// Copyright 2017 Google Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // /////////////////////////////////////////////////////////////////////////////// #include "tink/util/validation.h" #include "absl/status/status.h" #include "tink/util/errors.h" #include "tink/util/status.h" #include "proto/tink.pb.h" using google::crypto::tink::KeyData; using google::crypto::tink::Keyset; using google::crypto::tink::KeyStatusType; namespace crypto { namespace tink { util::Status ValidateAesKeySize(uint32_t key_size) { if (key_size != 16 && key_size != 32) { return ToStatusF(absl::StatusCode::kInvalidArgument, "AES key has %d bytes; supported sizes: 16 or 32 bytes.", key_size); } return util::OkStatus(); } util::Status ValidateKey(const Keyset::Key& key) { if (!key.has_key_data()) { return ToStatusF(absl::StatusCode::kInvalidArgument, "key %d, has no key data", key.key_id()); } if (key.output_prefix_type() == google::crypto::tink::OutputPrefixType::UNKNOWN_PREFIX) { return ToStatusF(absl::StatusCode::kInvalidArgument, "key %d has unknown prefix", key.key_id()); } if (key.status() == google::crypto::tink::KeyStatusType::UNKNOWN_STATUS) { return ToStatusF(absl::StatusCode::kInvalidArgument, "key %d has unknown status", key.key_id()); } return util::OkStatus(); } util::Status ValidateKeyset(const Keyset& keyset) { if (keyset.key_size() < 1) { return util::Status(absl::StatusCode::kInvalidArgument, "A valid keyset must contain at least one key."); } uint32_t primary_key_id = keyset.primary_key_id(); bool has_primary_key = false; bool contains_only_public_key_material = true; int enabled_keys = 0; for (int i = 0; i < keyset.key_size(); i++) { const Keyset::Key& key = keyset.key(i); if (key.status() != KeyStatusType::ENABLED) { continue; } enabled_keys += 1; auto validation_result = ValidateKey(key); if (!validation_result.ok()) { return validation_result; } if (key.status() == KeyStatusType::ENABLED && key.key_id() == primary_key_id) { if (has_primary_key) { return util::Status(absl::StatusCode::kInvalidArgument, "keyset contains multiple primary keys"); } has_primary_key = true; } if (key.key_data().key_material_type() != KeyData::ASYMMETRIC_PUBLIC) { contains_only_public_key_material = false; } } if (enabled_keys == 0) { return util::Status(absl::StatusCode::kInvalidArgument, "keyset must contain at least one ENABLED key"); } // A public key can be used for verification without being set as the primary // key. Therefore, it is okay to have a keyset that contains public but // doesn't have a primary key set. if (!has_primary_key && !contains_only_public_key_material) { return util::Status(absl::StatusCode::kInvalidArgument, "keyset doesn't contain a valid primary key"); } return util::OkStatus(); } util::Status ValidateVersion(uint32_t candidate, uint32_t max_expected) { if (candidate > max_expected) { return ToStatusF(absl::StatusCode::kInvalidArgument, "Key has version '%d'; " "only keys with version in range [0..%d] are supported.", candidate, max_expected); } return util::OkStatus(); } } // namespace tink } // namespace crypto