xref: /aosp_15_r20/external/tink/cc/mac/hmac_key_manager.cc (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang // Copyright 2017 Google Inc.
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang //     http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang 
17*e7b1675dSTing-Kang Chang #include "tink/mac/hmac_key_manager.h"
18*e7b1675dSTing-Kang Chang 
19*e7b1675dSTing-Kang Chang #include <map>
20*e7b1675dSTing-Kang Chang #include <string>
21*e7b1675dSTing-Kang Chang 
22*e7b1675dSTing-Kang Chang #include "absl/status/status.h"
23*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h"
24*e7b1675dSTing-Kang Chang #include "tink/mac.h"
25*e7b1675dSTing-Kang Chang #include "tink/subtle/hmac_boringssl.h"
26*e7b1675dSTing-Kang Chang #include "tink/subtle/random.h"
27*e7b1675dSTing-Kang Chang #include "tink/util/enums.h"
28*e7b1675dSTing-Kang Chang #include "tink/util/errors.h"
29*e7b1675dSTing-Kang Chang #include "tink/util/input_stream_util.h"
30*e7b1675dSTing-Kang Chang #include "tink/util/protobuf_helper.h"
31*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
32*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
33*e7b1675dSTing-Kang Chang #include "tink/util/validation.h"
34*e7b1675dSTing-Kang Chang #include "proto/common.pb.h"
35*e7b1675dSTing-Kang Chang #include "proto/hmac.pb.h"
36*e7b1675dSTing-Kang Chang #include "proto/tink.pb.h"
37*e7b1675dSTing-Kang Chang 
38*e7b1675dSTing-Kang Chang namespace crypto {
39*e7b1675dSTing-Kang Chang namespace tink {
40*e7b1675dSTing-Kang Chang 
41*e7b1675dSTing-Kang Chang using crypto::tink::util::Enums;
42*e7b1675dSTing-Kang Chang using crypto::tink::util::Status;
43*e7b1675dSTing-Kang Chang using crypto::tink::util::StatusOr;
44*e7b1675dSTing-Kang Chang using google::crypto::tink::HashType;
45*e7b1675dSTing-Kang Chang using google::crypto::tink::HmacKey;
46*e7b1675dSTing-Kang Chang using google::crypto::tink::HmacKeyFormat;
47*e7b1675dSTing-Kang Chang using google::crypto::tink::HmacParams;
48*e7b1675dSTing-Kang Chang 
49*e7b1675dSTing-Kang Chang namespace {
50*e7b1675dSTing-Kang Chang 
51*e7b1675dSTing-Kang Chang constexpr int kMinKeySizeInBytes = 16;
52*e7b1675dSTing-Kang Chang constexpr int kMinTagSizeInBytes = 10;
53*e7b1675dSTing-Kang Chang 
54*e7b1675dSTing-Kang Chang }  // namespace
55*e7b1675dSTing-Kang Chang 
CreateKey(const HmacKeyFormat & hmac_key_format) const56*e7b1675dSTing-Kang Chang StatusOr<HmacKey> HmacKeyManager::CreateKey(
57*e7b1675dSTing-Kang Chang     const HmacKeyFormat& hmac_key_format) const {
58*e7b1675dSTing-Kang Chang   HmacKey hmac_key;
59*e7b1675dSTing-Kang Chang   hmac_key.set_version(get_version());
60*e7b1675dSTing-Kang Chang   *(hmac_key.mutable_params()) = hmac_key_format.params();
61*e7b1675dSTing-Kang Chang   hmac_key.set_key_value(
62*e7b1675dSTing-Kang Chang       subtle::Random::GetRandomBytes(hmac_key_format.key_size()));
63*e7b1675dSTing-Kang Chang   return hmac_key;
64*e7b1675dSTing-Kang Chang }
65*e7b1675dSTing-Kang Chang 
DeriveKey(const HmacKeyFormat & hmac_key_format,InputStream * input_stream) const66*e7b1675dSTing-Kang Chang StatusOr<HmacKey> HmacKeyManager::DeriveKey(
67*e7b1675dSTing-Kang Chang     const HmacKeyFormat& hmac_key_format, InputStream* input_stream) const {
68*e7b1675dSTing-Kang Chang   crypto::tink::util::Status status =
69*e7b1675dSTing-Kang Chang       ValidateVersion(hmac_key_format.version(), get_version());
70*e7b1675dSTing-Kang Chang   if (!status.ok()) return status;
71*e7b1675dSTing-Kang Chang 
72*e7b1675dSTing-Kang Chang   crypto::tink::util::StatusOr<std::string> randomness =
73*e7b1675dSTing-Kang Chang       ReadBytesFromStream(hmac_key_format.key_size(), input_stream);
74*e7b1675dSTing-Kang Chang   if (!randomness.ok()) {
75*e7b1675dSTing-Kang Chang     if (randomness.status().code() == absl::StatusCode::kOutOfRange) {
76*e7b1675dSTing-Kang Chang       return crypto::tink::util::Status(
77*e7b1675dSTing-Kang Chang           absl::StatusCode::kInvalidArgument,
78*e7b1675dSTing-Kang Chang           "Could not get enough pseudorandomness from input stream");
79*e7b1675dSTing-Kang Chang     }
80*e7b1675dSTing-Kang Chang     return randomness.status();
81*e7b1675dSTing-Kang Chang   }
82*e7b1675dSTing-Kang Chang 
83*e7b1675dSTing-Kang Chang   HmacKey hmac_key;
84*e7b1675dSTing-Kang Chang   hmac_key.set_version(get_version());
85*e7b1675dSTing-Kang Chang   *(hmac_key.mutable_params()) = hmac_key_format.params();
86*e7b1675dSTing-Kang Chang   hmac_key.set_key_value(randomness.value());
87*e7b1675dSTing-Kang Chang   return hmac_key;
88*e7b1675dSTing-Kang Chang }
89*e7b1675dSTing-Kang Chang 
ValidateParams(const HmacParams & params) const90*e7b1675dSTing-Kang Chang Status HmacKeyManager::ValidateParams(const HmacParams& params) const {
91*e7b1675dSTing-Kang Chang   if (params.tag_size() < kMinTagSizeInBytes) {
92*e7b1675dSTing-Kang Chang     return ToStatusF(absl::StatusCode::kInvalidArgument,
93*e7b1675dSTing-Kang Chang                      "Invalid HmacParams: tag_size %d is too small.",
94*e7b1675dSTing-Kang Chang                      params.tag_size());
95*e7b1675dSTing-Kang Chang   }
96*e7b1675dSTing-Kang Chang   std::map<HashType, uint32_t> max_tag_size = {{HashType::SHA1, 20},
97*e7b1675dSTing-Kang Chang                                                {HashType::SHA224, 28},
98*e7b1675dSTing-Kang Chang                                                {HashType::SHA256, 32},
99*e7b1675dSTing-Kang Chang                                                {HashType::SHA384, 48},
100*e7b1675dSTing-Kang Chang                                                {HashType::SHA512, 64}};
101*e7b1675dSTing-Kang Chang   if (max_tag_size.find(params.hash()) == max_tag_size.end()) {
102*e7b1675dSTing-Kang Chang     return ToStatusF(absl::StatusCode::kInvalidArgument,
103*e7b1675dSTing-Kang Chang                      "Invalid HmacParams: HashType '%s' not supported.",
104*e7b1675dSTing-Kang Chang                      Enums::HashName(params.hash()));
105*e7b1675dSTing-Kang Chang   } else {
106*e7b1675dSTing-Kang Chang     if (params.tag_size() > max_tag_size[params.hash()]) {
107*e7b1675dSTing-Kang Chang       return ToStatusF(
108*e7b1675dSTing-Kang Chang           absl::StatusCode::kInvalidArgument,
109*e7b1675dSTing-Kang Chang           "Invalid HmacParams: tag_size %d is too big for HashType '%s'.",
110*e7b1675dSTing-Kang Chang           params.tag_size(), Enums::HashName(params.hash()));
111*e7b1675dSTing-Kang Chang     }
112*e7b1675dSTing-Kang Chang   }
113*e7b1675dSTing-Kang Chang   return util::OkStatus();
114*e7b1675dSTing-Kang Chang }
115*e7b1675dSTing-Kang Chang 
ValidateKey(const HmacKey & key) const116*e7b1675dSTing-Kang Chang Status HmacKeyManager::ValidateKey(const HmacKey& key) const {
117*e7b1675dSTing-Kang Chang   Status status = ValidateVersion(key.version(), get_version());
118*e7b1675dSTing-Kang Chang   if (!status.ok()) return status;
119*e7b1675dSTing-Kang Chang   if (key.key_value().size() < kMinKeySizeInBytes) {
120*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInvalidArgument,
121*e7b1675dSTing-Kang Chang                         "Invalid HmacKey: key_value is too short.");
122*e7b1675dSTing-Kang Chang   }
123*e7b1675dSTing-Kang Chang   return ValidateParams(key.params());
124*e7b1675dSTing-Kang Chang }
125*e7b1675dSTing-Kang Chang 
126*e7b1675dSTing-Kang Chang // static
ValidateKeyFormat(const HmacKeyFormat & key_format) const127*e7b1675dSTing-Kang Chang Status HmacKeyManager::ValidateKeyFormat(
128*e7b1675dSTing-Kang Chang     const HmacKeyFormat& key_format) const {
129*e7b1675dSTing-Kang Chang   if (key_format.key_size() < kMinKeySizeInBytes) {
130*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInvalidArgument,
131*e7b1675dSTing-Kang Chang                         "Invalid HmacKeyFormat: key_size is too small.");
132*e7b1675dSTing-Kang Chang   }
133*e7b1675dSTing-Kang Chang   return ValidateParams(key_format.params());
134*e7b1675dSTing-Kang Chang }
135*e7b1675dSTing-Kang Chang 
136*e7b1675dSTing-Kang Chang }  // namespace tink
137*e7b1675dSTing-Kang Chang }  // namespace crypto
138