Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 1 | /* Copyright (c) 2020, Google Inc. |
| 2 | * |
| 3 | * Permission to use, copy, modify, and/or distribute this software for any |
| 4 | * purpose with or without fee is hereby granted, provided that the above |
| 5 | * copyright notice and this permission notice appear in all copies. |
| 6 | * |
| 7 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| 8 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| 10 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| 12 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| 13 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
| 14 | |
| 15 | #ifndef OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H |
| 16 | #define OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H |
| 17 | |
| 18 | #include <openssl/aead.h> |
| 19 | #include <openssl/base.h> |
| 20 | #include <openssl/curve25519.h> |
| 21 | |
| 22 | #if defined(__cplusplus) |
| 23 | extern "C" { |
| 24 | #endif |
| 25 | |
| 26 | |
| 27 | // Hybrid Public Key Encryption. |
| 28 | // |
| 29 | // Hybrid Public Key Encryption (HPKE) enables a sender to encrypt messages to a |
Daniel McArdle | bc24805 | 2020-08-25 17:32:22 -0400 | [diff] [blame] | 30 | // receiver with a public key. Optionally, the sender may authenticate its |
| 31 | // possession of a pre-shared key to the recipient. |
Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 32 | // |
Daniel McArdle | bc24805 | 2020-08-25 17:32:22 -0400 | [diff] [blame] | 33 | // See https://tools.ietf.org/html/draft-irtf-cfrg-hpke-05. |
Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 34 | |
| 35 | // EVP_HPKE_AEAD_* are AEAD identifiers. |
| 36 | #define EVP_HPKE_AEAD_AES_GCM_128 0x0001 |
| 37 | #define EVP_HPKE_AEAD_AES_GCM_256 0x0002 |
| 38 | #define EVP_HPKE_AEAD_CHACHA20POLY1305 0x0003 |
| 39 | |
| 40 | // EVP_HPKE_HKDF_* are HKDF identifiers. |
| 41 | #define EVP_HPKE_HKDF_SHA256 0x0001 |
| 42 | #define EVP_HPKE_HKDF_SHA384 0x0002 |
| 43 | #define EVP_HPKE_HKDF_SHA512 0x0003 |
| 44 | |
| 45 | // EVP_HPKE_MAX_OVERHEAD contains the largest value that |
| 46 | // |EVP_HPKE_CTX_max_overhead| would ever return for any context. |
| 47 | #define EVP_HPKE_MAX_OVERHEAD EVP_AEAD_MAX_OVERHEAD |
| 48 | |
| 49 | |
| 50 | // Encryption contexts. |
| 51 | |
| 52 | // An |EVP_HPKE_CTX| is an HPKE encryption context. |
| 53 | typedef struct evp_hpke_ctx_st { |
| 54 | const EVP_MD *hkdf_md; |
| 55 | EVP_AEAD_CTX aead_ctx; |
| 56 | uint16_t kdf_id; |
| 57 | uint16_t aead_id; |
| 58 | uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; |
| 59 | uint8_t exporter_secret[EVP_MAX_MD_SIZE]; |
| 60 | uint64_t seq; |
| 61 | int is_sender; |
| 62 | } EVP_HPKE_CTX; |
| 63 | |
| 64 | // EVP_HPKE_CTX_init initializes an already-allocated |EVP_HPKE_CTX|. The caller |
| 65 | // should then use one of the |EVP_HPKE_CTX_setup_*| functions. |
| 66 | // |
| 67 | // It is safe, but not necessary to call |EVP_HPKE_CTX_cleanup| in this state. |
| 68 | OPENSSL_EXPORT void EVP_HPKE_CTX_init(EVP_HPKE_CTX *ctx); |
| 69 | |
| 70 | // EVP_HPKE_CTX_cleanup releases memory referenced by |ctx|. |ctx| must have |
| 71 | // been initialized with |EVP_HPKE_CTX_init|. |
| 72 | OPENSSL_EXPORT void EVP_HPKE_CTX_cleanup(EVP_HPKE_CTX *ctx); |
| 73 | |
| 74 | |
| 75 | // Setting up HPKE contexts. |
| 76 | // |
| 77 | // In each of the following functions, |hpke| must have been initialized with |
| 78 | // |EVP_HPKE_CTX_init|. |kdf_id| selects the KDF for non-KEM HPKE operations and |
| 79 | // must be one of the |EVP_HPKE_HKDF_*| constants. |aead_id| selects the AEAD |
| 80 | // for the "open" and "seal" operations and must be one of the |EVP_HPKE_AEAD_*" |
| 81 | // constants." |
Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 82 | |
| 83 | // EVP_HPKE_CTX_setup_base_s_x25519 sets up |hpke| as a sender context that can |
| 84 | // encrypt for the private key corresponding to |peer_public_value| (the |
| 85 | // recipient's public key). It returns one on success, and zero otherwise. Note |
Daniel McArdle | bc24805 | 2020-08-25 17:32:22 -0400 | [diff] [blame] | 86 | // that this function will fail if |peer_public_value| is invalid. |
Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 87 | // |
| 88 | // This function writes the encapsulated shared secret to |out_enc|. |
| 89 | OPENSSL_EXPORT int EVP_HPKE_CTX_setup_base_s_x25519( |
| 90 | EVP_HPKE_CTX *hpke, uint8_t out_enc[X25519_PUBLIC_VALUE_LEN], |
| 91 | uint16_t kdf_id, uint16_t aead_id, |
| 92 | const uint8_t peer_public_value[X25519_PUBLIC_VALUE_LEN], |
| 93 | const uint8_t *info, size_t info_len); |
| 94 | |
| 95 | // EVP_HPKE_CTX_setup_base_s_x25519_for_test behaves like |
| 96 | // |EVP_HPKE_CTX_setup_base_s_x25519|, but takes a pre-generated ephemeral |
| 97 | // sender key. |
| 98 | OPENSSL_EXPORT int EVP_HPKE_CTX_setup_base_s_x25519_for_test( |
| 99 | EVP_HPKE_CTX *hpke, uint16_t kdf_id, uint16_t aead_id, |
| 100 | const uint8_t peer_public_value[X25519_PUBLIC_VALUE_LEN], |
| 101 | const uint8_t *info, size_t info_len, |
| 102 | const uint8_t ephemeral_private[X25519_PRIVATE_KEY_LEN], |
| 103 | const uint8_t ephemeral_public[X25519_PUBLIC_VALUE_LEN]); |
| 104 | |
| 105 | // EVP_HPKE_CTX_setup_base_r_x25519 sets up |hpke| as a recipient context that |
| 106 | // can decrypt messages. |private_key| is the recipient's private key, and |enc| |
| 107 | // is the encapsulated shared secret from the sender. Note that this function |
Daniel McArdle | bc24805 | 2020-08-25 17:32:22 -0400 | [diff] [blame] | 108 | // will fail if |enc| is invalid. |
Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 109 | OPENSSL_EXPORT int EVP_HPKE_CTX_setup_base_r_x25519( |
| 110 | EVP_HPKE_CTX *hpke, uint16_t kdf_id, uint16_t aead_id, |
| 111 | const uint8_t enc[X25519_PUBLIC_VALUE_LEN], |
| 112 | const uint8_t public_key[X25519_PUBLIC_VALUE_LEN], |
| 113 | const uint8_t private_key[X25519_PRIVATE_KEY_LEN], const uint8_t *info, |
| 114 | size_t info_len); |
| 115 | |
Daniel McArdle | bc24805 | 2020-08-25 17:32:22 -0400 | [diff] [blame] | 116 | // EVP_HPKE_CTX_setup_psk_s_x25519 sets up |hpke| as a sender context that can |
| 117 | // encrypt for the private key corresponding to |peer_public_value| (the |
| 118 | // recipient's public key) and authenticate its possession of a PSK. It returns |
| 119 | // one on success, and zero otherwise. Note that this function will fail if |
| 120 | // |peer_public_value| is invalid. |
| 121 | // |
| 122 | // The PSK and its ID must be provided in |psk| and |psk_id|, respectively. Both |
| 123 | // must be nonempty (|psk_len| and |psk_id_len| must be non-zero), or this |
| 124 | // function will fail. |
| 125 | // |
| 126 | // This function writes the encapsulated shared secret to |out_enc|. |
| 127 | OPENSSL_EXPORT int EVP_HPKE_CTX_setup_psk_s_x25519( |
| 128 | EVP_HPKE_CTX *hpke, uint8_t out_enc[X25519_PUBLIC_VALUE_LEN], |
| 129 | uint16_t kdf_id, uint16_t aead_id, |
| 130 | const uint8_t peer_public_value[X25519_PUBLIC_VALUE_LEN], |
| 131 | const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, |
| 132 | const uint8_t *psk_id, size_t psk_id_len); |
| 133 | |
| 134 | // EVP_HPKE_CTX_setup_psk_s_x25519_for_test behaves like |
| 135 | // |EVP_HPKE_CTX_setup_psk_s_x25519|, but takes a pre-generated ephemeral sender |
| 136 | // key. |
| 137 | OPENSSL_EXPORT int EVP_HPKE_CTX_setup_psk_s_x25519_for_test( |
| 138 | EVP_HPKE_CTX *hpke, uint16_t kdf_id, uint16_t aead_id, |
| 139 | const uint8_t peer_public_value[X25519_PUBLIC_VALUE_LEN], |
| 140 | const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, |
| 141 | const uint8_t *psk_id, size_t psk_id_len, |
| 142 | const uint8_t ephemeral_private[X25519_PRIVATE_KEY_LEN], |
| 143 | const uint8_t ephemeral_public[X25519_PUBLIC_VALUE_LEN]); |
| 144 | |
| 145 | // EVP_HPKE_CTX_setup_psk_r_x25519 sets up |hpke| as a recipient context that |
| 146 | // can decrypt messages. Future open (decrypt) operations will fail if the |
| 147 | // sender does not possess the PSK indicated by |psk| and |psk_id|. |
| 148 | // |private_key| is the recipient's private key, and |enc| is the encapsulated |
| 149 | // shared secret from the sender. If |enc| is invalid, this function will fail. |
| 150 | // |
| 151 | // The PSK and its ID must be provided in |psk| and |psk_id|, respectively. Both |
| 152 | // must be nonempty (|psk_len| and |psk_id_len| must be non-zero), or this |
| 153 | // function will fail. |
| 154 | OPENSSL_EXPORT int EVP_HPKE_CTX_setup_psk_r_x25519( |
| 155 | EVP_HPKE_CTX *hpke, uint16_t kdf_id, uint16_t aead_id, |
| 156 | const uint8_t enc[X25519_PUBLIC_VALUE_LEN], |
| 157 | const uint8_t public_key[X25519_PUBLIC_VALUE_LEN], |
| 158 | const uint8_t private_key[X25519_PRIVATE_KEY_LEN], const uint8_t *info, |
| 159 | size_t info_len, const uint8_t *psk, size_t psk_len, const uint8_t *psk_id, |
| 160 | size_t psk_id_len); |
| 161 | |
Daniel McArdle | 8b601c8 | 2020-07-16 14:10:52 -0400 | [diff] [blame] | 162 | |
| 163 | // Using an HPKE context. |
| 164 | |
| 165 | // EVP_HPKE_CTX_open uses the HPKE context |hpke| to authenticate |in_len| bytes |
| 166 | // from |in| and |ad_len| bytes from |ad| and to decrypt at most |in_len| bytes |
| 167 | // into |out|. It returns one on success, and zero otherwise. |
| 168 | // |
| 169 | // This operation will fail if the |hpke| context is not set up as a receiver. |
| 170 | // |
| 171 | // Note that HPKE encryption is stateful and ordered. The sender's first call to |
| 172 | // |EVP_HPKE_CTX_seal| must correspond to the recipient's first call to |
| 173 | // |EVP_HPKE_CTX_open|, etc. |
| 174 | // |
| 175 | // At most |in_len| bytes are written to |out|. In order to ensure success, |
| 176 | // |max_out_len| should be at least |in_len|. On successful return, |*out_len| |
| 177 | // is set to the actual number of bytes written. |
| 178 | OPENSSL_EXPORT int EVP_HPKE_CTX_open(EVP_HPKE_CTX *hpke, uint8_t *out, |
| 179 | size_t *out_len, size_t max_out_len, |
| 180 | const uint8_t *in, size_t in_len, |
| 181 | const uint8_t *ad, size_t ad_len); |
| 182 | |
| 183 | // EVP_HPKE_CTX_seal uses the HPKE context |hpke| to encrypt and authenticate |
| 184 | // |in_len| bytes of ciphertext |in| and authenticate |ad_len| bytes from |ad|, |
| 185 | // writing the result to |out|. It returns one on success and zero otherwise. |
| 186 | // |
| 187 | // This operation will fail if the |hpke| context is not set up as a sender. |
| 188 | // |
| 189 | // Note that HPKE encryption is stateful and ordered. The sender's first call to |
| 190 | // |EVP_HPKE_CTX_seal| must correspond to the recipient's first call to |
| 191 | // |EVP_HPKE_CTX_open|, etc. |
| 192 | // |
| 193 | // At most, |max_out_len| encrypted bytes are written to |out|. On successful |
| 194 | // return, |*out_len| is set to the actual number of bytes written. |
| 195 | // |
| 196 | // To ensure success, |max_out_len| should be |in_len| plus the result of |
| 197 | // |EVP_HPKE_CTX_max_overhead| or |EVP_HPKE_MAX_OVERHEAD|. |
| 198 | OPENSSL_EXPORT int EVP_HPKE_CTX_seal(EVP_HPKE_CTX *hpke, uint8_t *out, |
| 199 | size_t *out_len, size_t max_out_len, |
| 200 | const uint8_t *in, size_t in_len, |
| 201 | const uint8_t *ad, size_t ad_len); |
| 202 | |
| 203 | // EVP_HPKE_CTX_export uses the HPKE context |hpke| to export a secret of |
| 204 | // |secret_len| bytes into |out|. This function uses |context_len| bytes from |
| 205 | // |context| as a context string for the secret. This is necessary to separate |
| 206 | // different uses of exported secrets and bind relevant caller-specific context |
| 207 | // into the output. It returns one on success and zero otherwise. |
| 208 | OPENSSL_EXPORT int EVP_HPKE_CTX_export(const EVP_HPKE_CTX *hpke, uint8_t *out, |
| 209 | size_t secret_len, |
| 210 | const uint8_t *context, |
| 211 | size_t context_len); |
| 212 | |
| 213 | // EVP_HPKE_CTX_max_overhead returns the maximum number of additional bytes |
| 214 | // added by sealing data with |EVP_HPKE_CTX_seal|. The |hpke| context must be |
| 215 | // set up as a sender. |
| 216 | OPENSSL_EXPORT size_t EVP_HPKE_CTX_max_overhead(const EVP_HPKE_CTX *hpke); |
| 217 | |
| 218 | |
| 219 | #if defined(__cplusplus) |
| 220 | } // extern C |
| 221 | #endif |
| 222 | |
| 223 | #if !defined(BORINGSSL_NO_CXX) |
| 224 | extern "C++" { |
| 225 | |
| 226 | BSSL_NAMESPACE_BEGIN |
| 227 | |
| 228 | using ScopedEVP_HPKE_CTX = |
| 229 | internal::StackAllocated<EVP_HPKE_CTX, void, EVP_HPKE_CTX_init, |
| 230 | EVP_HPKE_CTX_cleanup>; |
| 231 | |
| 232 | BSSL_NAMESPACE_END |
| 233 | |
| 234 | } // extern C++ |
| 235 | #endif |
| 236 | |
| 237 | #endif // OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H |