xref: /aosp_15_r20/external/tink/go/hybrid/internal/hpke/aead.go (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang// Copyright 2022 Google LLC
2*e7b1675dSTing-Kang Chang//
3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang//
7*e7b1675dSTing-Kang Chang//      http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang//
9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang// limitations under the License.
14*e7b1675dSTing-Kang Chang//
15*e7b1675dSTing-Kang Chang////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Changpackage hpke
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang// aead is a package-internal interface for the Hybrid Public Key Encryption
20*e7b1675dSTing-Kang Chang// (HPKE) authenticated encryption with associated data (AEAD).
21*e7b1675dSTing-Kang Chang//
22*e7b1675dSTing-Kang Chang// The HPKE RFC is available at
23*e7b1675dSTing-Kang Chang// https://www.rfc-editor.org/rfc/rfc9180.html.
24*e7b1675dSTing-Kang Changtype aead interface {
25*e7b1675dSTing-Kang Chang	// seal performs authenticated encryption of plaintext and associatedData
26*e7b1675dSTing-Kang Chang	// using key and nonce.
27*e7b1675dSTing-Kang Chang	//
28*e7b1675dSTing-Kang Chang	// https://www.rfc-editor.org/rfc/rfc9180.html#section-5.2
29*e7b1675dSTing-Kang Chang	seal(key, nonce, plaintext, associatedData []byte) ([]byte, error)
30*e7b1675dSTing-Kang Chang
31*e7b1675dSTing-Kang Chang	// open performs authenticated decryption of ciphertext and associatedData
32*e7b1675dSTing-Kang Chang	// using key and nonce.
33*e7b1675dSTing-Kang Chang	//
34*e7b1675dSTing-Kang Chang	// https://www.rfc-editor.org/rfc/rfc9180.html#section-5.2
35*e7b1675dSTing-Kang Chang	open(key, nonce, ciphertext, associatedData []byte) ([]byte, error)
36*e7b1675dSTing-Kang Chang
37*e7b1675dSTing-Kang Chang	// id returns the HPKE AEAD algorithm identifier for the underlying AEAD
38*e7b1675dSTing-Kang Chang	// implementation.
39*e7b1675dSTing-Kang Chang	//
40*e7b1675dSTing-Kang Chang	// https://www.rfc-editor.org/rfc/rfc9180.html#section-7.3
41*e7b1675dSTing-Kang Chang	id() uint16
42*e7b1675dSTing-Kang Chang
43*e7b1675dSTing-Kang Chang	// keyLength returns the length of the key.
44*e7b1675dSTing-Kang Chang	keyLength() int
45*e7b1675dSTing-Kang Chang
46*e7b1675dSTing-Kang Chang	// nonceLength returns the length of the nonce.
47*e7b1675dSTing-Kang Chang	nonceLength() int
48*e7b1675dSTing-Kang Chang}
49