blob: 5dd9ab6cbbe54c7406baa414a5a1752504825993 [file] [log] [blame]
// Copyright 2023 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
////////////////////////////////////////////////////////////////////////////////
#ifndef TINK_INTERNAL_KEY_GEN_CONFIGURATION_IMPL_H_
#define TINK_INTERNAL_KEY_GEN_CONFIGURATION_IMPL_H_
#include <memory>
#include "absl/status/status.h"
#include "absl/strings/string_view.h"
#include "tink/internal/key_type_info_store.h"
#include "tink/key_gen_configuration.h"
#include "tink/key_manager.h"
#include "tink/util/status.h"
#include "tink/util/statusor.h"
namespace crypto {
namespace tink {
namespace internal {
constexpr absl::string_view kKeyGenConfigurationImplErr =
"Use crypto::tink::Registry instead when in global registry mode.";
class KeyGenConfigurationImpl {
public:
template <class KM>
static crypto::tink::util::Status AddKeyTypeManager(
std::unique_ptr<KM> key_manager,
crypto::tink::KeyGenConfiguration& config) {
if (config.global_registry_mode_) {
return crypto::tink::util::Status(absl::StatusCode::kFailedPrecondition,
kKeyGenConfigurationImplErr);
}
return config.key_type_info_store_.AddKeyTypeManager(
std::move(key_manager), /*new_key_allowed=*/true);
}
template <class PrivateKM, class PublicKM>
static crypto::tink::util::Status AddAsymmetricKeyManagers(
std::unique_ptr<PrivateKM> private_key_manager,
std::unique_ptr<PublicKM> public_key_manager,
crypto::tink::KeyGenConfiguration& config) {
if (config.global_registry_mode_) {
return crypto::tink::util::Status(absl::StatusCode::kFailedPrecondition,
kKeyGenConfigurationImplErr);
}
return config.key_type_info_store_.AddAsymmetricKeyTypeManagers(
std::move(private_key_manager), std::move(public_key_manager),
/*new_key_allowed=*/true);
}
template <class P>
static crypto::tink::util::Status AddLegacyKeyManager(
std::unique_ptr<KeyManager<P>> key_manager,
crypto::tink::KeyGenConfiguration& config) {
if (config.global_registry_mode_) {
return crypto::tink::util::Status(absl::StatusCode::kFailedPrecondition,
kKeyGenConfigurationImplErr);
}
return config.key_type_info_store_.AddKeyManager(std::move(key_manager),
/*new_key_allowed=*/true);
}
static crypto::tink::util::StatusOr<
const crypto::tink::internal::KeyTypeInfoStore*>
GetKeyTypeInfoStore(const crypto::tink::KeyGenConfiguration& config) {
if (config.global_registry_mode_) {
return crypto::tink::util::Status(absl::StatusCode::kFailedPrecondition,
kKeyGenConfigurationImplErr);
}
return &config.key_type_info_store_;
}
// `config` can be set to global registry mode only if empty.
static crypto::tink::util::Status SetGlobalRegistryMode(
crypto::tink::KeyGenConfiguration& config) {
if (!config.key_type_info_store_.IsEmpty()) {
return crypto::tink::util::Status(
absl::StatusCode::kFailedPrecondition,
"Using the global registry is only allowed when KeyGenConfiguration "
"is empty.");
}
config.global_registry_mode_ = true;
return crypto::tink::util::OkStatus();
}
static bool IsInGlobalRegistryMode(
const crypto::tink::KeyGenConfiguration& config) {
return config.global_registry_mode_;
}
};
} // namespace internal
} // namespace tink
} // namespace crypto
#endif // TINK_INTERNAL_KEY_GEN_CONFIGURATION_IMPL_H_