xref: /aosp_15_r20/external/tink/cc/mac/mac_wrapper.cc (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang // Copyright 2017 Google Inc.
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang //     http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang 
17*e7b1675dSTing-Kang Chang #include "tink/mac/mac_wrapper.h"
18*e7b1675dSTing-Kang Chang 
19*e7b1675dSTing-Kang Chang #include <memory>
20*e7b1675dSTing-Kang Chang #include <string>
21*e7b1675dSTing-Kang Chang #include <utility>
22*e7b1675dSTing-Kang Chang 
23*e7b1675dSTing-Kang Chang #include "absl/status/status.h"
24*e7b1675dSTing-Kang Chang #include "absl/strings/str_cat.h"
25*e7b1675dSTing-Kang Chang #include "tink/crypto_format.h"
26*e7b1675dSTing-Kang Chang #include "tink/internal/monitoring_util.h"
27*e7b1675dSTing-Kang Chang #include "tink/internal/registry_impl.h"
28*e7b1675dSTing-Kang Chang #include "tink/internal/util.h"
29*e7b1675dSTing-Kang Chang #include "tink/mac.h"
30*e7b1675dSTing-Kang Chang #include "tink/monitoring/monitoring.h"
31*e7b1675dSTing-Kang Chang #include "tink/primitive_set.h"
32*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
33*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
34*e7b1675dSTing-Kang Chang #include "proto/tink.pb.h"
35*e7b1675dSTing-Kang Chang 
36*e7b1675dSTing-Kang Chang namespace crypto {
37*e7b1675dSTing-Kang Chang namespace tink {
38*e7b1675dSTing-Kang Chang 
39*e7b1675dSTing-Kang Chang using google::crypto::tink::OutputPrefixType;
40*e7b1675dSTing-Kang Chang 
41*e7b1675dSTing-Kang Chang namespace {
42*e7b1675dSTing-Kang Chang 
43*e7b1675dSTing-Kang Chang constexpr absl::string_view kPrimitive = "mac";
44*e7b1675dSTing-Kang Chang constexpr absl::string_view kComputeApi = "compute";
45*e7b1675dSTing-Kang Chang constexpr absl::string_view kVerifyApi = "verify";
46*e7b1675dSTing-Kang Chang 
47*e7b1675dSTing-Kang Chang class MacSetWrapper : public Mac {
48*e7b1675dSTing-Kang Chang  public:
MacSetWrapper(std::unique_ptr<PrimitiveSet<Mac>> mac_set,std::unique_ptr<MonitoringClient> monitoring_compute_client=nullptr,std::unique_ptr<MonitoringClient> monitoring_verify_client=nullptr)49*e7b1675dSTing-Kang Chang   explicit MacSetWrapper(
50*e7b1675dSTing-Kang Chang       std::unique_ptr<PrimitiveSet<Mac>> mac_set,
51*e7b1675dSTing-Kang Chang       std::unique_ptr<MonitoringClient> monitoring_compute_client = nullptr,
52*e7b1675dSTing-Kang Chang       std::unique_ptr<MonitoringClient> monitoring_verify_client = nullptr)
53*e7b1675dSTing-Kang Chang       : mac_set_(std::move(mac_set)),
54*e7b1675dSTing-Kang Chang         monitoring_compute_client_(std::move(monitoring_compute_client)),
55*e7b1675dSTing-Kang Chang         monitoring_verify_client_(std::move(monitoring_verify_client)) {}
56*e7b1675dSTing-Kang Chang 
57*e7b1675dSTing-Kang Chang   crypto::tink::util::StatusOr<std::string> ComputeMac(
58*e7b1675dSTing-Kang Chang       absl::string_view data) const override;
59*e7b1675dSTing-Kang Chang 
60*e7b1675dSTing-Kang Chang   crypto::tink::util::Status VerifyMac(absl::string_view mac_value,
61*e7b1675dSTing-Kang Chang                                        absl::string_view data) const override;
62*e7b1675dSTing-Kang Chang 
63*e7b1675dSTing-Kang Chang   ~MacSetWrapper() override = default;
64*e7b1675dSTing-Kang Chang 
65*e7b1675dSTing-Kang Chang  private:
66*e7b1675dSTing-Kang Chang   std::unique_ptr<PrimitiveSet<Mac>> mac_set_;
67*e7b1675dSTing-Kang Chang   std::unique_ptr<MonitoringClient> monitoring_compute_client_;
68*e7b1675dSTing-Kang Chang   std::unique_ptr<MonitoringClient> monitoring_verify_client_;
69*e7b1675dSTing-Kang Chang };
70*e7b1675dSTing-Kang Chang 
Validate(PrimitiveSet<Mac> * mac_set)71*e7b1675dSTing-Kang Chang util::Status Validate(PrimitiveSet<Mac>* mac_set) {
72*e7b1675dSTing-Kang Chang   if (mac_set == nullptr) {
73*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInternal,
74*e7b1675dSTing-Kang Chang                         "mac_set must be non-NULL");
75*e7b1675dSTing-Kang Chang   }
76*e7b1675dSTing-Kang Chang   if (mac_set->get_primary() == nullptr) {
77*e7b1675dSTing-Kang Chang     return util::Status(absl::StatusCode::kInvalidArgument,
78*e7b1675dSTing-Kang Chang                         "mac_set has no primary");
79*e7b1675dSTing-Kang Chang   }
80*e7b1675dSTing-Kang Chang   return util::OkStatus();
81*e7b1675dSTing-Kang Chang }
82*e7b1675dSTing-Kang Chang 
ComputeMac(absl::string_view data) const83*e7b1675dSTing-Kang Chang util::StatusOr<std::string> MacSetWrapper::ComputeMac(
84*e7b1675dSTing-Kang Chang     absl::string_view data) const {
85*e7b1675dSTing-Kang Chang   // BoringSSL expects a non-null pointer for data,
86*e7b1675dSTing-Kang Chang   // regardless of whether the size is 0.
87*e7b1675dSTing-Kang Chang   data = internal::EnsureStringNonNull(data);
88*e7b1675dSTing-Kang Chang 
89*e7b1675dSTing-Kang Chang   auto primary = mac_set_->get_primary();
90*e7b1675dSTing-Kang Chang   std::string local_data;
91*e7b1675dSTing-Kang Chang   if (primary->get_output_prefix_type() == OutputPrefixType::LEGACY) {
92*e7b1675dSTing-Kang Chang     local_data = std::string(data);
93*e7b1675dSTing-Kang Chang     local_data.append(
94*e7b1675dSTing-Kang Chang         reinterpret_cast<const char*>(&CryptoFormat::kLegacyStartByte), 1);
95*e7b1675dSTing-Kang Chang     data = local_data;
96*e7b1675dSTing-Kang Chang   }
97*e7b1675dSTing-Kang Chang   auto compute_mac_result = primary->get_primitive().ComputeMac(data);
98*e7b1675dSTing-Kang Chang   if (!compute_mac_result.ok()) {
99*e7b1675dSTing-Kang Chang     if (monitoring_compute_client_ != nullptr) {
100*e7b1675dSTing-Kang Chang       monitoring_compute_client_->LogFailure();
101*e7b1675dSTing-Kang Chang     }
102*e7b1675dSTing-Kang Chang     return compute_mac_result.status();
103*e7b1675dSTing-Kang Chang   }
104*e7b1675dSTing-Kang Chang   if (monitoring_compute_client_ != nullptr) {
105*e7b1675dSTing-Kang Chang     monitoring_compute_client_->Log(mac_set_->get_primary()->get_key_id(),
106*e7b1675dSTing-Kang Chang                                     data.size());
107*e7b1675dSTing-Kang Chang   }
108*e7b1675dSTing-Kang Chang   const std::string& key_id = primary->get_identifier();
109*e7b1675dSTing-Kang Chang   return key_id + compute_mac_result.value();
110*e7b1675dSTing-Kang Chang }
111*e7b1675dSTing-Kang Chang 
VerifyMac(absl::string_view mac_value,absl::string_view data) const112*e7b1675dSTing-Kang Chang util::Status MacSetWrapper::VerifyMac(
113*e7b1675dSTing-Kang Chang     absl::string_view mac_value,
114*e7b1675dSTing-Kang Chang     absl::string_view data) const {
115*e7b1675dSTing-Kang Chang   data = internal::EnsureStringNonNull(data);
116*e7b1675dSTing-Kang Chang   mac_value = internal::EnsureStringNonNull(mac_value);
117*e7b1675dSTing-Kang Chang 
118*e7b1675dSTing-Kang Chang   if (mac_value.length() > CryptoFormat::kNonRawPrefixSize) {
119*e7b1675dSTing-Kang Chang     absl::string_view key_id =
120*e7b1675dSTing-Kang Chang         mac_value.substr(0, CryptoFormat::kNonRawPrefixSize);
121*e7b1675dSTing-Kang Chang     auto primitives_result = mac_set_->get_primitives(key_id);
122*e7b1675dSTing-Kang Chang     if (primitives_result.ok()) {
123*e7b1675dSTing-Kang Chang       absl::string_view raw_mac_value =
124*e7b1675dSTing-Kang Chang           mac_value.substr(CryptoFormat::kNonRawPrefixSize);
125*e7b1675dSTing-Kang Chang       for (auto& mac_entry : *(primitives_result.value())) {
126*e7b1675dSTing-Kang Chang         std::string legacy_data;
127*e7b1675dSTing-Kang Chang         absl::string_view view_on_data_or_legacy_data = data;
128*e7b1675dSTing-Kang Chang         if (mac_entry->get_output_prefix_type() == OutputPrefixType::LEGACY) {
129*e7b1675dSTing-Kang Chang           legacy_data = absl::StrCat(data, std::string("\x00", 1));
130*e7b1675dSTing-Kang Chang           view_on_data_or_legacy_data = legacy_data;
131*e7b1675dSTing-Kang Chang         }
132*e7b1675dSTing-Kang Chang         Mac& mac = mac_entry->get_primitive();
133*e7b1675dSTing-Kang Chang         util::Status status =
134*e7b1675dSTing-Kang Chang             mac.VerifyMac(raw_mac_value, view_on_data_or_legacy_data);
135*e7b1675dSTing-Kang Chang         if (status.ok()) {
136*e7b1675dSTing-Kang Chang           if (monitoring_verify_client_ != nullptr) {
137*e7b1675dSTing-Kang Chang             monitoring_verify_client_->Log(mac_entry->get_key_id(),
138*e7b1675dSTing-Kang Chang                                            data.size());
139*e7b1675dSTing-Kang Chang           }
140*e7b1675dSTing-Kang Chang           return status;
141*e7b1675dSTing-Kang Chang         } else {
142*e7b1675dSTing-Kang Chang           // TODO(przydatek): LOG that a matching key didn't verify the MAC.
143*e7b1675dSTing-Kang Chang         }
144*e7b1675dSTing-Kang Chang       }
145*e7b1675dSTing-Kang Chang     }
146*e7b1675dSTing-Kang Chang   }
147*e7b1675dSTing-Kang Chang 
148*e7b1675dSTing-Kang Chang   // No matching key succeeded with verification, try all RAW keys.
149*e7b1675dSTing-Kang Chang   auto raw_primitives_result = mac_set_->get_raw_primitives();
150*e7b1675dSTing-Kang Chang   if (raw_primitives_result.ok()) {
151*e7b1675dSTing-Kang Chang     for (auto& mac_entry : *(raw_primitives_result.value())) {
152*e7b1675dSTing-Kang Chang       Mac& mac = mac_entry->get_primitive();
153*e7b1675dSTing-Kang Chang       util::Status status = mac.VerifyMac(mac_value, data);
154*e7b1675dSTing-Kang Chang       if (status.ok()) {
155*e7b1675dSTing-Kang Chang         if (monitoring_verify_client_ != nullptr) {
156*e7b1675dSTing-Kang Chang           monitoring_verify_client_->Log(mac_entry->get_key_id(), data.size());
157*e7b1675dSTing-Kang Chang         }
158*e7b1675dSTing-Kang Chang         return status;
159*e7b1675dSTing-Kang Chang       }
160*e7b1675dSTing-Kang Chang     }
161*e7b1675dSTing-Kang Chang   }
162*e7b1675dSTing-Kang Chang   if (monitoring_verify_client_ != nullptr) {
163*e7b1675dSTing-Kang Chang     monitoring_verify_client_->LogFailure();
164*e7b1675dSTing-Kang Chang   }
165*e7b1675dSTing-Kang Chang 
166*e7b1675dSTing-Kang Chang   return util::Status(absl::StatusCode::kInvalidArgument,
167*e7b1675dSTing-Kang Chang                       "verification failed");
168*e7b1675dSTing-Kang Chang }
169*e7b1675dSTing-Kang Chang 
170*e7b1675dSTing-Kang Chang }  // namespace
171*e7b1675dSTing-Kang Chang 
Wrap(std::unique_ptr<PrimitiveSet<Mac>> mac_set) const172*e7b1675dSTing-Kang Chang util::StatusOr<std::unique_ptr<Mac>> MacWrapper::Wrap(
173*e7b1675dSTing-Kang Chang     std::unique_ptr<PrimitiveSet<Mac>> mac_set) const {
174*e7b1675dSTing-Kang Chang   util::Status status = Validate(mac_set.get());
175*e7b1675dSTing-Kang Chang   if (!status.ok()) return status;
176*e7b1675dSTing-Kang Chang 
177*e7b1675dSTing-Kang Chang   MonitoringClientFactory* const monitoring_factory =
178*e7b1675dSTing-Kang Chang       internal::RegistryImpl::GlobalInstance().GetMonitoringClientFactory();
179*e7b1675dSTing-Kang Chang 
180*e7b1675dSTing-Kang Chang   // Monitoring is not enabled. Create a wrapper without monitoring clients.
181*e7b1675dSTing-Kang Chang   if (monitoring_factory == nullptr) {
182*e7b1675dSTing-Kang Chang     return {absl::make_unique<MacSetWrapper>(std::move(mac_set))};
183*e7b1675dSTing-Kang Chang   }
184*e7b1675dSTing-Kang Chang 
185*e7b1675dSTing-Kang Chang   util::StatusOr<MonitoringKeySetInfo> keyset_info =
186*e7b1675dSTing-Kang Chang       internal::MonitoringKeySetInfoFromPrimitiveSet(*mac_set);
187*e7b1675dSTing-Kang Chang   if (!keyset_info.ok()) {
188*e7b1675dSTing-Kang Chang     return keyset_info.status();
189*e7b1675dSTing-Kang Chang   }
190*e7b1675dSTing-Kang Chang 
191*e7b1675dSTing-Kang Chang   util::StatusOr<std::unique_ptr<MonitoringClient>> monitoring_compute_client =
192*e7b1675dSTing-Kang Chang       monitoring_factory->New(
193*e7b1675dSTing-Kang Chang           MonitoringContext(kPrimitive, kComputeApi, *keyset_info));
194*e7b1675dSTing-Kang Chang   if (!monitoring_compute_client.ok()) {
195*e7b1675dSTing-Kang Chang     return monitoring_compute_client.status();
196*e7b1675dSTing-Kang Chang   }
197*e7b1675dSTing-Kang Chang 
198*e7b1675dSTing-Kang Chang   util::StatusOr<std::unique_ptr<MonitoringClient>> monitoring_verify_client =
199*e7b1675dSTing-Kang Chang       monitoring_factory->New(
200*e7b1675dSTing-Kang Chang           MonitoringContext(kPrimitive, kVerifyApi, *keyset_info));
201*e7b1675dSTing-Kang Chang   if (!monitoring_verify_client.ok()) {
202*e7b1675dSTing-Kang Chang     return monitoring_verify_client.status();
203*e7b1675dSTing-Kang Chang   }
204*e7b1675dSTing-Kang Chang 
205*e7b1675dSTing-Kang Chang   return {absl::make_unique<MacSetWrapper>(
206*e7b1675dSTing-Kang Chang       std::move(mac_set), *std::move(monitoring_compute_client),
207*e7b1675dSTing-Kang Chang       *std::move(monitoring_verify_client))};
208*e7b1675dSTing-Kang Chang }
209*e7b1675dSTing-Kang Chang 
210*e7b1675dSTing-Kang Chang }  // namespace tink
211*e7b1675dSTing-Kang Chang }  // namespace crypto
212