1*e7b1675dSTing-Kang Chang // Copyright 2023 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #include "tink/mac/hmac_parameters.h"
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang #include <cstdlib>
20*e7b1675dSTing-Kang Chang #include <iostream>
21*e7b1675dSTing-Kang Chang #include <map>
22*e7b1675dSTing-Kang Chang #include <memory>
23*e7b1675dSTing-Kang Chang #include <ostream>
24*e7b1675dSTing-Kang Chang #include <set>
25*e7b1675dSTing-Kang Chang
26*e7b1675dSTing-Kang Chang #include "absl/log/log.h"
27*e7b1675dSTing-Kang Chang #include "tink/crypto_format.h"
28*e7b1675dSTing-Kang Chang #include "tink/internal/util.h"
29*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
30*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
31*e7b1675dSTing-Kang Chang
32*e7b1675dSTing-Kang Chang namespace crypto {
33*e7b1675dSTing-Kang Chang namespace tink {
34*e7b1675dSTing-Kang Chang namespace {
35*e7b1675dSTing-Kang Chang
ValidateTagSizeBytes(int cryptographic_tag_size_in_bytes,HmacParameters::HashType hash_type)36*e7b1675dSTing-Kang Chang util::Status ValidateTagSizeBytes(int cryptographic_tag_size_in_bytes,
37*e7b1675dSTing-Kang Chang HmacParameters::HashType hash_type) {
38*e7b1675dSTing-Kang Chang if (cryptographic_tag_size_in_bytes < 10) {
39*e7b1675dSTing-Kang Chang return util::Status(
40*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
41*e7b1675dSTing-Kang Chang absl::StrCat("Tag size should be at least 10 bytes, got ",
42*e7b1675dSTing-Kang Chang cryptographic_tag_size_in_bytes, " bytes."));
43*e7b1675dSTing-Kang Chang }
44*e7b1675dSTing-Kang Chang std::map<HmacParameters::HashType, uint32_t> max_tag_size = {
45*e7b1675dSTing-Kang Chang {HmacParameters::HashType::kSha1, 20},
46*e7b1675dSTing-Kang Chang {HmacParameters::HashType::kSha224, 28},
47*e7b1675dSTing-Kang Chang {HmacParameters::HashType::kSha256, 32},
48*e7b1675dSTing-Kang Chang {HmacParameters::HashType::kSha384, 48},
49*e7b1675dSTing-Kang Chang {HmacParameters::HashType::kSha512, 64}};
50*e7b1675dSTing-Kang Chang if (max_tag_size.find(hash_type) == max_tag_size.end()) {
51*e7b1675dSTing-Kang Chang return util::Status(
52*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
53*e7b1675dSTing-Kang Chang absl::StrCat("Cannot create HMAC parameters with given hash type. ",
54*e7b1675dSTing-Kang Chang hash_type, " not supported."));
55*e7b1675dSTing-Kang Chang }
56*e7b1675dSTing-Kang Chang if (cryptographic_tag_size_in_bytes > max_tag_size[hash_type]) {
57*e7b1675dSTing-Kang Chang return util::Status(
58*e7b1675dSTing-Kang Chang absl::StatusCode::kInvalidArgument,
59*e7b1675dSTing-Kang Chang absl::StrCat("Tag size is too big for given ", hash_type, " , got ",
60*e7b1675dSTing-Kang Chang cryptographic_tag_size_in_bytes, " bytes."));
61*e7b1675dSTing-Kang Chang }
62*e7b1675dSTing-Kang Chang return util::OkStatus();
63*e7b1675dSTing-Kang Chang }
64*e7b1675dSTing-Kang Chang
65*e7b1675dSTing-Kang Chang } // namespace
66*e7b1675dSTing-Kang Chang
Create(int key_size_in_bytes,int cryptographic_tag_size_in_bytes,HashType hash_type,Variant variant)67*e7b1675dSTing-Kang Chang util::StatusOr<HmacParameters> HmacParameters::Create(
68*e7b1675dSTing-Kang Chang int key_size_in_bytes, int cryptographic_tag_size_in_bytes,
69*e7b1675dSTing-Kang Chang HashType hash_type, Variant variant) {
70*e7b1675dSTing-Kang Chang if (key_size_in_bytes < 16) {
71*e7b1675dSTing-Kang Chang return util::Status(absl::StatusCode::kInvalidArgument,
72*e7b1675dSTing-Kang Chang absl::StrCat("Key size must be at least 16 bytes, got ",
73*e7b1675dSTing-Kang Chang key_size_in_bytes, " bytes."));
74*e7b1675dSTing-Kang Chang }
75*e7b1675dSTing-Kang Chang util::Status status =
76*e7b1675dSTing-Kang Chang ValidateTagSizeBytes(cryptographic_tag_size_in_bytes, hash_type);
77*e7b1675dSTing-Kang Chang if (!status.ok()) return status;
78*e7b1675dSTing-Kang Chang static const std::set<Variant>* supported_variants =
79*e7b1675dSTing-Kang Chang new std::set<Variant>({Variant::kTink, Variant::kCrunchy,
80*e7b1675dSTing-Kang Chang Variant::kLegacy, Variant::kNoPrefix});
81*e7b1675dSTing-Kang Chang if (supported_variants->find(variant) == supported_variants->end()) {
82*e7b1675dSTing-Kang Chang return util::Status(absl::StatusCode::kInvalidArgument,
83*e7b1675dSTing-Kang Chang "Cannot create HMAC parameters with unknown variant.");
84*e7b1675dSTing-Kang Chang }
85*e7b1675dSTing-Kang Chang return HmacParameters(key_size_in_bytes, cryptographic_tag_size_in_bytes,
86*e7b1675dSTing-Kang Chang hash_type, variant);
87*e7b1675dSTing-Kang Chang }
88*e7b1675dSTing-Kang Chang
TotalTagSizeInBytes() const89*e7b1675dSTing-Kang Chang int HmacParameters::TotalTagSizeInBytes() const {
90*e7b1675dSTing-Kang Chang switch (variant_) {
91*e7b1675dSTing-Kang Chang case Variant::kTink:
92*e7b1675dSTing-Kang Chang case Variant::kCrunchy:
93*e7b1675dSTing-Kang Chang case Variant::kLegacy:
94*e7b1675dSTing-Kang Chang return CryptographicTagSizeInBytes() + CryptoFormat::kNonRawPrefixSize;
95*e7b1675dSTing-Kang Chang case Variant::kNoPrefix:
96*e7b1675dSTing-Kang Chang return CryptographicTagSizeInBytes();
97*e7b1675dSTing-Kang Chang default:
98*e7b1675dSTing-Kang Chang // Parameters objects with unknown variants should never be created.
99*e7b1675dSTing-Kang Chang internal::LogFatal("HMAC parameters has an unknown variant.");
100*e7b1675dSTing-Kang Chang }
101*e7b1675dSTing-Kang Chang }
102*e7b1675dSTing-Kang Chang
operator ==(const Parameters & other) const103*e7b1675dSTing-Kang Chang bool HmacParameters::operator==(const Parameters& other) const {
104*e7b1675dSTing-Kang Chang const HmacParameters* that = dynamic_cast<const HmacParameters*>(&other);
105*e7b1675dSTing-Kang Chang if (that == nullptr) {
106*e7b1675dSTing-Kang Chang return false;
107*e7b1675dSTing-Kang Chang }
108*e7b1675dSTing-Kang Chang if (key_size_in_bytes_ != that->key_size_in_bytes_) {
109*e7b1675dSTing-Kang Chang return false;
110*e7b1675dSTing-Kang Chang }
111*e7b1675dSTing-Kang Chang if (cryptographic_tag_size_in_bytes_ !=
112*e7b1675dSTing-Kang Chang that->cryptographic_tag_size_in_bytes_) {
113*e7b1675dSTing-Kang Chang return false;
114*e7b1675dSTing-Kang Chang }
115*e7b1675dSTing-Kang Chang if (hash_type_ != that->hash_type_) {
116*e7b1675dSTing-Kang Chang return false;
117*e7b1675dSTing-Kang Chang }
118*e7b1675dSTing-Kang Chang if (variant_ != that->variant_) {
119*e7b1675dSTing-Kang Chang return false;
120*e7b1675dSTing-Kang Chang }
121*e7b1675dSTing-Kang Chang return true;
122*e7b1675dSTing-Kang Chang }
123*e7b1675dSTing-Kang Chang
124*e7b1675dSTing-Kang Chang } // namespace tink
125*e7b1675dSTing-Kang Chang } // namespace crypto
126