// Copyright 2023 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // //////////////////////////////////////////////////////////////////////////////// #include "tink/config/v0.h" #include "absl/log/check.h" #include "tink/aead/aead_wrapper.h" #include "tink/aead/aes_ctr_hmac_aead_key_manager.h" #include "tink/aead/aes_eax_key_manager.h" #include "tink/aead/aes_gcm_key_manager.h" #include "tink/aead/aes_gcm_siv_key_manager.h" #include "tink/aead/xchacha20_poly1305_key_manager.h" #include "tink/configuration.h" #include "tink/daead/aes_siv_key_manager.h" #include "tink/daead/deterministic_aead_wrapper.h" #include "tink/hybrid/ecies_aead_hkdf_private_key_manager.h" #include "tink/hybrid/ecies_aead_hkdf_public_key_manager.h" #include "tink/hybrid/hybrid_decrypt_wrapper.h" #include "tink/hybrid/hybrid_encrypt_wrapper.h" #include "tink/hybrid/internal/hpke_private_key_manager.h" #include "tink/hybrid/internal/hpke_public_key_manager.h" #include "tink/internal/configuration_impl.h" #include "tink/mac/aes_cmac_key_manager.h" #include "tink/mac/hmac_key_manager.h" #include "tink/mac/internal/chunked_mac_wrapper.h" #include "tink/mac/mac_wrapper.h" #include "tink/prf/aes_cmac_prf_key_manager.h" #include "tink/prf/hkdf_prf_key_manager.h" #include "tink/prf/hmac_prf_key_manager.h" #include "tink/prf/prf_set_wrapper.h" #include "tink/signature/ecdsa_verify_key_manager.h" #include "tink/signature/ed25519_sign_key_manager.h" #include "tink/signature/ed25519_verify_key_manager.h" #include "tink/signature/public_key_sign_wrapper.h" #include "tink/signature/public_key_verify_wrapper.h" #include "tink/signature/rsa_ssa_pkcs1_sign_key_manager.h" #include "tink/signature/rsa_ssa_pkcs1_verify_key_manager.h" #include "tink/signature/rsa_ssa_pss_sign_key_manager.h" #include "tink/signature/rsa_ssa_pss_verify_key_manager.h" #include "tink/streamingaead/aes_ctr_hmac_streaming_key_manager.h" #include "tink/streamingaead/aes_gcm_hkdf_streaming_key_manager.h" #include "tink/streamingaead/streaming_aead_wrapper.h" #include "tink/signature/ecdsa_sign_key_manager.h" namespace crypto { namespace tink { namespace { util::Status AddMac(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); } util::Status AddAead(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); } util::Status AddDeterministicAead(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); } util::Status AddStreamingAead(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); } util::Status AddHybrid(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddAsymmetricKeyManagers( absl::make_unique(), absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddAsymmetricKeyManagers( absl::make_unique(), absl::make_unique(), config); } util::Status AddPrf(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddKeyTypeManager( absl::make_unique(), config); } util::Status AddSignature(Configuration& config) { util::Status status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddPrimitiveWrapper( absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddAsymmetricKeyManagers( absl::make_unique(), absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddAsymmetricKeyManagers( absl::make_unique(), absl::make_unique(), config); if (!status.ok()) { return status; } status = internal::ConfigurationImpl::AddAsymmetricKeyManagers( absl::make_unique(), absl::make_unique(), config); if (!status.ok()) { return status; } return internal::ConfigurationImpl::AddAsymmetricKeyManagers( absl::make_unique(), absl::make_unique(), config); } } // namespace const Configuration& ConfigV0() { static const Configuration* instance = [] { static Configuration* config = new Configuration(); CHECK_OK(AddMac(*config)); CHECK_OK(AddAead(*config)); CHECK_OK(AddDeterministicAead(*config)); CHECK_OK(AddStreamingAead(*config)); CHECK_OK(AddHybrid(*config)); CHECK_OK(AddPrf(*config)); CHECK_OK(AddSignature(*config)); return config; }(); return *instance; } } // namespace tink } // namespace crypto