xref: /aosp_15_r20/external/tink/cc/hybrid/internal/hpke_context.cc (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang // Copyright 2022 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang //     http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang 
17*e7b1675dSTing-Kang Chang #include "tink/hybrid/internal/hpke_context.h"
18*e7b1675dSTing-Kang Chang 
19*e7b1675dSTing-Kang Chang #include <memory>
20*e7b1675dSTing-Kang Chang #include <string>
21*e7b1675dSTing-Kang Chang #include <utility>
22*e7b1675dSTing-Kang Chang 
23*e7b1675dSTing-Kang Chang #include "absl/status/status.h"
24*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h"
25*e7b1675dSTing-Kang Chang #include "tink/hybrid/internal/hpke_context_boringssl.h"
26*e7b1675dSTing-Kang Chang #include "tink/util/secret_data.h"
27*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
28*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
29*e7b1675dSTing-Kang Chang 
30*e7b1675dSTing-Kang Chang namespace crypto {
31*e7b1675dSTing-Kang Chang namespace tink {
32*e7b1675dSTing-Kang Chang namespace internal {
33*e7b1675dSTing-Kang Chang 
34*e7b1675dSTing-Kang Chang constexpr int kX25519KemEncodingLengthInBytes = 32;
35*e7b1675dSTing-Kang Chang 
ConcatenatePayload(absl::string_view encapsulated_key,absl::string_view ciphertext)36*e7b1675dSTing-Kang Chang std::string ConcatenatePayload(absl::string_view encapsulated_key,
37*e7b1675dSTing-Kang Chang                                absl::string_view ciphertext) {
38*e7b1675dSTing-Kang Chang   return absl::StrCat(encapsulated_key, ciphertext);
39*e7b1675dSTing-Kang Chang }
40*e7b1675dSTing-Kang Chang 
SplitPayload(const HpkeKem & kem,absl::string_view payload)41*e7b1675dSTing-Kang Chang util::StatusOr<HpkePayloadView> SplitPayload(const HpkeKem& kem,
42*e7b1675dSTing-Kang Chang                                              absl::string_view payload) {
43*e7b1675dSTing-Kang Chang   if (kem == HpkeKem::kX25519HkdfSha256) {
44*e7b1675dSTing-Kang Chang     return HpkePayloadView(payload.substr(0, kX25519KemEncodingLengthInBytes),
45*e7b1675dSTing-Kang Chang                            payload.substr(kX25519KemEncodingLengthInBytes));
46*e7b1675dSTing-Kang Chang   }
47*e7b1675dSTing-Kang Chang   return util::Status(
48*e7b1675dSTing-Kang Chang       absl::StatusCode::kInvalidArgument,
49*e7b1675dSTing-Kang Chang       absl::StrCat("Unable to split HPKE payload for KEM type ", kem));
50*e7b1675dSTing-Kang Chang }
51*e7b1675dSTing-Kang Chang 
SetupSender(const HpkeParams & params,absl::string_view recipient_public_key,absl::string_view info)52*e7b1675dSTing-Kang Chang util::StatusOr<std::unique_ptr<HpkeContext>> HpkeContext::SetupSender(
53*e7b1675dSTing-Kang Chang     const HpkeParams& params, absl::string_view recipient_public_key,
54*e7b1675dSTing-Kang Chang     absl::string_view info) {
55*e7b1675dSTing-Kang Chang   if (recipient_public_key.empty()) {
56*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInvalidArgument,
57*e7b1675dSTing-Kang Chang                         "Recipient public key is empty.");
58*e7b1675dSTing-Kang Chang   }
59*e7b1675dSTing-Kang Chang   util::StatusOr<SenderHpkeContextBoringSsl> sender_context =
60*e7b1675dSTing-Kang Chang       HpkeContextBoringSsl::SetupSender(params, recipient_public_key, info);
61*e7b1675dSTing-Kang Chang   if (!sender_context.ok()) {
62*e7b1675dSTing-Kang Chang     return sender_context.status();
63*e7b1675dSTing-Kang Chang   }
64*e7b1675dSTing-Kang Chang   return {absl::WrapUnique(new HpkeContext(
65*e7b1675dSTing-Kang Chang       sender_context->encapsulated_key, std::move(sender_context->context)))};
66*e7b1675dSTing-Kang Chang }
67*e7b1675dSTing-Kang Chang 
SetupRecipient(const HpkeParams & params,const util::SecretData & recipient_private_key,absl::string_view encapsulated_key,absl::string_view info)68*e7b1675dSTing-Kang Chang util::StatusOr<std::unique_ptr<HpkeContext>> HpkeContext::SetupRecipient(
69*e7b1675dSTing-Kang Chang     const HpkeParams& params, const util::SecretData& recipient_private_key,
70*e7b1675dSTing-Kang Chang     absl::string_view encapsulated_key, absl::string_view info) {
71*e7b1675dSTing-Kang Chang   if (recipient_private_key.empty()) {
72*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInvalidArgument,
73*e7b1675dSTing-Kang Chang                         "Recipient private key is empty.");
74*e7b1675dSTing-Kang Chang   }
75*e7b1675dSTing-Kang Chang   if (encapsulated_key.empty()) {
76*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInvalidArgument,
77*e7b1675dSTing-Kang Chang                         "Encapsulated key is empty.");
78*e7b1675dSTing-Kang Chang   }
79*e7b1675dSTing-Kang Chang   util::StatusOr<std::unique_ptr<HpkeContextBoringSsl>> context =
80*e7b1675dSTing-Kang Chang       HpkeContextBoringSsl::SetupRecipient(params, recipient_private_key,
81*e7b1675dSTing-Kang Chang                                            encapsulated_key, info);
82*e7b1675dSTing-Kang Chang   if (!context.ok()) {
83*e7b1675dSTing-Kang Chang     return context.status();
84*e7b1675dSTing-Kang Chang   }
85*e7b1675dSTing-Kang Chang   return {absl::WrapUnique(
86*e7b1675dSTing-Kang Chang       new HpkeContext(encapsulated_key, *std::move(context)))};
87*e7b1675dSTing-Kang Chang }
88*e7b1675dSTing-Kang Chang 
89*e7b1675dSTing-Kang Chang }  // namespace internal
90*e7b1675dSTing-Kang Chang }  // namespace tink
91*e7b1675dSTing-Kang Chang }  // namespace crypto
92