Go to the documentation of this file.
15 #ifndef OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H
16 #define OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H
23 #if defined(__cplusplus)
43 #define EVP_HPKE_DHKEM_X25519_HKDF_SHA256 0x0020
55 #define EVP_HPKE_HKDF_SHA256 0x0001
64 #define EVP_HPKE_AES_128_GCM 0x0001
65 #define EVP_HPKE_AES_256_GCM 0x0002
66 #define EVP_HPKE_CHACHA20_POLY1305 0x0003
121 size_t priv_key_len);
132 #define EVP_HPKE_MAX_PUBLIC_KEY_LENGTH 32
145 #define EVP_HPKE_MAX_PRIVATE_KEY_LENGTH 32
187 #define EVP_HPKE_MAX_ENC_LENGTH 32
206 const uint8_t *peer_public_key,
size_t peer_public_key_len,
207 const uint8_t *info,
size_t info_len);
216 const uint8_t *peer_public_key,
size_t peer_public_key_len,
230 const uint8_t *info,
size_t info_len);
252 size_t *out_len,
size_t max_out_len,
254 const uint8_t *ad,
size_t ad_len);
272 size_t *out_len,
size_t max_out_len,
274 const uint8_t *ad,
size_t ad_len);
288 #define EVP_HPKE_MAX_OVERHEAD EVP_AEAD_MAX_OVERHEAD
326 #if defined(__cplusplus)
330 #if !defined(BORINGSSL_NO_CXX)
350 #endif // OPENSSL_HEADER_CRYPTO_HPKE_INTERNAL_H
const OPENSSL_EXPORT EVP_AEAD * EVP_HPKE_AEAD_aead(const EVP_HPKE_AEAD *aead)
OPENSSL_EXPORT void EVP_HPKE_KEY_zero(EVP_HPKE_KEY *key)
internal::StackAllocated< EVP_HPKE_CTX, void, EVP_HPKE_CTX_zero, EVP_HPKE_CTX_cleanup > ScopedEVP_HPKE_CTX
#define X25519_PRIVATE_KEY_LEN
OPENSSL_EXPORT int EVP_HPKE_CTX_setup_sender_with_seed_for_testing(EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc, const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, const uint8_t *peer_public_key, size_t peer_public_key_len, const uint8_t *info, size_t info_len, const uint8_t *seed, size_t seed_len)
OPENSSL_EXPORT uint16_t EVP_HPKE_AEAD_id(const EVP_HPKE_AEAD *aead)
#define EVP_AEAD_MAX_NONCE_LENGTH
static const uint8_t seed[20]
struct evp_hpke_key_st EVP_HPKE_KEY
OPENSSL_EXPORT EVP_HPKE_CTX * EVP_HPKE_CTX_new(void)
OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem)
const OPENSSL_EXPORT EVP_HPKE_KEM * EVP_HPKE_KEY_kem(const EVP_HPKE_KEY *key)
const OPENSSL_EXPORT EVP_HPKE_AEAD * EVP_hpke_chacha20_poly1305(void)
OPENSSL_EXPORT int EVP_HPKE_CTX_export(const EVP_HPKE_CTX *ctx, uint8_t *out, size_t secret_len, const uint8_t *context, size_t context_len)
uint8_t exporter_secret[EVP_MAX_MD_SIZE]
OPENSSL_EXPORT int EVP_HPKE_CTX_open(EVP_HPKE_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len)
OPENSSL_EXPORT EVP_HPKE_KEY * EVP_HPKE_KEY_new(void)
const OPENSSL_EXPORT EVP_HPKE_KDF * EVP_HPKE_CTX_kdf(const EVP_HPKE_CTX *ctx)
OPENSSL_EXPORT void EVP_HPKE_CTX_free(EVP_HPKE_CTX *ctx)
OPENSSL_EXPORT void EVP_HPKE_KEY_free(EVP_HPKE_KEY *key)
OPENSSL_EXPORT void EVP_HPKE_KEY_cleanup(EVP_HPKE_KEY *key)
unsigned __int64 uint64_t
#define BSSL_NAMESPACE_END
OPENSSL_EXPORT int EVP_HPKE_KEY_copy(EVP_HPKE_KEY *dst, const EVP_HPKE_KEY *src)
const OPENSSL_EXPORT EVP_HPKE_KEM * EVP_hpke_x25519_hkdf_sha256(void)
OPENSSL_EXPORT int EVP_HPKE_CTX_setup_recipient(EVP_HPKE_CTX *ctx, const EVP_HPKE_KEY *key, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, const uint8_t *enc, size_t enc_len, const uint8_t *info, size_t info_len)
OPENSSL_EXPORT int EVP_HPKE_KEY_private_key(const EVP_HPKE_KEY *key, uint8_t *out, size_t *out_len, size_t max_out)
const OPENSSL_EXPORT EVP_HPKE_AEAD * EVP_hpke_aes_256_gcm(void)
OPENSSL_EXPORT int EVP_HPKE_CTX_seal(EVP_HPKE_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len)
OPENSSL_EXPORT void EVP_HPKE_CTX_cleanup(EVP_HPKE_CTX *ctx)
const EVP_HPKE_AEAD * aead
const OPENSSL_EXPORT EVP_HPKE_AEAD * EVP_HPKE_CTX_aead(const EVP_HPKE_CTX *ctx)
OPENSSL_EXPORT int EVP_HPKE_KEY_generate(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem)
OPENSSL_EXPORT size_t EVP_HPKE_CTX_max_overhead(const EVP_HPKE_CTX *ctx)
OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, const uint8_t *priv_key, size_t priv_key_len)
internal::StackAllocated< EVP_HPKE_KEY, void, EVP_HPKE_KEY_zero, EVP_HPKE_KEY_cleanup > ScopedEVP_HPKE_KEY
#define BORINGSSL_MAKE_DELETER(type, deleter)
const OPENSSL_EXPORT EVP_HPKE_AEAD * EVP_hpke_aes_128_gcm(void)
const OPENSSL_EXPORT EVP_HPKE_KDF * EVP_hpke_hkdf_sha256(void)
grpc::ClientContext context
OPENSSL_EXPORT int EVP_HPKE_KEY_public_key(const EVP_HPKE_KEY *key, uint8_t *out, size_t *out_len, size_t max_out)
struct evp_hpke_ctx_st EVP_HPKE_CTX
OPENSSL_EXPORT uint16_t EVP_HPKE_KDF_id(const EVP_HPKE_KDF *kdf)
#define X25519_PUBLIC_VALUE_LEN
OPENSSL_EXPORT void EVP_HPKE_CTX_zero(EVP_HPKE_CTX *ctx)
uint8_t base_nonce[EVP_AEAD_MAX_NONCE_LENGTH]
OPENSSL_EXPORT int EVP_HPKE_CTX_setup_sender(EVP_HPKE_CTX *ctx, uint8_t *out_enc, size_t *out_enc_len, size_t max_enc, const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, const uint8_t *peer_public_key, size_t peer_public_key_len, const uint8_t *info, size_t info_len)
grpc
Author(s):
autogenerated on Thu Mar 13 2025 03:00:13