1*e7b1675dSTing-Kang Chang // Copyright 2022 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #include "tink/hybrid/internal/hpke_util.h"
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang #include "absl/strings/str_cat.h"
20*e7b1675dSTing-Kang Chang #include "tink/internal/ec_util.h"
21*e7b1675dSTing-Kang Chang #include "tink/subtle/common_enums.h"
22*e7b1675dSTing-Kang Chang #include "proto/hpke.pb.h"
23*e7b1675dSTing-Kang Chang
24*e7b1675dSTing-Kang Chang namespace crypto {
25*e7b1675dSTing-Kang Chang namespace tink {
26*e7b1675dSTing-Kang Chang namespace internal {
27*e7b1675dSTing-Kang Chang namespace {
28*e7b1675dSTing-Kang Chang
HpkeKemProtoToEnum(google::crypto::tink::HpkeKem kem)29*e7b1675dSTing-Kang Chang util::StatusOr<HpkeKem> HpkeKemProtoToEnum(google::crypto::tink::HpkeKem kem) {
30*e7b1675dSTing-Kang Chang switch (kem) {
31*e7b1675dSTing-Kang Chang case google::crypto::tink::HpkeKem::DHKEM_X25519_HKDF_SHA256:
32*e7b1675dSTing-Kang Chang return HpkeKem::kX25519HkdfSha256;
33*e7b1675dSTing-Kang Chang default:
34*e7b1675dSTing-Kang Chang return util::Status(
35*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
36*e7b1675dSTing-Kang Chang absl::StrCat("Unable to convert unsupported HPKE KEM: ", kem));
37*e7b1675dSTing-Kang Chang }
38*e7b1675dSTing-Kang Chang }
39*e7b1675dSTing-Kang Chang
HpkeKdfProtoToEnum(google::crypto::tink::HpkeKdf kdf)40*e7b1675dSTing-Kang Chang util::StatusOr<HpkeKdf> HpkeKdfProtoToEnum(google::crypto::tink::HpkeKdf kdf) {
41*e7b1675dSTing-Kang Chang switch (kdf) {
42*e7b1675dSTing-Kang Chang case google::crypto::tink::HpkeKdf::HKDF_SHA256:
43*e7b1675dSTing-Kang Chang return HpkeKdf::kHkdfSha256;
44*e7b1675dSTing-Kang Chang default:
45*e7b1675dSTing-Kang Chang return util::Status(
46*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
47*e7b1675dSTing-Kang Chang absl::StrCat("Unable to convert unsupported HPKE KDF: ", kdf));
48*e7b1675dSTing-Kang Chang }
49*e7b1675dSTing-Kang Chang }
50*e7b1675dSTing-Kang Chang
HpkeAeadProtoToEnum(google::crypto::tink::HpkeAead aead)51*e7b1675dSTing-Kang Chang util::StatusOr<HpkeAead> HpkeAeadProtoToEnum(
52*e7b1675dSTing-Kang Chang google::crypto::tink::HpkeAead aead) {
53*e7b1675dSTing-Kang Chang switch (aead) {
54*e7b1675dSTing-Kang Chang case google::crypto::tink::HpkeAead::AES_128_GCM:
55*e7b1675dSTing-Kang Chang return HpkeAead::kAes128Gcm;
56*e7b1675dSTing-Kang Chang case google::crypto::tink::HpkeAead::AES_256_GCM:
57*e7b1675dSTing-Kang Chang return HpkeAead::kAes256Gcm;
58*e7b1675dSTing-Kang Chang case google::crypto::tink::HpkeAead::CHACHA20_POLY1305:
59*e7b1675dSTing-Kang Chang return HpkeAead::kChaCha20Poly1305;
60*e7b1675dSTing-Kang Chang default:
61*e7b1675dSTing-Kang Chang return util::Status(
62*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
63*e7b1675dSTing-Kang Chang absl::StrCat("Unable to convert unsupported HPKE AEAD: ", aead));
64*e7b1675dSTing-Kang Chang }
65*e7b1675dSTing-Kang Chang }
66*e7b1675dSTing-Kang Chang
67*e7b1675dSTing-Kang Chang } // namespace
68*e7b1675dSTing-Kang Chang
HpkeParamsProtoToStruct(google::crypto::tink::HpkeParams params)69*e7b1675dSTing-Kang Chang util::StatusOr<HpkeParams> HpkeParamsProtoToStruct(
70*e7b1675dSTing-Kang Chang google::crypto::tink::HpkeParams params) {
71*e7b1675dSTing-Kang Chang util::StatusOr<HpkeKem> kem = HpkeKemProtoToEnum(params.kem());
72*e7b1675dSTing-Kang Chang if (!kem.ok()) return kem.status();
73*e7b1675dSTing-Kang Chang util::StatusOr<HpkeKdf> kdf = HpkeKdfProtoToEnum(params.kdf());
74*e7b1675dSTing-Kang Chang if (!kdf.ok()) return kdf.status();
75*e7b1675dSTing-Kang Chang util::StatusOr<HpkeAead> aead = HpkeAeadProtoToEnum(params.aead());
76*e7b1675dSTing-Kang Chang if (!aead.ok()) return aead.status();
77*e7b1675dSTing-Kang Chang return HpkeParams{*kem, *kdf, *aead};
78*e7b1675dSTing-Kang Chang }
79*e7b1675dSTing-Kang Chang
HpkeEncapsulatedKeyLength(google::crypto::tink::HpkeKem kem)80*e7b1675dSTing-Kang Chang util::StatusOr<int32_t> HpkeEncapsulatedKeyLength(
81*e7b1675dSTing-Kang Chang google::crypto::tink::HpkeKem kem) {
82*e7b1675dSTing-Kang Chang switch (kem) {
83*e7b1675dSTing-Kang Chang case google::crypto::tink::HpkeKem::DHKEM_X25519_HKDF_SHA256:
84*e7b1675dSTing-Kang Chang return internal::EcPointEncodingSizeInBytes(
85*e7b1675dSTing-Kang Chang subtle::EllipticCurveType::CURVE25519,
86*e7b1675dSTing-Kang Chang subtle::EcPointFormat::UNCOMPRESSED);
87*e7b1675dSTing-Kang Chang default:
88*e7b1675dSTing-Kang Chang return util::Status(
89*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
90*e7b1675dSTing-Kang Chang absl::StrCat("Unable to determine KEM-encoding length for ", kem));
91*e7b1675dSTing-Kang Chang }
92*e7b1675dSTing-Kang Chang }
93*e7b1675dSTing-Kang Chang
94*e7b1675dSTing-Kang Chang } // namespace internal
95*e7b1675dSTing-Kang Chang } // namespace tink
96*e7b1675dSTing-Kang Chang } // namespace crypto
97