Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
goog.module('tink.hybrid.HybridKeyTemplates');
const AeadKeyTemplates = goog.require('tink.aead.AeadKeyTemplates');
const HybridConfig = goog.require('tink.hybrid.HybridConfig');
const PbEciesAeadDemParams = goog.require('proto.google.crypto.tink.EciesAeadDemParams');
const PbEciesAeadHkdfKeyFormat = goog.require('proto.google.crypto.tink.EciesAeadHkdfKeyFormat');
const PbEciesAeadHkdfParams = goog.require('proto.google.crypto.tink.EciesAeadHkdfParams');
const PbEciesHkdfKemParams = goog.require('proto.google.crypto.tink.EciesHkdfKemParams');
const PbEllipticCurveType = goog.require('proto.google.crypto.tink.EllipticCurveType');
const PbHashType = goog.require('proto.google.crypto.tink.HashType');
const PbKeyTemplate = goog.require('proto.google.crypto.tink.KeyTemplate');
const PbOutputPrefixType = goog.require('proto.google.crypto.tink.OutputPrefixType');
const PbPointFormat = goog.require('proto.google.crypto.tink.EcPointFormat');
/**
* Pre-generated KeyTemplates for keys for hybrid encryption.
*
* One can use these templates to generate new Keyset with
* KeysetHandle.generateNew method. To generate a new keyset that contains a
* single EciesAeadHkdfKey, one can do:
*
* HybridConfig.Register();
* KeysetHandle handle = KeysetHandle.generateNew(
* HybridKeyTemplates.eciesP256HkdfHmacSha256Aes128Gcm());
*
* @final
*/
class HybridKeyTemplates {
/**
* Returns a KeyTemplate that generates new instances of
* EciesAeadHkdfPrivateKey with the following parameters:
*
* KEM: ECDH over NIST P-256
* DEM: AES128-GCM
* KDF: HKDF-HMAC-SHA256 with an empty salt
* OutputPrefixType: TINK
*
* @return {!PbKeyTemplate}
*/
static eciesP256HkdfHmacSha256Aes128Gcm() {
return createEciesAeadHkdfKeyTemplate_(
/* curveType = */ PbEllipticCurveType.NIST_P256,
/* hkdfHash = */ PbHashType.SHA256,
/* pointFormat = */ PbPointFormat.UNCOMPRESSED,
/* demKeyTemplate = */ AeadKeyTemplates.aes128Gcm(),
/* hkdfSalt = */ new Uint8Array(0));
}
/**
* Returns a KeyTemplate that generates new instances of
* EciesAeadHkdfPrivateKey with the following parameters:
*
* KEM: ECDH over NIST P-256
* DEM: AES128-CTR-HMAC-SHA256 with
* - AES key size: 16 bytes
* - AES CTR IV size: 16 bytes
* - HMAC key size: 32 bytes
* - HMAC tag size: 16 bytes
* KDF: HKDF-HMAC-SHA256 with an empty salt
* OutputPrefixType: TINK
*
* @return {!PbKeyTemplate}
*/
static eciesP256HkdfHmacSha256Aes128CtrHmacSha256() {
return createEciesAeadHkdfKeyTemplate_(
/* curveType = */ PbEllipticCurveType.NIST_P256,
/* hkdfHash = */ PbHashType.SHA256,
/* pointFormat = */ PbPointFormat.UNCOMPRESSED,
/* demKeyTemplate = */ AeadKeyTemplates.aes128CtrHmacSha256(),
/* hkdfSalt = */ new Uint8Array(0));
}
}
/**
* @param {PbEllipticCurveType} curveType
* @param {PbHashType} hkdfHash
* @param {PbPointFormat} pointFormat
* @param {PbKeyTemplate} demKeyTemplate
* @param {!Uint8Array} hkdfSalt
*
* @return {!PbKeyTemplate}
* @private
*/
const createEciesAeadHkdfKeyTemplate_ = function(
curveType, hkdfHash, pointFormat, demKeyTemplate, hkdfSalt) {
// key format
const keyFormat =
new PbEciesAeadHkdfKeyFormat().setParams(createEciesAeadHkdfParams_(
curveType, hkdfHash, pointFormat, demKeyTemplate, hkdfSalt));
const keyTemplate =
new PbKeyTemplate()
.setTypeUrl(HybridConfig.ECIES_AEAD_HKDF_PRIVATE_KEY_TYPE)
.setValue(keyFormat.serializeBinary())
.setOutputPrefixType(PbOutputPrefixType.TINK);
return keyTemplate;
};
/**
* @param {PbEllipticCurveType} curveType
* @param {PbHashType} hkdfHash
* @param {PbPointFormat} pointFormat
* @param {PbKeyTemplate} demKeyTemplate
* @param {!Uint8Array} hkdfSalt
*
* @return {!PbEciesAeadHkdfParams}
* @private
*/
const createEciesAeadHkdfParams_ = function(
curveType, hkdfHash, pointFormat, demKeyTemplate, hkdfSalt) {
// KEM params
const kemParams = new PbEciesHkdfKemParams()
.setCurveType(curveType)
.setHkdfHashType(hkdfHash)
.setHkdfSalt(hkdfSalt);
const demParams = new PbEciesAeadDemParams().setAeadDem(demKeyTemplate);
const params = new PbEciesAeadHkdfParams()
.setKemParams(kemParams)
.setDemParams(demParams)
.setEcPointFormat(pointFormat);