1*e7b1675dSTing-Kang Chang /** 2*e7b1675dSTing-Kang Chang * Copyright 2021 Google LLC 3*e7b1675dSTing-Kang Chang * 4*e7b1675dSTing-Kang Chang * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except 5*e7b1675dSTing-Kang Chang * in compliance with the License. You may obtain a copy of the License at 6*e7b1675dSTing-Kang Chang * 7*e7b1675dSTing-Kang Chang * http://www.apache.org/licenses/LICENSE-2.0 8*e7b1675dSTing-Kang Chang * 9*e7b1675dSTing-Kang Chang * Unless required by applicable law or agreed to in writing, software distributed under the License 10*e7b1675dSTing-Kang Chang * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express 11*e7b1675dSTing-Kang Chang * or implied. See the License for the specific language governing permissions and limitations under 12*e7b1675dSTing-Kang Chang * the License. 13*e7b1675dSTing-Kang Chang */ 14*e7b1675dSTing-Kang Chang // [START mac-example] 15*e7b1675dSTing-Kang Chang package mac; 16*e7b1675dSTing-Kang Chang 17*e7b1675dSTing-Kang Chang import static java.nio.charset.StandardCharsets.UTF_8; 18*e7b1675dSTing-Kang Chang 19*e7b1675dSTing-Kang Chang import com.google.crypto.tink.InsecureSecretKeyAccess; 20*e7b1675dSTing-Kang Chang import com.google.crypto.tink.KeysetHandle; 21*e7b1675dSTing-Kang Chang import com.google.crypto.tink.Mac; 22*e7b1675dSTing-Kang Chang import com.google.crypto.tink.TinkJsonProtoKeysetFormat; 23*e7b1675dSTing-Kang Chang import com.google.crypto.tink.mac.MacConfig; 24*e7b1675dSTing-Kang Chang import java.nio.file.Files; 25*e7b1675dSTing-Kang Chang import java.nio.file.Path; 26*e7b1675dSTing-Kang Chang import java.nio.file.Paths; 27*e7b1675dSTing-Kang Chang 28*e7b1675dSTing-Kang Chang /** 29*e7b1675dSTing-Kang Chang * A command-line utility for checking file integrity with a Message Authentication Code (MAC). 30*e7b1675dSTing-Kang Chang * 31*e7b1675dSTing-Kang Chang * <p>It loads cleartext keys from disk - this is not recommended! 32*e7b1675dSTing-Kang Chang * 33*e7b1675dSTing-Kang Chang * <p>It requires the following arguments: 34*e7b1675dSTing-Kang Chang * 35*e7b1675dSTing-Kang Chang * <ul> 36*e7b1675dSTing-Kang Chang * <li>mode: either 'compute' or 'verify'. 37*e7b1675dSTing-Kang Chang * <li>key-file: Read the key material from this file. 38*e7b1675dSTing-Kang Chang * <li>input-file: Read the input from this file. 39*e7b1675dSTing-Kang Chang * <li>mac-file: name of the file containing a hexadecimal MAC of the input data. 40*e7b1675dSTing-Kang Chang */ 41*e7b1675dSTing-Kang Chang public final class MacExample { main(String[] args)42*e7b1675dSTing-Kang Chang public static void main(String[] args) throws Exception { 43*e7b1675dSTing-Kang Chang if (args.length != 4) { 44*e7b1675dSTing-Kang Chang System.err.printf("Expected 4 parameters, got %d\n", args.length); 45*e7b1675dSTing-Kang Chang System.err.println("Usage: java MacExample compute/verify key-file input-file mac-file"); 46*e7b1675dSTing-Kang Chang System.exit(1); 47*e7b1675dSTing-Kang Chang } 48*e7b1675dSTing-Kang Chang String mode = args[0]; 49*e7b1675dSTing-Kang Chang if (!mode.equals("compute") && !mode.equals("verify")) { 50*e7b1675dSTing-Kang Chang System.err.println("Incorrect mode. Please select compute or verify."); 51*e7b1675dSTing-Kang Chang System.exit(1); 52*e7b1675dSTing-Kang Chang } 53*e7b1675dSTing-Kang Chang Path keyFile = Paths.get(args[1]); 54*e7b1675dSTing-Kang Chang byte[] msg = Files.readAllBytes(Paths.get(args[2])); 55*e7b1675dSTing-Kang Chang Path macFile = Paths.get(args[3]); 56*e7b1675dSTing-Kang Chang 57*e7b1675dSTing-Kang Chang // Register all MAC key types with the Tink runtime. 58*e7b1675dSTing-Kang Chang MacConfig.register(); 59*e7b1675dSTing-Kang Chang 60*e7b1675dSTing-Kang Chang // Read the keyset into a KeysetHandle. 61*e7b1675dSTing-Kang Chang KeysetHandle handle = 62*e7b1675dSTing-Kang Chang TinkJsonProtoKeysetFormat.parseKeyset( 63*e7b1675dSTing-Kang Chang new String(Files.readAllBytes(keyFile), UTF_8), InsecureSecretKeyAccess.get()); 64*e7b1675dSTing-Kang Chang 65*e7b1675dSTing-Kang Chang // Get the primitive. 66*e7b1675dSTing-Kang Chang Mac macPrimitive = handle.getPrimitive(Mac.class); 67*e7b1675dSTing-Kang Chang 68*e7b1675dSTing-Kang Chang if (mode.equals("compute")) { 69*e7b1675dSTing-Kang Chang byte[] macTag = macPrimitive.computeMac(msg); 70*e7b1675dSTing-Kang Chang Files.write(macFile, macTag); 71*e7b1675dSTing-Kang Chang } else { 72*e7b1675dSTing-Kang Chang byte[] macTag = Files.readAllBytes(macFile); 73*e7b1675dSTing-Kang Chang // This will throw a GeneralSecurityException if verification fails. 74*e7b1675dSTing-Kang Chang macPrimitive.verifyMac(macTag, msg); 75*e7b1675dSTing-Kang Chang } 76*e7b1675dSTing-Kang Chang } 77*e7b1675dSTing-Kang Chang MacExample()78*e7b1675dSTing-Kang Chang private MacExample() {} 79*e7b1675dSTing-Kang Chang } 80*e7b1675dSTing-Kang Chang // [END mac-example] 81