This is an work-in-progress implementation of the HPKE hybrid encryption standard.
This implementation complies with the HPKE draft up to commit 47ab7da.
Here are all the primitives listed in the spec. The primitives with checked boxes are the ones that are implemented.
Default features flags: x25519
, p256
.
Feature flag list:
x25519
- Enables X25519-based KEMsp256
- Enables NIST P-256-based KEMsserde_impls
- Includes implementations of serde::Serialize
and serde::Deserialize
for all hpke::Serializable
and hpke::Deserializable
typesstd
- Necessary for running known-answer tests. No need to enable unless you're debugging this crate.For info on how to omit or include feature flags, see the cargo docs on features.
To run all tests, execute cargo test --all-features
. This includes known-answer tests, which test against test-vector-COMMIT_ID.json
,where COMMIT_ID
is the short commit of the version of the spec that the test vectors came from. See the reference implementation for information on how to generate a test vector.
See the client-server example for an idea of how to use HPKE.
A definition: crypto agility refers to the ability of a cryptosystem or protocol to vary its underlying primitives. For example, TLS has "crypto agility" in that you can run the protocol with many different ciphersuites.
This crate does not support crypto agility out of the box. This is because the cryptographic primitives are encoded as types satisfying certain constraints, and types need to be determined at compile time (broadly speaking). That said, there is nothing preventing you from implementing agility yourself. There is a sample implementation in the examples folder. The sample implementation is messy because agility is messy.
Licensed under either of
at your option.
This code has not been audited in any sense of the word. Use at your own discretion.