1*e7b1675dSTing-Kang Chang // Copyright 2018 Google Inc.
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #include "tink/internal/registry_impl.h"
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang #include <functional>
20*e7b1675dSTing-Kang Chang #include <memory>
21*e7b1675dSTing-Kang Chang #include <utility>
22*e7b1675dSTing-Kang Chang
23*e7b1675dSTing-Kang Chang #include "absl/status/status.h"
24*e7b1675dSTing-Kang Chang #include "absl/strings/str_cat.h"
25*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h"
26*e7b1675dSTing-Kang Chang #include "absl/synchronization/mutex.h"
27*e7b1675dSTing-Kang Chang #include "tink/input_stream.h"
28*e7b1675dSTing-Kang Chang #include "tink/internal/keyset_wrapper_store.h"
29*e7b1675dSTing-Kang Chang #include "tink/key_manager.h"
30*e7b1675dSTing-Kang Chang #include "tink/monitoring/monitoring.h"
31*e7b1675dSTing-Kang Chang #include "tink/util/errors.h"
32*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
33*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
34*e7b1675dSTing-Kang Chang #include "proto/tink.pb.h"
35*e7b1675dSTing-Kang Chang
36*e7b1675dSTing-Kang Chang namespace crypto {
37*e7b1675dSTing-Kang Chang namespace tink {
38*e7b1675dSTing-Kang Chang namespace internal {
39*e7b1675dSTing-Kang Chang
40*e7b1675dSTing-Kang Chang using ::crypto::tink::MonitoringClientFactory;
41*e7b1675dSTing-Kang Chang using ::google::crypto::tink::KeyData;
42*e7b1675dSTing-Kang Chang using ::google::crypto::tink::KeyTemplate;
43*e7b1675dSTing-Kang Chang
get_key_type_info(absl::string_view type_url) const44*e7b1675dSTing-Kang Chang util::StatusOr<const KeyTypeInfoStore::Info*> RegistryImpl::get_key_type_info(
45*e7b1675dSTing-Kang Chang absl::string_view type_url) const {
46*e7b1675dSTing-Kang Chang absl::MutexLock lock(&maps_mutex_);
47*e7b1675dSTing-Kang Chang return key_type_info_store_.Get(type_url);
48*e7b1675dSTing-Kang Chang }
49*e7b1675dSTing-Kang Chang
NewKeyData(const KeyTemplate & key_template) const50*e7b1675dSTing-Kang Chang util::StatusOr<std::unique_ptr<KeyData>> RegistryImpl::NewKeyData(
51*e7b1675dSTing-Kang Chang const KeyTemplate& key_template) const {
52*e7b1675dSTing-Kang Chang util::StatusOr<const internal::KeyTypeInfoStore::Info*> info =
53*e7b1675dSTing-Kang Chang get_key_type_info(key_template.type_url());
54*e7b1675dSTing-Kang Chang if (!info.ok()) {
55*e7b1675dSTing-Kang Chang return info.status();
56*e7b1675dSTing-Kang Chang }
57*e7b1675dSTing-Kang Chang if (!(*info)->new_key_allowed()) {
58*e7b1675dSTing-Kang Chang return crypto::tink::util::Status(
59*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
60*e7b1675dSTing-Kang Chang absl::StrCat("KeyManager for type ", key_template.type_url(),
61*e7b1675dSTing-Kang Chang " does not allow for creation of new keys."));
62*e7b1675dSTing-Kang Chang }
63*e7b1675dSTing-Kang Chang return (*info)->key_factory().NewKeyData(key_template.value());
64*e7b1675dSTing-Kang Chang }
65*e7b1675dSTing-Kang Chang
GetPublicKeyData(absl::string_view type_url,absl::string_view serialized_private_key) const66*e7b1675dSTing-Kang Chang util::StatusOr<std::unique_ptr<KeyData>> RegistryImpl::GetPublicKeyData(
67*e7b1675dSTing-Kang Chang absl::string_view type_url,
68*e7b1675dSTing-Kang Chang absl::string_view serialized_private_key) const {
69*e7b1675dSTing-Kang Chang util::StatusOr<const internal::KeyTypeInfoStore::Info*> info =
70*e7b1675dSTing-Kang Chang get_key_type_info(type_url);
71*e7b1675dSTing-Kang Chang if (!info.ok()) {
72*e7b1675dSTing-Kang Chang return info.status();
73*e7b1675dSTing-Kang Chang }
74*e7b1675dSTing-Kang Chang auto factory =
75*e7b1675dSTing-Kang Chang dynamic_cast<const PrivateKeyFactory*>(&(*info)->key_factory());
76*e7b1675dSTing-Kang Chang if (factory == nullptr) {
77*e7b1675dSTing-Kang Chang return ToStatusF(absl::StatusCode::kInvalidArgument,
78*e7b1675dSTing-Kang Chang "KeyManager for type '%s' does not have "
79*e7b1675dSTing-Kang Chang "a PrivateKeyFactory.",
80*e7b1675dSTing-Kang Chang type_url);
81*e7b1675dSTing-Kang Chang }
82*e7b1675dSTing-Kang Chang auto result = factory->GetPublicKeyData(serialized_private_key);
83*e7b1675dSTing-Kang Chang return result;
84*e7b1675dSTing-Kang Chang }
85*e7b1675dSTing-Kang Chang
DeriveKey(const KeyTemplate & key_template,InputStream * randomness) const86*e7b1675dSTing-Kang Chang util::StatusOr<KeyData> RegistryImpl::DeriveKey(const KeyTemplate& key_template,
87*e7b1675dSTing-Kang Chang InputStream* randomness) const {
88*e7b1675dSTing-Kang Chang util::StatusOr<const internal::KeyTypeInfoStore::Info*> info =
89*e7b1675dSTing-Kang Chang get_key_type_info(key_template.type_url());
90*e7b1675dSTing-Kang Chang if (!info.ok()) {
91*e7b1675dSTing-Kang Chang return info.status();
92*e7b1675dSTing-Kang Chang }
93*e7b1675dSTing-Kang Chang if (!(*info)->key_deriver()) {
94*e7b1675dSTing-Kang Chang return crypto::tink::util::Status(
95*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
96*e7b1675dSTing-Kang Chang absl::StrCat("Manager for type '", key_template.type_url(),
97*e7b1675dSTing-Kang Chang "' cannot derive keys."));
98*e7b1675dSTing-Kang Chang }
99*e7b1675dSTing-Kang Chang return (*info)->key_deriver()(key_template.value(), randomness);
100*e7b1675dSTing-Kang Chang }
101*e7b1675dSTing-Kang Chang
RegisterMonitoringClientFactory(std::unique_ptr<MonitoringClientFactory> factory)102*e7b1675dSTing-Kang Chang util::Status RegistryImpl::RegisterMonitoringClientFactory(
103*e7b1675dSTing-Kang Chang std::unique_ptr<MonitoringClientFactory> factory) {
104*e7b1675dSTing-Kang Chang absl::MutexLock lock(&monitoring_factory_mutex_);
105*e7b1675dSTing-Kang Chang if (monitoring_factory_ != nullptr) {
106*e7b1675dSTing-Kang Chang return util::Status(absl::StatusCode::kAlreadyExists,
107*e7b1675dSTing-Kang Chang "A monitoring factory is already registered");
108*e7b1675dSTing-Kang Chang }
109*e7b1675dSTing-Kang Chang monitoring_factory_ = std::move(factory);
110*e7b1675dSTing-Kang Chang return util::OkStatus();
111*e7b1675dSTing-Kang Chang }
112*e7b1675dSTing-Kang Chang
Reset()113*e7b1675dSTing-Kang Chang void RegistryImpl::Reset() {
114*e7b1675dSTing-Kang Chang {
115*e7b1675dSTing-Kang Chang absl::MutexLock lock(&maps_mutex_);
116*e7b1675dSTing-Kang Chang key_type_info_store_ = KeyTypeInfoStore();
117*e7b1675dSTing-Kang Chang keyset_wrapper_store_ = KeysetWrapperStore();
118*e7b1675dSTing-Kang Chang }
119*e7b1675dSTing-Kang Chang {
120*e7b1675dSTing-Kang Chang absl::MutexLock lock(&monitoring_factory_mutex_);
121*e7b1675dSTing-Kang Chang monitoring_factory_.reset();
122*e7b1675dSTing-Kang Chang }
123*e7b1675dSTing-Kang Chang }
124*e7b1675dSTing-Kang Chang
125*e7b1675dSTing-Kang Chang } // namespace internal
126*e7b1675dSTing-Kang Chang } // namespace tink
127*e7b1675dSTing-Kang Chang } // namespace crypto
128