENC_LENGTH| will ensure the buffer is large enough. An
218*8fb009dcSAndroid Build Coastguard Worker // exact size may also be determined by |EVP_PKEY_KEM_enc_len|.
219*8fb009dcSAndroid Build Coastguard Worker //
220*8fb009dcSAndroid Build Coastguard Worker // This function returns one on success and zero on error. Note that
221*8fb009dcSAndroid Build Coastguard Worker // |peer_public_key| may be invalid, in which case this function will return an
222*8fb009dcSAndroid Build Coastguard Worker // error.
223*8fb009dcSAndroid Build Coastguard Worker //
224*8fb009dcSAndroid Build Coastguard Worker // On success, callers may call |EVP_HPKE_CTX_seal| to encrypt messages for the
225*8fb009dcSAndroid Build Coastguard Worker // recipient. Callers must then call |EVP_HPKE_CTX_cleanup| when done. On
226*8fb009dcSAndroid Build Coastguard Worker // failure, calling |EVP_HPKE_CTX_cleanup| is safe, but not required.
227*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_sender(
228*8fb009dcSAndroid Build Coastguard Worker     EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc,
229*8fb009dcSAndroid Build Coastguard Worker     const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
230*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *peer_public_key, size_t peer_public_key_len,
231*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *info, size_t info_len);
232*8fb009dcSAndroid Build Coastguard Worker 
233*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_sender_with_seed_for_testing behaves like
234*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_setup_sender|, but takes a seed to behave deterministically.
235*8fb009dcSAndroid Build Coastguard Worker // The seed's format depends on |kem|. For X25519, it is the sender's
236*8fb009dcSAndroid Build Coastguard Worker // ephemeral private key.
237*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_sender_with_seed_for_testing(
238*8fb009dcSAndroid Build Coastguard Worker     EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc,
239*8fb009dcSAndroid Build Coastguard Worker     const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
240*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *peer_public_key, size_t peer_public_key_len,
241*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *info, size_t info_len, const uint8_t *seed, size_t seed_len);
242*8fb009dcSAndroid Build Coastguard Worker 
243*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_recipient implements the SetupBaseR HPKE operation. It
244*8fb009dcSAndroid Build Coastguard Worker // decapsulates the shared secret in |enc| with |key| and sets up |ctx| as a
245*8fb009dcSAndroid Build Coastguard Worker // recipient context. It returns one on success and zero on failure. Note that
246*8fb009dcSAndroid Build Coastguard Worker // |enc| may be invalid, in which case this function will return an error.
247*8fb009dcSAndroid Build Coastguard Worker //
248*8fb009dcSAndroid Build Coastguard Worker // On success, callers may call |EVP_HPKE_CTX_open| to decrypt messages from the
249*8fb009dcSAndroid Build Coastguard Worker // sender. Callers must then call |EVP_HPKE_CTX_cleanup| when done. On failure,
250*8fb009dcSAndroid Build Coastguard Worker // calling |EVP_HPKE_CTX_cleanup| is safe, but not required.
251*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_recipient(
252*8fb009dcSAndroid Build Coastguard Worker     EVP_HPKE_CTX *ctx, const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf,
253*8fb009dcSAndroid Build Coastguard Worker     const EVP_HPKE_AEAD *aead, const uint8_t *enc, size_t enc_len,
254*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *info, size_t info_len);
255*8fb009dcSAndroid Build Coastguard Worker 
256*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_auth_sender implements the SetupAuthS HPKE operation. It
257*8fb009dcSAndroid Build Coastguard Worker // behaves like |EVP_HPKE_CTX_setup_sender| but authenticates the resulting
258*8fb009dcSAndroid Build Coastguard Worker // context with |key|.
259*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_auth_sender(
260*8fb009dcSAndroid Build Coastguard Worker     EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc,
261*8fb009dcSAndroid Build Coastguard Worker     const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
262*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *peer_public_key, size_t peer_public_key_len,
263*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *info, size_t info_len);
264*8fb009dcSAndroid Build Coastguard Worker 
265*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_auth_sender_with_seed_for_testing behaves like
266*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_setup_auth_sender|, but takes a seed to behave
267*8fb009dcSAndroid Build Coastguard Worker // deterministically. The seed's format depends on |kem|. For X25519, it is the
268*8fb009dcSAndroid Build Coastguard Worker // sender's ephemeral private key.
269*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_auth_sender_with_seed_for_testing(
270*8fb009dcSAndroid Build Coastguard Worker     EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc,
271*8fb009dcSAndroid Build Coastguard Worker     const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
272*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *peer_public_key, size_t peer_public_key_len,
273*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *info, size_t info_len, const uint8_t *seed, size_t seed_len);
274*8fb009dcSAndroid Build Coastguard Worker 
275*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_auth_recipient implements the SetupAuthR HPKE operation.
276*8fb009dcSAndroid Build Coastguard Worker // It behaves like |EVP_HPKE_CTX_setup_recipient| but checks the resulting
277*8fb009dcSAndroid Build Coastguard Worker // context was authenticated with |peer_public_key|.
278*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_auth_recipient(
279*8fb009dcSAndroid Build Coastguard Worker     EVP_HPKE_CTX *ctx, const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf,
280*8fb009dcSAndroid Build Coastguard Worker     const EVP_HPKE_AEAD *aead, const uint8_t *enc, size_t enc_len,
281*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *info, size_t info_len, const uint8_t *peer_public_key,
282*8fb009dcSAndroid Build Coastguard Worker     size_t peer_public_key_len);
283*8fb009dcSAndroid Build Coastguard Worker 
284*8fb009dcSAndroid Build Coastguard Worker 
285*8fb009dcSAndroid Build Coastguard Worker // Using an HPKE context.
286*8fb009dcSAndroid Build Coastguard Worker //
287*8fb009dcSAndroid Build Coastguard Worker // Once set up, callers may encrypt or decrypt with an |EVP_HPKE_CTX| using the
288*8fb009dcSAndroid Build Coastguard Worker // following functions.
289*8fb009dcSAndroid Build Coastguard Worker 
290*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_open uses the HPKE context |ctx| to authenticate |in_len| bytes
291*8fb009dcSAndroid Build Coastguard Worker // from |in| and |ad_len| bytes from |ad| and to decrypt at most |in_len| bytes
292*8fb009dcSAndroid Build Coastguard Worker // into |out|. It returns one on success, and zero otherwise.
293*8fb009dcSAndroid Build Coastguard Worker //
294*8fb009dcSAndroid Build Coastguard Worker // This operation will fail if the |ctx| context is not set up as a receiver.
295*8fb009dcSAndroid Build Coastguard Worker //
296*8fb009dcSAndroid Build Coastguard Worker // Note that HPKE encryption is stateful and ordered. The sender's first call to
297*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_seal| must correspond to the recipient's first call to
298*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_open|, etc.
299*8fb009dcSAndroid Build Coastguard Worker //
300*8fb009dcSAndroid Build Coastguard Worker // At most |in_len| bytes are written to |out|. In order to ensure success,
301*8fb009dcSAndroid Build Coastguard Worker // |max_out_len| should be at least |in_len|. On successful return, |*out_len|
302*8fb009dcSAndroid Build Coastguard Worker // is set to the actual number of bytes written.
303*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_open(EVP_HPKE_CTX *ctx, uint8_t *out,
304*8fb009dcSAndroid Build Coastguard Worker                                      size_t *out_len, size_t max_out_len,
305*8fb009dcSAndroid Build Coastguard Worker                                      const uint8_t *in, size_t in_len,
306*8fb009dcSAndroid Build Coastguard Worker                                      const uint8_t *ad, size_t ad_len);
307*8fb009dcSAndroid Build Coastguard Worker 
308*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_seal uses the HPKE context |ctx| to encrypt and authenticate
309*8fb009dcSAndroid Build Coastguard Worker // |in_len| bytes of ciphertext |in| and authenticate |ad_len| bytes from |ad|,
310*8fb009dcSAndroid Build Coastguard Worker // writing the result to |out|. It returns one on success and zero otherwise.
311*8fb009dcSAndroid Build Coastguard Worker //
312*8fb009dcSAndroid Build Coastguard Worker // This operation will fail if the |ctx| context is not set up as a sender.
313*8fb009dcSAndroid Build Coastguard Worker //
314*8fb009dcSAndroid Build Coastguard Worker // Note that HPKE encryption is stateful and ordered. The sender's first call to
315*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_seal| must correspond to the recipient's first call to
316*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_open|, etc.
317*8fb009dcSAndroid Build Coastguard Worker //
318*8fb009dcSAndroid Build Coastguard Worker // At most, |max_out_len| encrypted bytes are written to |out|. On successful
319*8fb009dcSAndroid Build Coastguard Worker // return, |*out_len| is set to the actual number of bytes written.
320*8fb009dcSAndroid Build Coastguard Worker //
321*8fb009dcSAndroid Build Coastguard Worker // To ensure success, |max_out_len| should be |in_len| plus the result of
322*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_max_overhead| or |EVP_HPKE_MAX_OVERHEAD|.
323*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_seal(EVP_HPKE_CTX *ctx, uint8_t *out,
324*8fb009dcSAndroid Build Coastguard Worker                                      size_t *out_len, size_t max_out_len,
325*8fb009dcSAndroid Build Coastguard Worker                                      const uint8_t *in, size_t in_len,
326*8fb009dcSAndroid Build Coastguard Worker                                      const uint8_t *ad, size_t ad_len);
327*8fb009dcSAndroid Build Coastguard Worker 
328*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_export uses the HPKE context |ctx| to export a secret of
329*8fb009dcSAndroid Build Coastguard Worker // |secret_len| bytes into |out|. This function uses |context_len| bytes from
330*8fb009dcSAndroid Build Coastguard Worker // |context| as a context string for the secret. This is necessary to separate
331*8fb009dcSAndroid Build Coastguard Worker // different uses of exported secrets and bind relevant caller-specific context
332*8fb009dcSAndroid Build Coastguard Worker // into the output. It returns one on success and zero otherwise.
333*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_export(const EVP_HPKE_CTX *ctx, uint8_t *out,
334*8fb009dcSAndroid Build Coastguard Worker                                        size_t secret_len,
335*8fb009dcSAndroid Build Coastguard Worker                                        const uint8_t *context,
336*8fb009dcSAndroid Build Coastguard Worker                                        size_t context_len);
337*8fb009dcSAndroid Build Coastguard Worker 
338*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_OVERHEAD contains the largest value that
339*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_max_overhead| would ever return for any context.
340*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_OVERHEAD EVP_AEAD_MAX_OVERHEAD
341*8fb009dcSAndroid Build Coastguard Worker 
342*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_max_overhead returns the maximum number of additional bytes
343*8fb009dcSAndroid Build Coastguard Worker // added by sealing data with |EVP_HPKE_CTX_seal|. The |ctx| context must be set
344*8fb009dcSAndroid Build Coastguard Worker // up as a sender.
345*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_CTX_max_overhead(const EVP_HPKE_CTX *ctx);
346*8fb009dcSAndroid Build Coastguard Worker 
347*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_kem returns |ctx|'s configured KEM, or NULL if the context has
348*8fb009dcSAndroid Build Coastguard Worker // not been set up.
349*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KEM *EVP_HPKE_CTX_kem(const EVP_HPKE_CTX *ctx);
350*8fb009dcSAndroid Build Coastguard Worker 
351*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_aead returns |ctx|'s configured AEAD, or NULL if the context has
352*8fb009dcSAndroid Build Coastguard Worker // not been set up.
353*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_HPKE_CTX_aead(const EVP_HPKE_CTX *ctx);
354*8fb009dcSAndroid Build Coastguard Worker 
355*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_kdf returns |ctx|'s configured KDF, or NULL if the context has
356*8fb009dcSAndroid Build Coastguard Worker // not been set up.
357*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KDF *EVP_HPKE_CTX_kdf(const EVP_HPKE_CTX *ctx);
358*8fb009dcSAndroid Build Coastguard Worker 
359*8fb009dcSAndroid Build Coastguard Worker 
360*8fb009dcSAndroid Build Coastguard Worker // Private structures.
361*8fb009dcSAndroid Build Coastguard Worker //
362*8fb009dcSAndroid Build Coastguard Worker // The following structures are exported so their types are stack-allocatable,
363*8fb009dcSAndroid Build Coastguard Worker // but accessing or modifying their fields is forbidden.
364*8fb009dcSAndroid Build Coastguard Worker 
365*8fb009dcSAndroid Build Coastguard Worker struct evp_hpke_ctx_st {
366*8fb009dcSAndroid Build Coastguard Worker   const EVP_HPKE_KEM *kem;
367*8fb009dcSAndroid Build Coastguard Worker   const EVP_HPKE_AEAD *aead;
368*8fb009dcSAndroid Build Coastguard Worker   const EVP_HPKE_KDF *kdf;
369*8fb009dcSAndroid Build Coastguard Worker   EVP_AEAD_CTX aead_ctx;
370*8fb009dcSAndroid Build Coastguard Worker   uint8_t base_nonce[EVP_AEAD_MAX_NONCE_LENGTH];
371*8fb009dcSAndroid Build Coastguard Worker   uint8_t exporter_secret[EVP_MAX_MD_SIZE];
372*8fb009dcSAndroid Build Coastguard Worker   uint64_t seq;
373*8fb009dcSAndroid Build Coastguard Worker   int is_sender;
374*8fb009dcSAndroid Build Coastguard Worker };
375*8fb009dcSAndroid Build Coastguard Worker 
376*8fb009dcSAndroid Build Coastguard Worker struct evp_hpke_key_st {
377*8fb009dcSAndroid Build Coastguard Worker   const EVP_HPKE_KEM *kem;
378*8fb009dcSAndroid Build Coastguard Worker   uint8_t private_key[X25519_PRIVATE_KEY_LEN];
379*8fb009dcSAndroid Build Coastguard Worker   uint8_t public_key[X25519_PUBLIC_VALUE_LEN];
380*8fb009dcSAndroid Build Coastguard Worker };
381*8fb009dcSAndroid Build Coastguard Worker 
382*8fb009dcSAndroid Build Coastguard Worker 
383*8fb009dcSAndroid Build Coastguard Worker #if defined(__cplusplus)
384*8fb009dcSAndroid Build Coastguard Worker }  // extern C
385*8fb009dcSAndroid Build Coastguard Worker #endif
386*8fb009dcSAndroid Build Coastguard Worker 
387*8fb009dcSAndroid Build Coastguard Worker #if !defined(BORINGSSL_NO_CXX)
388*8fb009dcSAndroid Build Coastguard Worker extern "C++" {
389*8fb009dcSAndroid Build Coastguard Worker 
390*8fb009dcSAndroid Build Coastguard Worker BSSL_NAMESPACE_BEGIN
391*8fb009dcSAndroid Build Coastguard Worker 
392*8fb009dcSAndroid Build Coastguard Worker using ScopedEVP_HPKE_CTX =
393*8fb009dcSAndroid Build Coastguard Worker     internal::StackAllocated<EVP_HPKE_CTX, void, EVP_HPKE_CTX_zero,
394*8fb009dcSAndroid Build Coastguard Worker                              EVP_HPKE_CTX_cleanup>;
395*8fb009dcSAndroid Build Coastguard Worker using ScopedEVP_HPKE_KEY =
396*8fb009dcSAndroid Build Coastguard Worker     internal::StackAllocatedMovable<EVP_HPKE_KEY, void, EVP_HPKE_KEY_zero,
397*8fb009dcSAndroid Build Coastguard Worker                                     EVP_HPKE_KEY_cleanup, EVP_HPKE_KEY_move>;
398*8fb009dcSAndroid Build Coastguard Worker 
399*8fb009dcSAndroid Build Coastguard Worker BORINGSSL_MAKE_DELETER(EVP_HPKE_CTX, EVP_HPKE_CTX_free)
400*8fb009dcSAndroid Build Coastguard Worker BORINGSSL_MAKE_DELETER(EVP_HPKE_KEY, EVP_HPKE_KEY_free)
401*8fb009dcSAndroid Build Coastguard Worker 
402*8fb009dcSAndroid Build Coastguard Worker BSSL_NAMESPACE_END
403*8fb009dcSAndroid Build Coastguard Worker 
404*8fb009dcSAndroid Build Coastguard Worker }  // extern C++
405*8fb009dcSAndroid Build Coastguard Worker #endif
406*8fb009dcSAndroid Build Coastguard Worker 
407*8fb009dcSAndroid Build Coastguard Worker #endif  // OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H
408