1*e7b1675dSTing-Kang Chang // Copyright 2022 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #include "tink/mac/aes_cmac_parameters.h"
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang #include <cstdlib>
20*e7b1675dSTing-Kang Chang #include <iostream>
21*e7b1675dSTing-Kang Chang #include <memory>
22*e7b1675dSTing-Kang Chang #include <ostream>
23*e7b1675dSTing-Kang Chang #include <set>
24*e7b1675dSTing-Kang Chang
25*e7b1675dSTing-Kang Chang #include "absl/log/log.h"
26*e7b1675dSTing-Kang Chang #include "tink/crypto_format.h"
27*e7b1675dSTing-Kang Chang #include "tink/internal/util.h"
28*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
29*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
30*e7b1675dSTing-Kang Chang
31*e7b1675dSTing-Kang Chang namespace crypto {
32*e7b1675dSTing-Kang Chang namespace tink {
33*e7b1675dSTing-Kang Chang
Create(int key_size_in_bytes,int cryptographic_tag_size_in_bytes,Variant variant)34*e7b1675dSTing-Kang Chang util::StatusOr<AesCmacParameters> AesCmacParameters::Create(
35*e7b1675dSTing-Kang Chang int key_size_in_bytes, int cryptographic_tag_size_in_bytes,
36*e7b1675dSTing-Kang Chang Variant variant) {
37*e7b1675dSTing-Kang Chang if (key_size_in_bytes != 16 && key_size_in_bytes != 32) {
38*e7b1675dSTing-Kang Chang return util::Status(
39*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
40*e7b1675dSTing-Kang Chang absl::StrCat("Key size should be either 16 or 32 bytes, got ",
41*e7b1675dSTing-Kang Chang key_size_in_bytes, " bytes."));
42*e7b1675dSTing-Kang Chang }
43*e7b1675dSTing-Kang Chang if (cryptographic_tag_size_in_bytes < 10) {
44*e7b1675dSTing-Kang Chang return util::Status(
45*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
46*e7b1675dSTing-Kang Chang absl::StrCat("Tag size should be at least 10 bytes, got ",
47*e7b1675dSTing-Kang Chang cryptographic_tag_size_in_bytes, " bytes."));
48*e7b1675dSTing-Kang Chang }
49*e7b1675dSTing-Kang Chang if (cryptographic_tag_size_in_bytes > 16) {
50*e7b1675dSTing-Kang Chang return util::Status(
51*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
52*e7b1675dSTing-Kang Chang absl::StrCat("Tag size should not exceed 16 bytes, got ",
53*e7b1675dSTing-Kang Chang cryptographic_tag_size_in_bytes, " bytes."));
54*e7b1675dSTing-Kang Chang }
55*e7b1675dSTing-Kang Chang static const std::set<Variant>* supported_variants =
56*e7b1675dSTing-Kang Chang new std::set<Variant>({Variant::kTink, Variant::kCrunchy,
57*e7b1675dSTing-Kang Chang Variant::kLegacy, Variant::kNoPrefix});
58*e7b1675dSTing-Kang Chang if (supported_variants->find(variant) == supported_variants->end()) {
59*e7b1675dSTing-Kang Chang return util::Status(
60*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
61*e7b1675dSTing-Kang Chang "Cannot create AES-CMAC parameters with unknown variant.");
62*e7b1675dSTing-Kang Chang }
63*e7b1675dSTing-Kang Chang return AesCmacParameters(key_size_in_bytes, cryptographic_tag_size_in_bytes,
64*e7b1675dSTing-Kang Chang variant);
65*e7b1675dSTing-Kang Chang }
66*e7b1675dSTing-Kang Chang
TotalTagSizeInBytes() const67*e7b1675dSTing-Kang Chang int AesCmacParameters::TotalTagSizeInBytes() const {
68*e7b1675dSTing-Kang Chang switch (variant_) {
69*e7b1675dSTing-Kang Chang case Variant::kTink:
70*e7b1675dSTing-Kang Chang case Variant::kCrunchy:
71*e7b1675dSTing-Kang Chang case Variant::kLegacy:
72*e7b1675dSTing-Kang Chang return CryptographicTagSizeInBytes() + CryptoFormat::kNonRawPrefixSize;
73*e7b1675dSTing-Kang Chang case Variant::kNoPrefix:
74*e7b1675dSTing-Kang Chang return CryptographicTagSizeInBytes();
75*e7b1675dSTing-Kang Chang default:
76*e7b1675dSTing-Kang Chang // Parameters objects with unknown variants should never be created.
77*e7b1675dSTing-Kang Chang internal::LogFatal("AES-CMAC parameters has an unknown variant.");
78*e7b1675dSTing-Kang Chang }
79*e7b1675dSTing-Kang Chang }
80*e7b1675dSTing-Kang Chang
operator ==(const Parameters & other) const81*e7b1675dSTing-Kang Chang bool AesCmacParameters::operator==(const Parameters& other) const {
82*e7b1675dSTing-Kang Chang const AesCmacParameters* that =
83*e7b1675dSTing-Kang Chang dynamic_cast<const AesCmacParameters*>(&other);
84*e7b1675dSTing-Kang Chang if (that == nullptr) {
85*e7b1675dSTing-Kang Chang return false;
86*e7b1675dSTing-Kang Chang }
87*e7b1675dSTing-Kang Chang if (key_size_in_bytes_ != that->key_size_in_bytes_) {
88*e7b1675dSTing-Kang Chang return false;
89*e7b1675dSTing-Kang Chang }
90*e7b1675dSTing-Kang Chang if (cryptographic_tag_size_in_bytes_ !=
91*e7b1675dSTing-Kang Chang that->cryptographic_tag_size_in_bytes_) {
92*e7b1675dSTing-Kang Chang return false;
93*e7b1675dSTing-Kang Chang }
94*e7b1675dSTing-Kang Chang if (variant_ != that->variant_) {
95*e7b1675dSTing-Kang Chang return false;
96*e7b1675dSTing-Kang Chang }
97*e7b1675dSTing-Kang Chang return true;
98*e7b1675dSTing-Kang Chang }
99*e7b1675dSTing-Kang Chang
100*e7b1675dSTing-Kang Chang } // namespace tink
101*e7b1675dSTing-Kang Chang } // namespace crypto
102