1*8fb009dcSAndroid Build Coastguard Worker /* Copyright (c) 2020, Google Inc. 2*8fb009dcSAndroid Build Coastguard Worker * 3*8fb009dcSAndroid Build Coastguard Worker * Permission to use, copy, modify, and/or distribute this software for any 4*8fb009dcSAndroid Build Coastguard Worker * purpose with or without fee is hereby granted, provided that the above 5*8fb009dcSAndroid Build Coastguard Worker * copyright notice and this permission notice appear in all copies. 6*8fb009dcSAndroid Build Coastguard Worker * 7*8fb009dcSAndroid Build Coastguard Worker * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 8*8fb009dcSAndroid Build Coastguard Worker * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 9*8fb009dcSAndroid Build Coastguard Worker * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY 10*8fb009dcSAndroid Build Coastguard Worker * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 11*8fb009dcSAndroid Build Coastguard Worker * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION 12*8fb009dcSAndroid Build Coastguard Worker * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN 13*8fb009dcSAndroid Build Coastguard Worker * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ 14*8fb009dcSAndroid Build Coastguard Worker 15*8fb009dcSAndroid Build Coastguard Worker #ifndef OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H 16*8fb009dcSAndroid Build Coastguard Worker #define OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H 17*8fb009dcSAndroid Build Coastguard Worker 18*8fb009dcSAndroid Build Coastguard Worker #include <openssl/aead.h> 19*8fb009dcSAndroid Build Coastguard Worker #include <openssl/base.h> 20*8fb009dcSAndroid Build Coastguard Worker #include <openssl/curve25519.h> 21*8fb009dcSAndroid Build Coastguard Worker #include <openssl/digest.h> 22*8fb009dcSAndroid Build Coastguard Worker 23*8fb009dcSAndroid Build Coastguard Worker #if defined(__cplusplus) 24*8fb009dcSAndroid Build Coastguard Worker extern "C" { 25*8fb009dcSAndroid Build Coastguard Worker #endif 26*8fb009dcSAndroid Build Coastguard Worker 27*8fb009dcSAndroid Build Coastguard Worker 28*8fb009dcSAndroid Build Coastguard Worker // Hybrid Public Key Encryption. 29*8fb009dcSAndroid Build Coastguard Worker // 30*8fb009dcSAndroid Build Coastguard Worker // Hybrid Public Key Encryption (HPKE) enables a sender to encrypt messages to a 31*8fb009dcSAndroid Build Coastguard Worker // receiver with a public key. 32*8fb009dcSAndroid Build Coastguard Worker // 33*8fb009dcSAndroid Build Coastguard Worker // See RFC 9180. 34*8fb009dcSAndroid Build Coastguard Worker 35*8fb009dcSAndroid Build Coastguard Worker 36*8fb009dcSAndroid Build Coastguard Worker // Parameters. 37*8fb009dcSAndroid Build Coastguard Worker // 38*8fb009dcSAndroid Build Coastguard Worker // An HPKE context is parameterized by KEM, KDF, and AEAD algorithms, 39*8fb009dcSAndroid Build Coastguard Worker // represented by |EVP_HPKE_KEM|, |EVP_HPKE_KDF|, and |EVP_HPKE_AEAD| types, 40*8fb009dcSAndroid Build Coastguard Worker // respectively. 41*8fb009dcSAndroid Build Coastguard Worker 42*8fb009dcSAndroid Build Coastguard Worker // The following constants are KEM identifiers. 43*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_DHKEM_X25519_HKDF_SHA256 0x0020 44*8fb009dcSAndroid Build Coastguard Worker 45*8fb009dcSAndroid Build Coastguard Worker // The following functions are KEM algorithms which may be used with HPKE. Note 46*8fb009dcSAndroid Build Coastguard Worker // that, while some HPKE KEMs use KDFs internally, this is separate from the 47*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KDF| selection. 48*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KEM *EVP_hpke_x25519_hkdf_sha256(void); 49*8fb009dcSAndroid Build Coastguard Worker 50*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_id returns the HPKE KEM identifier for |kem|, which 51*8fb009dcSAndroid Build Coastguard Worker // will be one of the |EVP_HPKE_KEM_*| constants. 52*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem); 53*8fb009dcSAndroid Build Coastguard Worker 54*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_PUBLIC_KEY_LENGTH is the maximum length of an encoded public key 55*8fb009dcSAndroid Build Coastguard Worker // for all KEMs currently supported by this library. 56*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_PUBLIC_KEY_LENGTH 32 57*8fb009dcSAndroid Build Coastguard Worker 58*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_public_key_len returns the length of a public key for |kem|. 59*8fb009dcSAndroid Build Coastguard Worker // This value will be at most |EVP_HPKE_MAX_PUBLIC_KEY_LENGTH|. 60*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem); 61*8fb009dcSAndroid Build Coastguard Worker 62*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_PRIVATE_KEY_LENGTH is the maximum length of an encoded private 63*8fb009dcSAndroid Build Coastguard Worker // key for all KEMs currently supported by this library. 64*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_PRIVATE_KEY_LENGTH 32 65*8fb009dcSAndroid Build Coastguard Worker 66*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_private_key_len returns the length of a private key for |kem|. 67*8fb009dcSAndroid Build Coastguard Worker // This value will be at most |EVP_HPKE_MAX_PRIVATE_KEY_LENGTH|. 68*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem); 69*8fb009dcSAndroid Build Coastguard Worker 70*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_ENC_LENGTH is the maximum length of "enc", the encapsulated 71*8fb009dcSAndroid Build Coastguard Worker // shared secret, for all KEMs currently supported by this library. 72*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_ENC_LENGTH 32 73*8fb009dcSAndroid Build Coastguard Worker 74*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEM_enc_len returns the length of the "enc", the encapsulated shared 75*8fb009dcSAndroid Build Coastguard Worker // secret, for |kem|. This value will be at most |EVP_HPKE_MAX_ENC_LENGTH|. 76*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem); 77*8fb009dcSAndroid Build Coastguard Worker 78*8fb009dcSAndroid Build Coastguard Worker // The following constants are KDF identifiers. 79*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_HKDF_SHA256 0x0001 80*8fb009dcSAndroid Build Coastguard Worker 81*8fb009dcSAndroid Build Coastguard Worker // The following functions are KDF algorithms which may be used with HPKE. 82*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KDF *EVP_hpke_hkdf_sha256(void); 83*8fb009dcSAndroid Build Coastguard Worker 84*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KDF_id returns the HPKE KDF identifier for |kdf|. 85*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT uint16_t EVP_HPKE_KDF_id(const EVP_HPKE_KDF *kdf); 86*8fb009dcSAndroid Build Coastguard Worker 87*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KDF_hkdf_md returns the HKDF hash function corresponding to |kdf|, 88*8fb009dcSAndroid Build Coastguard Worker // or NULL if |kdf| is not an HKDF-based KDF. All currently supported KDFs are 89*8fb009dcSAndroid Build Coastguard Worker // HKDF-based. 90*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_MD *EVP_HPKE_KDF_hkdf_md(const EVP_HPKE_KDF *kdf); 91*8fb009dcSAndroid Build Coastguard Worker 92*8fb009dcSAndroid Build Coastguard Worker // The following constants are AEAD identifiers. 93*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_AES_128_GCM 0x0001 94*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_AES_256_GCM 0x0002 95*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_CHACHA20_POLY1305 0x0003 96*8fb009dcSAndroid Build Coastguard Worker 97*8fb009dcSAndroid Build Coastguard Worker // The following functions are AEAD algorithms which may be used with HPKE. 98*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_hpke_aes_128_gcm(void); 99*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_hpke_aes_256_gcm(void); 100*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_hpke_chacha20_poly1305(void); 101*8fb009dcSAndroid Build Coastguard Worker 102*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_AEAD_id returns the HPKE AEAD identifier for |aead|. 103*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT uint16_t EVP_HPKE_AEAD_id(const EVP_HPKE_AEAD *aead); 104*8fb009dcSAndroid Build Coastguard Worker 105*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_AEAD_aead returns the |EVP_AEAD| corresponding to |aead|. 106*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_AEAD *EVP_HPKE_AEAD_aead(const EVP_HPKE_AEAD *aead); 107*8fb009dcSAndroid Build Coastguard Worker 108*8fb009dcSAndroid Build Coastguard Worker 109*8fb009dcSAndroid Build Coastguard Worker // Recipient keys. 110*8fb009dcSAndroid Build Coastguard Worker // 111*8fb009dcSAndroid Build Coastguard Worker // An HPKE recipient maintains a long-term KEM key. This library represents keys 112*8fb009dcSAndroid Build Coastguard Worker // with the |EVP_HPKE_KEY| type. 113*8fb009dcSAndroid Build Coastguard Worker 114*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_zero sets an uninitialized |EVP_HPKE_KEY| to the zero state. The 115*8fb009dcSAndroid Build Coastguard Worker // caller should then use |EVP_HPKE_KEY_init|, |EVP_HPKE_KEY_copy|, or 116*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY_generate| to finish initializing |key|. 117*8fb009dcSAndroid Build Coastguard Worker // 118*8fb009dcSAndroid Build Coastguard Worker // It is safe, but not necessary to call |EVP_HPKE_KEY_cleanup| in this state. 119*8fb009dcSAndroid Build Coastguard Worker // This may be used for more uniform cleanup of |EVP_HPKE_KEY|. 120*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_zero(EVP_HPKE_KEY *key); 121*8fb009dcSAndroid Build Coastguard Worker 122*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_cleanup releases memory referenced by |key|. 123*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_cleanup(EVP_HPKE_KEY *key); 124*8fb009dcSAndroid Build Coastguard Worker 125*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_new returns a newly-allocated |EVP_HPKE_KEY|, or NULL on error. 126*8fb009dcSAndroid Build Coastguard Worker // The caller must call |EVP_HPKE_KEY_free| on the result to release it. 127*8fb009dcSAndroid Build Coastguard Worker // 128*8fb009dcSAndroid Build Coastguard Worker // This is a convenience function for callers that need a heap-allocated 129*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY|. 130*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT EVP_HPKE_KEY *EVP_HPKE_KEY_new(void); 131*8fb009dcSAndroid Build Coastguard Worker 132*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_free releases memory associated with |key|, which must have been 133*8fb009dcSAndroid Build Coastguard Worker // created with |EVP_HPKE_KEY_new|. 134*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_free(EVP_HPKE_KEY *key); 135*8fb009dcSAndroid Build Coastguard Worker 136*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_copy sets |dst| to a copy of |src|. It returns one on success 137*8fb009dcSAndroid Build Coastguard Worker // and zero on error. On success, the caller must call |EVP_HPKE_KEY_cleanup| to 138*8fb009dcSAndroid Build Coastguard Worker // release |dst|. On failure, calling |EVP_HPKE_KEY_cleanup| is safe, but not 139*8fb009dcSAndroid Build Coastguard Worker // necessary. 140*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_copy(EVP_HPKE_KEY *dst, 141*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEY *src); 142*8fb009dcSAndroid Build Coastguard Worker 143*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_move sets |out|, which must be initialized or in the zero state, 144*8fb009dcSAndroid Build Coastguard Worker // to the key in |in|. |in| is mutated and left in the zero state. 145*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_KEY_move(EVP_HPKE_KEY *out, EVP_HPKE_KEY *in); 146*8fb009dcSAndroid Build Coastguard Worker 147*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_init decodes |priv_key| as a private key for |kem| and 148*8fb009dcSAndroid Build Coastguard Worker // initializes |key| with the result. It returns one on success and zero if 149*8fb009dcSAndroid Build Coastguard Worker // |priv_key| was invalid. On success, the caller must call 150*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY_cleanup| to release the key. On failure, calling 151*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEY_cleanup| is safe, but not necessary. 152*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, 153*8fb009dcSAndroid Build Coastguard Worker const uint8_t *priv_key, 154*8fb009dcSAndroid Build Coastguard Worker size_t priv_key_len); 155*8fb009dcSAndroid Build Coastguard Worker 156*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_generate sets |key| to a newly-generated key using |kem|. 157*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_generate(EVP_HPKE_KEY *key, 158*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEM *kem); 159*8fb009dcSAndroid Build Coastguard Worker 160*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_kem returns the HPKE KEM used by |key|. 161*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KEM *EVP_HPKE_KEY_kem(const EVP_HPKE_KEY *key); 162*8fb009dcSAndroid Build Coastguard Worker 163*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_public_key writes |key|'s public key to |out| and sets 164*8fb009dcSAndroid Build Coastguard Worker // |*out_len| to the number of bytes written. On success, it returns one and 165*8fb009dcSAndroid Build Coastguard Worker // writes at most |max_out| bytes. If |max_out| is too small, it returns zero. 166*8fb009dcSAndroid Build Coastguard Worker // Setting |max_out| to |EVP_HPKE_MAX_PUBLIC_KEY_LENGTH| will ensure the public 167*8fb009dcSAndroid Build Coastguard Worker // key fits. An exact size can also be determined by 168*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEM_public_key_len|. 169*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_public_key(const EVP_HPKE_KEY *key, 170*8fb009dcSAndroid Build Coastguard Worker uint8_t *out, size_t *out_len, 171*8fb009dcSAndroid Build Coastguard Worker size_t max_out); 172*8fb009dcSAndroid Build Coastguard Worker 173*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_KEY_private_key writes |key|'s private key to |out| and sets 174*8fb009dcSAndroid Build Coastguard Worker // |*out_len| to the number of bytes written. On success, it returns one and 175*8fb009dcSAndroid Build Coastguard Worker // writes at most |max_out| bytes. If |max_out| is too small, it returns zero. 176*8fb009dcSAndroid Build Coastguard Worker // Setting |max_out| to |EVP_HPKE_MAX_PRIVATE_KEY_LENGTH| will ensure the 177*8fb009dcSAndroid Build Coastguard Worker // private key fits. An exact size can also be determined by 178*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_KEM_private_key_len|. 179*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_KEY_private_key(const EVP_HPKE_KEY *key, 180*8fb009dcSAndroid Build Coastguard Worker uint8_t *out, size_t *out_len, 181*8fb009dcSAndroid Build Coastguard Worker size_t max_out); 182*8fb009dcSAndroid Build Coastguard Worker 183*8fb009dcSAndroid Build Coastguard Worker 184*8fb009dcSAndroid Build Coastguard Worker // Encryption contexts. 185*8fb009dcSAndroid Build Coastguard Worker // 186*8fb009dcSAndroid Build Coastguard Worker // An HPKE encryption context is represented by the |EVP_HPKE_CTX| type. 187*8fb009dcSAndroid Build Coastguard Worker 188*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_zero sets an uninitialized |EVP_HPKE_CTX| to the zero state. The 189*8fb009dcSAndroid Build Coastguard Worker // caller should then use one of the |EVP_HPKE_CTX_setup_*| functions to finish 190*8fb009dcSAndroid Build Coastguard Worker // setting up |ctx|. 191*8fb009dcSAndroid Build Coastguard Worker // 192*8fb009dcSAndroid Build Coastguard Worker // It is safe, but not necessary to call |EVP_HPKE_CTX_cleanup| in this state. 193*8fb009dcSAndroid Build Coastguard Worker // This may be used for more uniform cleanup of |EVP_HPKE_CTX|. 194*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_CTX_zero(EVP_HPKE_CTX *ctx); 195*8fb009dcSAndroid Build Coastguard Worker 196*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_cleanup releases memory referenced by |ctx|. |ctx| must have 197*8fb009dcSAndroid Build Coastguard Worker // been initialized with |EVP_HPKE_CTX_zero| or one of the 198*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_setup_*| functions. 199*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_CTX_cleanup(EVP_HPKE_CTX *ctx); 200*8fb009dcSAndroid Build Coastguard Worker 201*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_new returns a newly-allocated |EVP_HPKE_CTX|, or NULL on error. 202*8fb009dcSAndroid Build Coastguard Worker // The caller must call |EVP_HPKE_CTX_free| on the result to release it. 203*8fb009dcSAndroid Build Coastguard Worker // 204*8fb009dcSAndroid Build Coastguard Worker // This is a convenience function for callers that need a heap-allocated 205*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX|. 206*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT EVP_HPKE_CTX *EVP_HPKE_CTX_new(void); 207*8fb009dcSAndroid Build Coastguard Worker 208*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_free releases memory associated with |ctx|, which must have been 209*8fb009dcSAndroid Build Coastguard Worker // created with |EVP_HPKE_CTX_new|. 210*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT void EVP_HPKE_CTX_free(EVP_HPKE_CTX *ctx); 211*8fb009dcSAndroid Build Coastguard Worker 212*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_sender implements the SetupBaseS HPKE operation. It 213*8fb009dcSAndroid Build Coastguard Worker // encapsulates a shared secret for |peer_public_key| and sets up |ctx| as a 214*8fb009dcSAndroid Build Coastguard Worker // sender context. It writes the encapsulated shared secret to |out_enc| and 215*8fb009dcSAndroid Build Coastguard Worker // sets |*out_enc_len| to the number of bytes written. It writes at most 216*8fb009dcSAndroid Build Coastguard Worker // |max_enc| bytes and fails if the buffer is too small. Setting |max_enc| to at 217*8fb009dcSAndroid Build Coastguard Worker // least |EVP_HPKE_MAX_ENC_LENGTH| will ensure the buffer is large enough. An 218*8fb009dcSAndroid Build Coastguard Worker // exact size may also be determined by |EVP_PKEY_KEM_enc_len|. 219*8fb009dcSAndroid Build Coastguard Worker // 220*8fb009dcSAndroid Build Coastguard Worker // This function returns one on success and zero on error. Note that 221*8fb009dcSAndroid Build Coastguard Worker // |peer_public_key| may be invalid, in which case this function will return an 222*8fb009dcSAndroid Build Coastguard Worker // error. 223*8fb009dcSAndroid Build Coastguard Worker // 224*8fb009dcSAndroid Build Coastguard Worker // On success, callers may call |EVP_HPKE_CTX_seal| to encrypt messages for the 225*8fb009dcSAndroid Build Coastguard Worker // recipient. Callers must then call |EVP_HPKE_CTX_cleanup| when done. On 226*8fb009dcSAndroid Build Coastguard Worker // failure, calling |EVP_HPKE_CTX_cleanup| is safe, but not required. 227*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_sender( 228*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc, 229*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 230*8fb009dcSAndroid Build Coastguard Worker const uint8_t *peer_public_key, size_t peer_public_key_len, 231*8fb009dcSAndroid Build Coastguard Worker const uint8_t *info, size_t info_len); 232*8fb009dcSAndroid Build Coastguard Worker 233*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_sender_with_seed_for_testing behaves like 234*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_setup_sender|, but takes a seed to behave deterministically. 235*8fb009dcSAndroid Build Coastguard Worker // The seed's format depends on |kem|. For X25519, it is the sender's 236*8fb009dcSAndroid Build Coastguard Worker // ephemeral private key. 237*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_sender_with_seed_for_testing( 238*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc, 239*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 240*8fb009dcSAndroid Build Coastguard Worker const uint8_t *peer_public_key, size_t peer_public_key_len, 241*8fb009dcSAndroid Build Coastguard Worker const uint8_t *info, size_t info_len, const uint8_t *seed, size_t seed_len); 242*8fb009dcSAndroid Build Coastguard Worker 243*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_recipient implements the SetupBaseR HPKE operation. It 244*8fb009dcSAndroid Build Coastguard Worker // decapsulates the shared secret in |enc| with |key| and sets up |ctx| as a 245*8fb009dcSAndroid Build Coastguard Worker // recipient context. It returns one on success and zero on failure. Note that 246*8fb009dcSAndroid Build Coastguard Worker // |enc| may be invalid, in which case this function will return an error. 247*8fb009dcSAndroid Build Coastguard Worker // 248*8fb009dcSAndroid Build Coastguard Worker // On success, callers may call |EVP_HPKE_CTX_open| to decrypt messages from the 249*8fb009dcSAndroid Build Coastguard Worker // sender. Callers must then call |EVP_HPKE_CTX_cleanup| when done. On failure, 250*8fb009dcSAndroid Build Coastguard Worker // calling |EVP_HPKE_CTX_cleanup| is safe, but not required. 251*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_recipient( 252*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX *ctx, const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, 253*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_AEAD *aead, const uint8_t *enc, size_t enc_len, 254*8fb009dcSAndroid Build Coastguard Worker const uint8_t *info, size_t info_len); 255*8fb009dcSAndroid Build Coastguard Worker 256*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_auth_sender implements the SetupAuthS HPKE operation. It 257*8fb009dcSAndroid Build Coastguard Worker // behaves like |EVP_HPKE_CTX_setup_sender| but authenticates the resulting 258*8fb009dcSAndroid Build Coastguard Worker // context with |key|. 259*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_auth_sender( 260*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc, 261*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 262*8fb009dcSAndroid Build Coastguard Worker const uint8_t *peer_public_key, size_t peer_public_key_len, 263*8fb009dcSAndroid Build Coastguard Worker const uint8_t *info, size_t info_len); 264*8fb009dcSAndroid Build Coastguard Worker 265*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_auth_sender_with_seed_for_testing behaves like 266*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_setup_auth_sender|, but takes a seed to behave 267*8fb009dcSAndroid Build Coastguard Worker // deterministically. The seed's format depends on |kem|. For X25519, it is the 268*8fb009dcSAndroid Build Coastguard Worker // sender's ephemeral private key. 269*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_auth_sender_with_seed_for_testing( 270*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc, 271*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 272*8fb009dcSAndroid Build Coastguard Worker const uint8_t *peer_public_key, size_t peer_public_key_len, 273*8fb009dcSAndroid Build Coastguard Worker const uint8_t *info, size_t info_len, const uint8_t *seed, size_t seed_len); 274*8fb009dcSAndroid Build Coastguard Worker 275*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_setup_auth_recipient implements the SetupAuthR HPKE operation. 276*8fb009dcSAndroid Build Coastguard Worker // It behaves like |EVP_HPKE_CTX_setup_recipient| but checks the resulting 277*8fb009dcSAndroid Build Coastguard Worker // context was authenticated with |peer_public_key|. 278*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_setup_auth_recipient( 279*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX *ctx, const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, 280*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_AEAD *aead, const uint8_t *enc, size_t enc_len, 281*8fb009dcSAndroid Build Coastguard Worker const uint8_t *info, size_t info_len, const uint8_t *peer_public_key, 282*8fb009dcSAndroid Build Coastguard Worker size_t peer_public_key_len); 283*8fb009dcSAndroid Build Coastguard Worker 284*8fb009dcSAndroid Build Coastguard Worker 285*8fb009dcSAndroid Build Coastguard Worker // Using an HPKE context. 286*8fb009dcSAndroid Build Coastguard Worker // 287*8fb009dcSAndroid Build Coastguard Worker // Once set up, callers may encrypt or decrypt with an |EVP_HPKE_CTX| using the 288*8fb009dcSAndroid Build Coastguard Worker // following functions. 289*8fb009dcSAndroid Build Coastguard Worker 290*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_open uses the HPKE context |ctx| to authenticate |in_len| bytes 291*8fb009dcSAndroid Build Coastguard Worker // from |in| and |ad_len| bytes from |ad| and to decrypt at most |in_len| bytes 292*8fb009dcSAndroid Build Coastguard Worker // into |out|. It returns one on success, and zero otherwise. 293*8fb009dcSAndroid Build Coastguard Worker // 294*8fb009dcSAndroid Build Coastguard Worker // This operation will fail if the |ctx| context is not set up as a receiver. 295*8fb009dcSAndroid Build Coastguard Worker // 296*8fb009dcSAndroid Build Coastguard Worker // Note that HPKE encryption is stateful and ordered. The sender's first call to 297*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_seal| must correspond to the recipient's first call to 298*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_open|, etc. 299*8fb009dcSAndroid Build Coastguard Worker // 300*8fb009dcSAndroid Build Coastguard Worker // At most |in_len| bytes are written to |out|. In order to ensure success, 301*8fb009dcSAndroid Build Coastguard Worker // |max_out_len| should be at least |in_len|. On successful return, |*out_len| 302*8fb009dcSAndroid Build Coastguard Worker // is set to the actual number of bytes written. 303*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_open(EVP_HPKE_CTX *ctx, uint8_t *out, 304*8fb009dcSAndroid Build Coastguard Worker size_t *out_len, size_t max_out_len, 305*8fb009dcSAndroid Build Coastguard Worker const uint8_t *in, size_t in_len, 306*8fb009dcSAndroid Build Coastguard Worker const uint8_t *ad, size_t ad_len); 307*8fb009dcSAndroid Build Coastguard Worker 308*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_seal uses the HPKE context |ctx| to encrypt and authenticate 309*8fb009dcSAndroid Build Coastguard Worker // |in_len| bytes of ciphertext |in| and authenticate |ad_len| bytes from |ad|, 310*8fb009dcSAndroid Build Coastguard Worker // writing the result to |out|. It returns one on success and zero otherwise. 311*8fb009dcSAndroid Build Coastguard Worker // 312*8fb009dcSAndroid Build Coastguard Worker // This operation will fail if the |ctx| context is not set up as a sender. 313*8fb009dcSAndroid Build Coastguard Worker // 314*8fb009dcSAndroid Build Coastguard Worker // Note that HPKE encryption is stateful and ordered. The sender's first call to 315*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_seal| must correspond to the recipient's first call to 316*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_open|, etc. 317*8fb009dcSAndroid Build Coastguard Worker // 318*8fb009dcSAndroid Build Coastguard Worker // At most, |max_out_len| encrypted bytes are written to |out|. On successful 319*8fb009dcSAndroid Build Coastguard Worker // return, |*out_len| is set to the actual number of bytes written. 320*8fb009dcSAndroid Build Coastguard Worker // 321*8fb009dcSAndroid Build Coastguard Worker // To ensure success, |max_out_len| should be |in_len| plus the result of 322*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_max_overhead| or |EVP_HPKE_MAX_OVERHEAD|. 323*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_seal(EVP_HPKE_CTX *ctx, uint8_t *out, 324*8fb009dcSAndroid Build Coastguard Worker size_t *out_len, size_t max_out_len, 325*8fb009dcSAndroid Build Coastguard Worker const uint8_t *in, size_t in_len, 326*8fb009dcSAndroid Build Coastguard Worker const uint8_t *ad, size_t ad_len); 327*8fb009dcSAndroid Build Coastguard Worker 328*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_export uses the HPKE context |ctx| to export a secret of 329*8fb009dcSAndroid Build Coastguard Worker // |secret_len| bytes into |out|. This function uses |context_len| bytes from 330*8fb009dcSAndroid Build Coastguard Worker // |context| as a context string for the secret. This is necessary to separate 331*8fb009dcSAndroid Build Coastguard Worker // different uses of exported secrets and bind relevant caller-specific context 332*8fb009dcSAndroid Build Coastguard Worker // into the output. It returns one on success and zero otherwise. 333*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT int EVP_HPKE_CTX_export(const EVP_HPKE_CTX *ctx, uint8_t *out, 334*8fb009dcSAndroid Build Coastguard Worker size_t secret_len, 335*8fb009dcSAndroid Build Coastguard Worker const uint8_t *context, 336*8fb009dcSAndroid Build Coastguard Worker size_t context_len); 337*8fb009dcSAndroid Build Coastguard Worker 338*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_MAX_OVERHEAD contains the largest value that 339*8fb009dcSAndroid Build Coastguard Worker // |EVP_HPKE_CTX_max_overhead| would ever return for any context. 340*8fb009dcSAndroid Build Coastguard Worker #define EVP_HPKE_MAX_OVERHEAD EVP_AEAD_MAX_OVERHEAD 341*8fb009dcSAndroid Build Coastguard Worker 342*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_max_overhead returns the maximum number of additional bytes 343*8fb009dcSAndroid Build Coastguard Worker // added by sealing data with |EVP_HPKE_CTX_seal|. The |ctx| context must be set 344*8fb009dcSAndroid Build Coastguard Worker // up as a sender. 345*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT size_t EVP_HPKE_CTX_max_overhead(const EVP_HPKE_CTX *ctx); 346*8fb009dcSAndroid Build Coastguard Worker 347*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_kem returns |ctx|'s configured KEM, or NULL if the context has 348*8fb009dcSAndroid Build Coastguard Worker // not been set up. 349*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KEM *EVP_HPKE_CTX_kem(const EVP_HPKE_CTX *ctx); 350*8fb009dcSAndroid Build Coastguard Worker 351*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_aead returns |ctx|'s configured AEAD, or NULL if the context has 352*8fb009dcSAndroid Build Coastguard Worker // not been set up. 353*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_AEAD *EVP_HPKE_CTX_aead(const EVP_HPKE_CTX *ctx); 354*8fb009dcSAndroid Build Coastguard Worker 355*8fb009dcSAndroid Build Coastguard Worker // EVP_HPKE_CTX_kdf returns |ctx|'s configured KDF, or NULL if the context has 356*8fb009dcSAndroid Build Coastguard Worker // not been set up. 357*8fb009dcSAndroid Build Coastguard Worker OPENSSL_EXPORT const EVP_HPKE_KDF *EVP_HPKE_CTX_kdf(const EVP_HPKE_CTX *ctx); 358*8fb009dcSAndroid Build Coastguard Worker 359*8fb009dcSAndroid Build Coastguard Worker 360*8fb009dcSAndroid Build Coastguard Worker // Private structures. 361*8fb009dcSAndroid Build Coastguard Worker // 362*8fb009dcSAndroid Build Coastguard Worker // The following structures are exported so their types are stack-allocatable, 363*8fb009dcSAndroid Build Coastguard Worker // but accessing or modifying their fields is forbidden. 364*8fb009dcSAndroid Build Coastguard Worker 365*8fb009dcSAndroid Build Coastguard Worker struct evp_hpke_ctx_st { 366*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEM *kem; 367*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_AEAD *aead; 368*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KDF *kdf; 369*8fb009dcSAndroid Build Coastguard Worker EVP_AEAD_CTX aead_ctx; 370*8fb009dcSAndroid Build Coastguard Worker uint8_t base_nonce[EVP_AEAD_MAX_NONCE_LENGTH]; 371*8fb009dcSAndroid Build Coastguard Worker uint8_t exporter_secret[EVP_MAX_MD_SIZE]; 372*8fb009dcSAndroid Build Coastguard Worker uint64_t seq; 373*8fb009dcSAndroid Build Coastguard Worker int is_sender; 374*8fb009dcSAndroid Build Coastguard Worker }; 375*8fb009dcSAndroid Build Coastguard Worker 376*8fb009dcSAndroid Build Coastguard Worker struct evp_hpke_key_st { 377*8fb009dcSAndroid Build Coastguard Worker const EVP_HPKE_KEM *kem; 378*8fb009dcSAndroid Build Coastguard Worker uint8_t private_key[X25519_PRIVATE_KEY_LEN]; 379*8fb009dcSAndroid Build Coastguard Worker uint8_t public_key[X25519_PUBLIC_VALUE_LEN]; 380*8fb009dcSAndroid Build Coastguard Worker }; 381*8fb009dcSAndroid Build Coastguard Worker 382*8fb009dcSAndroid Build Coastguard Worker 383*8fb009dcSAndroid Build Coastguard Worker #if defined(__cplusplus) 384*8fb009dcSAndroid Build Coastguard Worker } // extern C 385*8fb009dcSAndroid Build Coastguard Worker #endif 386*8fb009dcSAndroid Build Coastguard Worker 387*8fb009dcSAndroid Build Coastguard Worker #if !defined(BORINGSSL_NO_CXX) 388*8fb009dcSAndroid Build Coastguard Worker extern "C++" { 389*8fb009dcSAndroid Build Coastguard Worker 390*8fb009dcSAndroid Build Coastguard Worker BSSL_NAMESPACE_BEGIN 391*8fb009dcSAndroid Build Coastguard Worker 392*8fb009dcSAndroid Build Coastguard Worker using ScopedEVP_HPKE_CTX = 393*8fb009dcSAndroid Build Coastguard Worker internal::StackAllocated<EVP_HPKE_CTX, void, EVP_HPKE_CTX_zero, 394*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_CTX_cleanup>; 395*8fb009dcSAndroid Build Coastguard Worker using ScopedEVP_HPKE_KEY = 396*8fb009dcSAndroid Build Coastguard Worker internal::StackAllocatedMovable<EVP_HPKE_KEY, void, EVP_HPKE_KEY_zero, 397*8fb009dcSAndroid Build Coastguard Worker EVP_HPKE_KEY_cleanup, EVP_HPKE_KEY_move>; 398*8fb009dcSAndroid Build Coastguard Worker 399*8fb009dcSAndroid Build Coastguard Worker BORINGSSL_MAKE_DELETER(EVP_HPKE_CTX, EVP_HPKE_CTX_free) 400*8fb009dcSAndroid Build Coastguard Worker BORINGSSL_MAKE_DELETER(EVP_HPKE_KEY, EVP_HPKE_KEY_free) 401*8fb009dcSAndroid Build Coastguard Worker 402*8fb009dcSAndroid Build Coastguard Worker BSSL_NAMESPACE_END 403*8fb009dcSAndroid Build Coastguard Worker 404*8fb009dcSAndroid Build Coastguard Worker } // extern C++ 405*8fb009dcSAndroid Build Coastguard Worker #endif 406*8fb009dcSAndroid Build Coastguard Worker 407*8fb009dcSAndroid Build Coastguard Worker #endif // OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H 408