com.google.crypto.tink.hybrid.internal.ChaCha20Poly1305HpkeAead Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of tink Show documentation
Show all versions of tink Show documentation
Tink is a small cryptographic library that provides a safe, simple, agile and fast way to accomplish some common cryptographic tasks.
// Copyright 2021 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
///////////////////////////////////////////////////////////////////////////////
package com.google.crypto.tink.hybrid.internal;
import com.google.crypto.tink.aead.internal.InsecureNonceChaCha20Poly1305;
import com.google.errorprone.annotations.Immutable;
import java.security.GeneralSecurityException;
import java.security.InvalidAlgorithmParameterException;
/** ChaCha20-Poly1305 HPKE AEAD variant. */
@Immutable
final class ChaCha20Poly1305HpkeAead implements HpkeAead {
@Override
public byte[] seal(byte[] key, byte[] nonce, byte[] plaintext, byte[] associatedData)
throws GeneralSecurityException {
if (key.length != getKeyLength()) {
throw new InvalidAlgorithmParameterException("Unexpected key length: " + getKeyLength());
}
InsecureNonceChaCha20Poly1305 aead = new InsecureNonceChaCha20Poly1305(key);
return aead.encrypt(nonce, plaintext, associatedData);
}
@Override
public byte[] open(byte[] key, byte[] nonce, byte[] ciphertext, byte[] associatedData)
throws GeneralSecurityException {
if (key.length != getKeyLength()) {
throw new InvalidAlgorithmParameterException("Unexpected key length: " + getKeyLength());
}
InsecureNonceChaCha20Poly1305 aead = new InsecureNonceChaCha20Poly1305(key);
return aead.decrypt(nonce, ciphertext, associatedData);
}
@Override
public byte[] getAeadId() {
return HpkeUtil.CHACHA20_POLY1305_AEAD_ID;
}
@Override
public int getKeyLength() {
// 256-bit key length: https://datatracker.ietf.org/doc/html/rfc8439#section-2.3.
return 32;
}
@Override
public int getNonceLength() {
// 96-bit nonce length: https://datatracker.ietf.org/doc/html/rfc8439#section-2.3.
return 12;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy