1*e7b1675dSTing-Kang Chang// Copyright 2022 Google LLC 2*e7b1675dSTing-Kang Chang// 3*e7b1675dSTing-Kang Chang// Licensed under the Apache License, Version 2.0 (the "License"); 4*e7b1675dSTing-Kang Chang// you may not use this file except in compliance with the License. 5*e7b1675dSTing-Kang Chang// You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang// 7*e7b1675dSTing-Kang Chang// http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang// 9*e7b1675dSTing-Kang Chang// Unless required by applicable law or agreed to in writing, software 10*e7b1675dSTing-Kang Chang// distributed under the License is distributed on an "AS IS" BASIS, 11*e7b1675dSTing-Kang Chang// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12*e7b1675dSTing-Kang Chang// See the License for the specific language governing permissions and 13*e7b1675dSTing-Kang Chang// limitations under the License. 14*e7b1675dSTing-Kang Chang// 15*e7b1675dSTing-Kang Chang//////////////////////////////////////////////////////////////////////////////// 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Changpackage hpke 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang// aead is a package-internal interface for the Hybrid Public Key Encryption 20*e7b1675dSTing-Kang Chang// (HPKE) authenticated encryption with associated data (AEAD). 21*e7b1675dSTing-Kang Chang// 22*e7b1675dSTing-Kang Chang// The HPKE RFC is available at 23*e7b1675dSTing-Kang Chang// https://www.rfc-editor.org/rfc/rfc9180.html. 24*e7b1675dSTing-Kang Changtype aead interface { 25*e7b1675dSTing-Kang Chang // seal performs authenticated encryption of plaintext and associatedData 26*e7b1675dSTing-Kang Chang // using key and nonce. 27*e7b1675dSTing-Kang Chang // 28*e7b1675dSTing-Kang Chang // https://www.rfc-editor.org/rfc/rfc9180.html#section-5.2 29*e7b1675dSTing-Kang Chang seal(key, nonce, plaintext, associatedData []byte) ([]byte, error) 30*e7b1675dSTing-Kang Chang 31*e7b1675dSTing-Kang Chang // open performs authenticated decryption of ciphertext and associatedData 32*e7b1675dSTing-Kang Chang // using key and nonce. 33*e7b1675dSTing-Kang Chang // 34*e7b1675dSTing-Kang Chang // https://www.rfc-editor.org/rfc/rfc9180.html#section-5.2 35*e7b1675dSTing-Kang Chang open(key, nonce, ciphertext, associatedData []byte) ([]byte, error) 36*e7b1675dSTing-Kang Chang 37*e7b1675dSTing-Kang Chang // id returns the HPKE AEAD algorithm identifier for the underlying AEAD 38*e7b1675dSTing-Kang Chang // implementation. 39*e7b1675dSTing-Kang Chang // 40*e7b1675dSTing-Kang Chang // https://www.rfc-editor.org/rfc/rfc9180.html#section-7.3 41*e7b1675dSTing-Kang Chang id() uint16 42*e7b1675dSTing-Kang Chang 43*e7b1675dSTing-Kang Chang // keyLength returns the length of the key. 44*e7b1675dSTing-Kang Chang keyLength() int 45*e7b1675dSTing-Kang Chang 46*e7b1675dSTing-Kang Chang // nonceLength returns the length of the nonce. 47*e7b1675dSTing-Kang Chang nonceLength() int 48*e7b1675dSTing-Kang Chang} 49