#ifndef AWS_CAL_SYMMETRIC_CIPHER_PRIV_H #define AWS_CAL_SYMMETRIC_CIPHER_PRIV_H /** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #include struct aws_symmetric_cipher; struct aws_symmetric_cipher_vtable { const char *alg_name; const char *provider; void (*destroy)(struct aws_symmetric_cipher *cipher); /* reset the cipher to being able to start another encrypt or decrypt operation. The original IV, Key, Tag etc... will be restored to the current cipher. */ int (*reset)(struct aws_symmetric_cipher *cipher); int (*encrypt)(struct aws_symmetric_cipher *cipher, struct aws_byte_cursor to_encrypt, struct aws_byte_buf *out); int (*decrypt)(struct aws_symmetric_cipher *cipher, struct aws_byte_cursor to_decrypt, struct aws_byte_buf *out); int (*finalize_encryption)(struct aws_symmetric_cipher *cipher, struct aws_byte_buf *out); int (*finalize_decryption)(struct aws_symmetric_cipher *cipher, struct aws_byte_buf *out); }; struct aws_symmetric_cipher { struct aws_allocator *allocator; struct aws_symmetric_cipher_vtable *vtable; struct aws_byte_buf iv; struct aws_byte_buf key; struct aws_byte_buf aad; struct aws_byte_buf tag; size_t block_size; size_t key_length_bits; /** deprecated for use, only for backwards compat. Use state to represent current state of cipher. good represented if the cipher was initialized without any errors, ready to process input, and not finalized yet. This corresponds to the state AWS_SYMMETRIC_CIPHER_READY. */ bool good; enum aws_symmetric_cipher_state state; void *impl; }; AWS_EXTERN_C_BEGIN /** * Generates a secure random initialization vector of length len_bytes. If is_counter_mode is set, the final 4 bytes * will be reserved as a counter and initialized to 1 in big-endian byte-order. */ AWS_CAL_API void aws_symmetric_cipher_generate_initialization_vector( size_t len_bytes, bool is_counter_mode, struct aws_byte_buf *out); /** * Generates a secure random symmetric key of length len_bytes. */ AWS_CAL_API void aws_symmetric_cipher_generate_key(size_t len_bytes, struct aws_byte_buf *out); AWS_EXTERN_C_END /* Don't let this one get exported as it should never be used outside of this library (including tests). */ int aws_symmetric_cipher_try_ensure_sufficient_buffer_space(struct aws_byte_buf *buf, size_t size); #endif /* AWS_CAL_SYMMETRIC_CIPHER_PRIV_H */