Newer
Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
goog.module('tink.hybrid.HybridKeyTemplates');
const AeadKeyTemplates = goog.require('tink.aead.AeadKeyTemplates');
const HybridConfig = goog.require('tink.hybrid.HybridConfig');
const PbEciesAeadDemParams = goog.require('proto.google.crypto.tink.EciesAeadDemParams');
const PbEciesAeadHkdfKeyFormat = goog.require('proto.google.crypto.tink.EciesAeadHkdfKeyFormat');
const PbEciesAeadHkdfParams = goog.require('proto.google.crypto.tink.EciesAeadHkdfParams');
const PbEciesHkdfKemParams = goog.require('proto.google.crypto.tink.EciesHkdfKemParams');
const PbEllipticCurveType = goog.require('proto.google.crypto.tink.EllipticCurveType');
const PbHashType = goog.require('proto.google.crypto.tink.HashType');
const PbKeyTemplate = goog.require('proto.google.crypto.tink.KeyTemplate');
const PbOutputPrefixType = goog.require('proto.google.crypto.tink.OutputPrefixType');
const PbPointFormat = goog.require('proto.google.crypto.tink.EcPointFormat');
// Pre-generated KeyTemplates for keys for hybrid encryption.
//
// One can use these templates to generate new Keyset with
// KeysetHandle.generateNew method. To generate a new keyset that contains a
// single EciesAeadHkdfKey, one can do:
//
// HybridConfig.Register();
// KeysetHandle handle = KeysetHandle.generateNew(
// HybridKeyTemplates.eciesP256HkdfHmacSha256Aes128Gcm());
/**
* Returns a KeyTemplate that generates new instances of
* EciesAeadHkdfPrivateKey with the following parameters:
*
* KEM: ECDH over NIST P-256
* DEM: AES128-GCM
* KDF: HKDF-HMAC-SHA256 with an empty salt
* OutputPrefixType: TINK
*
* @return {!PbKeyTemplate}
*/
const eciesP256HkdfHmacSha256Aes128Gcm = function() {
return createEciesAeadHkdfKeyTemplate_(
/* curveType = */ PbEllipticCurveType.NIST_P256,
/* hkdfHash = */ PbHashType.SHA256,
/* pointFormat = */ PbPointFormat.UNCOMPRESSED,
/* demKeyTemplate = */ AeadKeyTemplates.aes128Gcm(),
/* hkdfSalt = */ new Uint8Array(0));
};
/**
* Returns a KeyTemplate that generates new instances of
* EciesAeadHkdfPrivateKey with the following parameters:
*
* KEM: ECDH over NIST P-256
* DEM: AES128-CTR-HMAC-SHA256 with
* - AES key size: 16 bytes
* - AES CTR IV size: 16 bytes
* - HMAC key size: 32 bytes
* - HMAC tag size: 16 bytes
* KDF: HKDF-HMAC-SHA256 with an empty salt
* OutputPrefixType: TINK
*
* @return {!PbKeyTemplate}
*/
const eciesP256HkdfHmacSha256Aes128CtrHmacSha256 = function() {
return createEciesAeadHkdfKeyTemplate_(
/* curveType = */ PbEllipticCurveType.NIST_P256,
/* hkdfHash = */ PbHashType.SHA256,
/* pointFormat = */ PbPointFormat.UNCOMPRESSED,
/* demKeyTemplate = */ AeadKeyTemplates.aes128CtrHmacSha256(),
/* hkdfSalt = */ new Uint8Array(0));
};
/**
* @param {PbEllipticCurveType} curveType
* @param {PbHashType} hkdfHash
* @param {PbPointFormat} pointFormat
* @param {PbKeyTemplate} demKeyTemplate
* @param {!Uint8Array} hkdfSalt
*
* @return {!PbKeyTemplate}
* @private
*/
const createEciesAeadHkdfKeyTemplate_ = function(
curveType, hkdfHash, pointFormat, demKeyTemplate, hkdfSalt) {
// key format
const keyFormat = new PbEciesAeadHkdfKeyFormat();
keyFormat.setParams(createEciesAeadHkdfParams_(
curveType, hkdfHash, pointFormat, demKeyTemplate, hkdfSalt));
// key template
const keyTemplate = new PbKeyTemplate();
keyTemplate.setTypeUrl(HybridConfig.ECIES_AEAD_HKDF_PRIVATE_KEY_TYPE);
keyTemplate.setValue(keyFormat.serializeBinary());
keyTemplate.setOutputPrefixType(PbOutputPrefixType.TINK);
return keyTemplate;
};
/**
* @param {PbEllipticCurveType} curveType
* @param {PbHashType} hkdfHash
* @param {PbPointFormat} pointFormat
* @param {PbKeyTemplate} demKeyTemplate
* @param {!Uint8Array} hkdfSalt
*
* @return {!PbEciesAeadHkdfParams}
* @private
*/
const createEciesAeadHkdfParams_ = function(
curveType, hkdfHash, pointFormat, demKeyTemplate, hkdfSalt) {
// KEM params
const kemParams = new PbEciesHkdfKemParams();
kemParams.setCurveType(curveType);
kemParams.setHkdfHashType(hkdfHash);
kemParams.setHkdfSalt(hkdfSalt);
// DEM params
const demParams = new PbEciesAeadDemParams();
demParams.setAeadDem(demKeyTemplate);
// params
const params = new PbEciesAeadHkdfParams();
params.setKemParams(kemParams);
params.setDemParams(demParams);
params.setEcPointFormat(pointFormat);
return params;
};
exports = {
eciesP256HkdfHmacSha256Aes128Gcm,
eciesP256HkdfHmacSha256Aes128CtrHmacSha256
};