/src/openssl/providers/defltprov.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <string.h> |
11 | | #include <stdio.h> |
12 | | #include <openssl/opensslconf.h> |
13 | | #include <openssl/core.h> |
14 | | #include <openssl/core_numbers.h> |
15 | | #include <openssl/core_names.h> |
16 | | #include <openssl/params.h> |
17 | | #include "prov/bio.h" |
18 | | #include "prov/providercommon.h" |
19 | | #include "prov/implementations.h" |
20 | | #include "prov/provider_util.h" |
21 | | #include "internal/nelem.h" |
22 | | |
23 | | #define ALGC(NAMES, FUNC, CHECK) { { NAMES, "default=yes", FUNC }, CHECK } |
24 | | #define ALG(NAMES, FUNC) ALGC(NAMES, FUNC, NULL) |
25 | | |
26 | | /* Functions provided by the core */ |
27 | | static OSSL_core_gettable_params_fn *c_gettable_params = NULL; |
28 | | static OSSL_core_get_params_fn *c_get_params = NULL; |
29 | | |
30 | | /* Parameters we provide to the core */ |
31 | | static const OSSL_PARAM deflt_param_types[] = { |
32 | | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), |
33 | | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), |
34 | | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), |
35 | | OSSL_PARAM_END |
36 | | }; |
37 | | |
38 | | static const OSSL_PARAM *deflt_gettable_params(const OSSL_PROVIDER *prov) |
39 | 0 | { |
40 | 0 | return deflt_param_types; |
41 | 0 | } |
42 | | |
43 | | static int deflt_get_params(const OSSL_PROVIDER *prov, OSSL_PARAM params[]) |
44 | 0 | { |
45 | 0 | OSSL_PARAM *p; |
46 | |
|
47 | 0 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); |
48 | 0 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Default Provider")) |
49 | 0 | return 0; |
50 | 0 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); |
51 | 0 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) |
52 | 0 | return 0; |
53 | 0 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); |
54 | 0 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) |
55 | 0 | return 0; |
56 | | |
57 | 0 | return 1; |
58 | 0 | } |
59 | | |
60 | | /* |
61 | | * For the algorithm names, we use the following formula for our primary |
62 | | * names: |
63 | | * |
64 | | * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] |
65 | | * |
66 | | * VERSION is only present if there are multiple versions of |
67 | | * an alg (MD2, MD4, MD5). It may be omitted if there is only |
68 | | * one version (if a subsequent version is released in the future, |
69 | | * we can always change the canonical name, and add the old name |
70 | | * as an alias). |
71 | | * |
72 | | * SUBNAME may be present where we are combining multiple |
73 | | * algorithms together, e.g. MD5-SHA1. |
74 | | * |
75 | | * SIZE is only present if multiple versions of an algorithm exist |
76 | | * with different sizes (e.g. AES-128-CBC, AES-256-CBC) |
77 | | * |
78 | | * MODE is only present where applicable. |
79 | | * |
80 | | * We add diverse other names where applicable, such as the names that |
81 | | * NIST uses, or that are used for ASN.1 OBJECT IDENTIFIERs, or names |
82 | | * we have used historically. |
83 | | * |
84 | | * Algorithm names are case insensitive, but we use all caps in our "canonical" |
85 | | * names for consistency. |
86 | | */ |
87 | | static const OSSL_ALGORITHM deflt_digests[] = { |
88 | | /* Our primary name:NIST name[:our older names] */ |
89 | | { "SHA1:SHA-1", "default=yes", sha1_functions }, |
90 | | { "SHA2-224:SHA-224:SHA224", "default=yes", sha224_functions }, |
91 | | { "SHA2-256:SHA-256:SHA256", "default=yes", sha256_functions }, |
92 | | { "SHA2-384:SHA-384:SHA384", "default=yes", sha384_functions }, |
93 | | { "SHA2-512:SHA-512:SHA512", "default=yes", sha512_functions }, |
94 | | { "SHA2-512/224:SHA-512/224:SHA512-224", "default=yes", |
95 | | sha512_224_functions }, |
96 | | { "SHA2-512/256:SHA-512/256:SHA512-256", "default=yes", |
97 | | sha512_256_functions }, |
98 | | |
99 | | /* We agree with NIST here, so one name only */ |
100 | | { "SHA3-224", "default=yes", sha3_224_functions }, |
101 | | { "SHA3-256", "default=yes", sha3_256_functions }, |
102 | | { "SHA3-384", "default=yes", sha3_384_functions }, |
103 | | { "SHA3-512", "default=yes", sha3_512_functions }, |
104 | | |
105 | | /* |
106 | | * KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for |
107 | | * the KMAC-128 and KMAC-256. |
108 | | */ |
109 | | { "KECCAK-KMAC-128:KECCAK-KMAC128", "default=yes", keccak_kmac_128_functions }, |
110 | | { "KECCAK-KMAC-256:KECCAK-KMAC256", "default=yes", keccak_kmac_256_functions }, |
111 | | |
112 | | /* Our primary name:NIST name */ |
113 | | { "SHAKE-128:SHAKE128", "default=yes", shake_128_functions }, |
114 | | { "SHAKE-256:SHAKE256", "default=yes", shake_256_functions }, |
115 | | |
116 | | #ifndef OPENSSL_NO_BLAKE2 |
117 | | /* |
118 | | * https://blake2.net/ doesn't specify size variants, |
119 | | * but mentions that Bouncy Castle uses the names |
120 | | * BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and BLAKE2b-512 |
121 | | * If we assume that "2b" and "2s" are versions, that pattern |
122 | | * fits with ours. We also add our historical names. |
123 | | */ |
124 | | { "BLAKE2S-256:BLAKE2s256", "default=yes", blake2s256_functions }, |
125 | | { "BLAKE2B-512:BLAKE2b512", "default=yes", blake2b512_functions }, |
126 | | #endif /* OPENSSL_NO_BLAKE2 */ |
127 | | |
128 | | #ifndef OPENSSL_NO_SM3 |
129 | | { "SM3", "default=yes", sm3_functions }, |
130 | | #endif /* OPENSSL_NO_SM3 */ |
131 | | |
132 | | #ifndef OPENSSL_NO_MD5 |
133 | | { "MD5", "default=yes", md5_functions }, |
134 | | { "MD5-SHA1", "default=yes", md5_sha1_functions }, |
135 | | #endif /* OPENSSL_NO_MD5 */ |
136 | | |
137 | | { NULL, NULL, NULL } |
138 | | }; |
139 | | |
140 | | static const OSSL_ALGORITHM_CAPABLE deflt_ciphers[] = { |
141 | | ALG("NULL", null_functions), |
142 | | ALG("AES-256-ECB", aes256ecb_functions), |
143 | | ALG("AES-192-ECB", aes192ecb_functions), |
144 | | ALG("AES-128-ECB", aes128ecb_functions), |
145 | | ALG("AES-256-CBC", aes256cbc_functions), |
146 | | ALG("AES-192-CBC", aes192cbc_functions), |
147 | | ALG("AES-128-CBC", aes128cbc_functions), |
148 | | ALG("AES-256-OFB", aes256ofb_functions), |
149 | | ALG("AES-192-OFB", aes192ofb_functions), |
150 | | ALG("AES-128-OFB", aes128ofb_functions), |
151 | | ALG("AES-256-CFB", aes256cfb_functions), |
152 | | ALG("AES-192-CFB", aes192cfb_functions), |
153 | | ALG("AES-128-CFB", aes128cfb_functions), |
154 | | ALG("AES-256-CFB1", aes256cfb1_functions), |
155 | | ALG("AES-192-CFB1", aes192cfb1_functions), |
156 | | ALG("AES-128-CFB1", aes128cfb1_functions), |
157 | | ALG("AES-256-CFB8", aes256cfb8_functions), |
158 | | ALG("AES-192-CFB8", aes192cfb8_functions), |
159 | | ALG("AES-128-CFB8", aes128cfb8_functions), |
160 | | ALG("AES-256-CTR", aes256ctr_functions), |
161 | | ALG("AES-192-CTR", aes192ctr_functions), |
162 | | ALG("AES-128-CTR", aes128ctr_functions), |
163 | | ALG("AES-256-XTS", aes256xts_functions), |
164 | | ALG("AES-128-XTS", aes128xts_functions), |
165 | | #ifndef OPENSSL_NO_OCB |
166 | | ALG("AES-256-OCB", aes256ocb_functions), |
167 | | ALG("AES-192-OCB", aes192ocb_functions), |
168 | | ALG("AES-128-OCB", aes128ocb_functions), |
169 | | #endif /* OPENSSL_NO_OCB */ |
170 | | #ifndef OPENSSL_NO_SIV |
171 | | ALG("AES-128-SIV", aes128siv_functions), |
172 | | ALG("AES-192-SIV", aes192siv_functions), |
173 | | ALG("AES-256-SIV", aes256siv_functions), |
174 | | #endif /* OPENSSL_NO_SIV */ |
175 | | ALG("AES-256-GCM:id-aes256-GCM", aes256gcm_functions), |
176 | | ALG("AES-192-GCM:id-aes192-GCM", aes192gcm_functions), |
177 | | ALG("AES-128-GCM:id-aes128-GCM", aes128gcm_functions), |
178 | | ALG("AES-256-CCM:id-aes256-CCM", aes256ccm_functions), |
179 | | ALG("AES-192-CCM:id-aes192-CCM", aes192ccm_functions), |
180 | | ALG("AES-128-CCM:id-aes128-CCM", aes128ccm_functions), |
181 | | ALG("AES-256-WRAP:id-aes256-wrap:AES256-WRAP", aes256wrap_functions), |
182 | | ALG("AES-192-WRAP:id-aes192-wrap:AES192-WRAP", aes192wrap_functions), |
183 | | ALG("AES-128-WRAP:id-aes128-wrap:AES128-WRAP", aes128wrap_functions), |
184 | | ALG("AES-256-WRAP-PAD:id-aes256-wrap-pad:AES256-WRAP-PAD", |
185 | | aes256wrappad_functions), |
186 | | ALG("AES-192-WRAP-PAD:id-aes192-wrap-pad:AES192-WRAP-PAD", |
187 | | aes192wrappad_functions), |
188 | | ALG("AES-128-WRAP-PAD:id-aes128-wrap-pad:AES128-WRAP-PAD", |
189 | | aes128wrappad_functions), |
190 | | ALGC("AES-128-CBC-HMAC-SHA1", aes128cbc_hmac_sha1_functions, |
191 | | cipher_capable_aes_cbc_hmac_sha1), |
192 | | ALGC("AES-256-CBC-HMAC-SHA1", aes256cbc_hmac_sha1_functions, |
193 | | cipher_capable_aes_cbc_hmac_sha1), |
194 | | ALGC("AES-128-CBC-HMAC-SHA256", aes128cbc_hmac_sha256_functions, |
195 | | cipher_capable_aes_cbc_hmac_sha256), |
196 | | ALGC("AES-256-CBC-HMAC-SHA256", aes256cbc_hmac_sha256_functions, |
197 | | cipher_capable_aes_cbc_hmac_sha256), |
198 | | #ifndef OPENSSL_NO_ARIA |
199 | | ALG("ARIA-256-GCM", aria256gcm_functions), |
200 | | ALG("ARIA-192-GCM", aria192gcm_functions), |
201 | | ALG("ARIA-128-GCM", aria128gcm_functions), |
202 | | ALG("ARIA-256-CCM", aria256ccm_functions), |
203 | | ALG("ARIA-192-CCM", aria192ccm_functions), |
204 | | ALG("ARIA-128-CCM", aria128ccm_functions), |
205 | | ALG("ARIA-256-ECB", aria256ecb_functions), |
206 | | ALG("ARIA-192-ECB", aria192ecb_functions), |
207 | | ALG("ARIA-128-ECB", aria128ecb_functions), |
208 | | ALG("ARIA-256-CBC:ARIA256", aria256cbc_functions), |
209 | | ALG("ARIA-192-CBC:ARIA192", aria192cbc_functions), |
210 | | ALG("ARIA-128-CBC:ARIA128", aria128cbc_functions), |
211 | | ALG("ARIA-256-OFB", aria256ofb_functions), |
212 | | ALG("ARIA-192-OFB", aria192ofb_functions), |
213 | | ALG("ARIA-128-OFB", aria128ofb_functions), |
214 | | ALG("ARIA-256-CFB", aria256cfb_functions), |
215 | | ALG("ARIA-192-CFB", aria192cfb_functions), |
216 | | ALG("ARIA-128-CFB", aria128cfb_functions), |
217 | | ALG("ARIA-256-CFB1", aria256cfb1_functions), |
218 | | ALG("ARIA-192-CFB1", aria192cfb1_functions), |
219 | | ALG("ARIA-128-CFB1", aria128cfb1_functions), |
220 | | ALG("ARIA-256-CFB8", aria256cfb8_functions), |
221 | | ALG("ARIA-192-CFB8", aria192cfb8_functions), |
222 | | ALG("ARIA-128-CFB8", aria128cfb8_functions), |
223 | | ALG("ARIA-256-CTR", aria256ctr_functions), |
224 | | ALG("ARIA-192-CTR", aria192ctr_functions), |
225 | | ALG("ARIA-128-CTR", aria128ctr_functions), |
226 | | #endif /* OPENSSL_NO_ARIA */ |
227 | | #ifndef OPENSSL_NO_CAMELLIA |
228 | | ALG("CAMELLIA-256-ECB", camellia256ecb_functions), |
229 | | ALG("CAMELLIA-192-ECB", camellia192ecb_functions), |
230 | | ALG("CAMELLIA-128-ECB", camellia128ecb_functions), |
231 | | ALG("CAMELLIA-256-CBC:CAMELLIA256", camellia256cbc_functions), |
232 | | ALG("CAMELLIA-192-CBC:CAMELLIA192", camellia192cbc_functions), |
233 | | ALG("CAMELLIA-128-CBC:CAMELLIA128", camellia128cbc_functions), |
234 | | ALG("CAMELLIA-256-OFB", camellia256ofb_functions), |
235 | | ALG("CAMELLIA-192-OFB", camellia192ofb_functions), |
236 | | ALG("CAMELLIA-128-OFB", camellia128ofb_functions), |
237 | | ALG("CAMELLIA-256-CFB", camellia256cfb_functions), |
238 | | ALG("CAMELLIA-192-CFB", camellia192cfb_functions), |
239 | | ALG("CAMELLIA-128-CFB", camellia128cfb_functions), |
240 | | ALG("CAMELLIA-256-CFB1", camellia256cfb1_functions), |
241 | | ALG("CAMELLIA-192-CFB1", camellia192cfb1_functions), |
242 | | ALG("CAMELLIA-128-CFB1", camellia128cfb1_functions), |
243 | | ALG("CAMELLIA-256-CFB8", camellia256cfb8_functions), |
244 | | ALG("CAMELLIA-192-CFB8", camellia192cfb8_functions), |
245 | | ALG("CAMELLIA-128-CFB8", camellia128cfb8_functions), |
246 | | ALG("CAMELLIA-256-CTR", camellia256ctr_functions), |
247 | | ALG("CAMELLIA-192-CTR", camellia192ctr_functions), |
248 | | ALG("CAMELLIA-128-CTR", camellia128ctr_functions), |
249 | | #endif /* OPENSSL_NO_CAMELLIA */ |
250 | | #ifndef OPENSSL_NO_DES |
251 | | ALG("DES-EDE3-ECB:DES-EDE3", tdes_ede3_ecb_functions), |
252 | | ALG("DES-EDE3-CBC:DES3", tdes_ede3_cbc_functions), |
253 | | ALG("DES-EDE3-OFB", tdes_ede3_ofb_functions), |
254 | | ALG("DES-EDE3-CFB", tdes_ede3_cfb_functions), |
255 | | ALG("DES-EDE3-CFB8", tdes_ede3_cfb8_functions), |
256 | | ALG("DES-EDE3-CFB1", tdes_ede3_cfb1_functions), |
257 | | ALG("DES-EDE-ECB:DES-EDE", tdes_ede2_ecb_functions), |
258 | | ALG("DES-EDE-CBC", tdes_ede2_cbc_functions), |
259 | | ALG("DES-EDE-OFB", tdes_ede2_ofb_functions), |
260 | | ALG("DES-EDE-CFB", tdes_ede2_cfb_functions), |
261 | | ALG("DESX-CBC:DESX", tdes_desx_cbc_functions), |
262 | | ALG("DES3-WRAP:id-smime-alg-CMS3DESwrap", tdes_wrap_cbc_functions), |
263 | | ALG("DES-ECB", des_ecb_functions), |
264 | | ALG("DES-CBC:DES", des_cbc_functions), |
265 | | ALG("DES-OFB", des_ofb64_functions), |
266 | | ALG("DES-CFB", des_cfb64_functions), |
267 | | ALG("DES-CFB1", des_cfb1_functions), |
268 | | ALG("DES-CFB8", des_cfb8_functions), |
269 | | #endif /* OPENSSL_NO_DES */ |
270 | | #ifndef OPENSSL_NO_BF |
271 | | ALG("BF-ECB", blowfish128ecb_functions), |
272 | | ALG("BF-CBC:BF:BLOWFISH", blowfish128cbc_functions), |
273 | | ALG("BF-OFB", blowfish64ofb64_functions), |
274 | | ALG("BF-CFB", blowfish64cfb64_functions), |
275 | | #endif /* OPENSSL_NO_BF */ |
276 | | #ifndef OPENSSL_NO_IDEA |
277 | | ALG("IDEA-ECB", idea128ecb_functions), |
278 | | ALG("IDEA-CBC:IDEA", idea128cbc_functions), |
279 | | ALG("IDEA-OFB:IDEA-OFB64", idea128ofb64_functions), |
280 | | ALG("IDEA-CFB:IDEA-CFB64", idea128cfb64_functions), |
281 | | #endif /* OPENSSL_NO_IDEA */ |
282 | | #ifndef OPENSSL_NO_CAST |
283 | | ALG("CAST5-ECB", cast5128ecb_functions), |
284 | | ALG("CAST5-CBC:CAST-CBC:CAST", cast5128cbc_functions), |
285 | | ALG("CAST5-OFB", cast564ofb64_functions), |
286 | | ALG("CAST5-CFB", cast564cfb64_functions), |
287 | | #endif /* OPENSSL_NO_CAST */ |
288 | | #ifndef OPENSSL_NO_SEED |
289 | | ALG("SEED-ECB", seed128ecb_functions), |
290 | | ALG("SEED-CBC:SEED", seed128cbc_functions), |
291 | | ALG("SEED-OFB:SEED-OFB128", seed128ofb128_functions), |
292 | | ALG("SEED-CFB:SEED-CFB128", seed128cfb128_functions), |
293 | | #endif /* OPENSSL_NO_SEED */ |
294 | | #ifndef OPENSSL_NO_SM4 |
295 | | ALG("SM4-ECB", sm4128ecb_functions), |
296 | | ALG("SM4-CBC:SM4", sm4128cbc_functions), |
297 | | ALG("SM4-CTR", sm4128ctr_functions), |
298 | | ALG("SM4-OFB:SM4-OFB128", sm4128ofb128_functions), |
299 | | ALG("SM4-CFB:SM4-CFB128", sm4128cfb128_functions), |
300 | | #endif /* OPENSSL_NO_SM4 */ |
301 | | #ifndef OPENSSL_NO_RC4 |
302 | | ALG("RC4", rc4128_functions), |
303 | | ALG("RC4-40", rc440_functions), |
304 | | # ifndef OPENSSL_NO_MD5 |
305 | | ALG("RC4-HMAC-MD5", rc4_hmac_md5_functions), |
306 | | # endif /* OPENSSL_NO_MD5 */ |
307 | | #endif /* OPENSSL_NO_RC4 */ |
308 | | #ifndef OPENSSL_NO_RC5 |
309 | | ALG("RC5-ECB", rc5128ecb_functions), |
310 | | ALG("RC5-CBC", rc5128cbc_functions), |
311 | | ALG("RC5-OFB", rc5128ofb64_functions), |
312 | | ALG("RC5-CFB", rc5128cfb64_functions), |
313 | | #endif /* OPENSSL_NO_RC5 */ |
314 | | #ifndef OPENSSL_NO_RC2 |
315 | | ALG("RC2-ECB", rc2128ecb_functions), |
316 | | ALG("RC2-CBC", rc2128cbc_functions), |
317 | | ALG("RC2-40-CBC", rc240cbc_functions), |
318 | | ALG("RC2-64-CBC", rc264cbc_functions), |
319 | | ALG("RC2-CFB", rc2128cfb128_functions), |
320 | | ALG("RC2-OFB", rc2128ofb128_functions), |
321 | | #endif /* OPENSSL_NO_RC2 */ |
322 | | #ifndef OPENSSL_NO_CHACHA |
323 | | ALG("ChaCha20", chacha20_functions), |
324 | | # ifndef OPENSSL_NO_POLY1305 |
325 | | ALG("ChaCha20-Poly1305", chacha20_poly1305_functions), |
326 | | # endif /* OPENSSL_NO_POLY1305 */ |
327 | | #endif /* OPENSSL_NO_CHACHA */ |
328 | | { { NULL, NULL, NULL }, NULL } |
329 | | }; |
330 | | static OSSL_ALGORITHM exported_ciphers[OSSL_NELEM(deflt_ciphers)]; |
331 | | |
332 | | static const OSSL_ALGORITHM deflt_macs[] = { |
333 | | #ifndef OPENSSL_NO_BLAKE2 |
334 | | { "BLAKE2BMAC", "default=yes", blake2bmac_functions }, |
335 | | { "BLAKE2SMAC", "default=yes", blake2smac_functions }, |
336 | | #endif |
337 | | #ifndef OPENSSL_NO_CMAC |
338 | | { "CMAC", "default=yes", cmac_functions }, |
339 | | #endif |
340 | | { "GMAC", "default=yes", gmac_functions }, |
341 | | { "HMAC", "default=yes", hmac_functions }, |
342 | | { "KMAC-128:KMAC128", "default=yes", kmac128_functions }, |
343 | | { "KMAC-256:KMAC256", "default=yes", kmac256_functions }, |
344 | | #ifndef OPENSSL_NO_SIPHASH |
345 | | { "SIPHASH", "default=yes", siphash_functions }, |
346 | | #endif |
347 | | #ifndef OPENSSL_NO_POLY1305 |
348 | | { "POLY1305", "default=yes", poly1305_functions }, |
349 | | #endif |
350 | | { NULL, NULL, NULL } |
351 | | }; |
352 | | |
353 | | static const OSSL_ALGORITHM deflt_kdfs[] = { |
354 | | { "HKDF", "default=yes", kdf_hkdf_functions }, |
355 | | { "SSKDF", "default=yes", kdf_sskdf_functions }, |
356 | | { "PBKDF2", "default=yes", kdf_pbkdf2_functions }, |
357 | | { "SSHKDF", "default=yes", kdf_sshkdf_functions }, |
358 | | { "X963KDF", "default=yes", kdf_x963_kdf_functions }, |
359 | | { "TLS1-PRF", "default=yes", kdf_tls1_prf_functions }, |
360 | | { "KBKDF", "default=yes", kdf_kbkdf_functions }, |
361 | | #ifndef OPENSSL_NO_CMS |
362 | | { "X942KDF", "default=yes", kdf_x942_kdf_functions }, |
363 | | #endif |
364 | | #ifndef OPENSSL_NO_SCRYPT |
365 | | { "SCRYPT:id-scrypt", "default=yes", kdf_scrypt_functions }, |
366 | | #endif |
367 | | { "KRB5KDF", "default=yes", kdf_krb5kdf_functions }, |
368 | | { NULL, NULL, NULL } |
369 | | }; |
370 | | |
371 | | static const OSSL_ALGORITHM deflt_keyexch[] = { |
372 | | #ifndef OPENSSL_NO_DH |
373 | | { "DH:dhKeyAgreement", "default=yes", dh_keyexch_functions }, |
374 | | #endif |
375 | | { NULL, NULL, NULL } |
376 | | }; |
377 | | |
378 | | static const OSSL_ALGORITHM deflt_signature[] = { |
379 | | #ifndef OPENSSL_NO_DSA |
380 | | { "DSA:dsaEncryption", "default=yes", dsa_signature_functions }, |
381 | | #endif |
382 | | { NULL, NULL, NULL } |
383 | | }; |
384 | | |
385 | | static const OSSL_ALGORITHM deflt_asym_cipher[] = { |
386 | | { "RSA:rsaEncryption", "default=yes", rsa_asym_cipher_functions }, |
387 | | { NULL, NULL, NULL } |
388 | | }; |
389 | | |
390 | | static const OSSL_ALGORITHM deflt_keymgmt[] = { |
391 | | #ifndef OPENSSL_NO_DH |
392 | | { "DH:dhKeyAgreement", "default=yes", dh_keymgmt_functions }, |
393 | | #endif |
394 | | #ifndef OPENSSL_NO_DSA |
395 | | { "DSA:dsaEncryption", "default=yes", dsa_keymgmt_functions }, |
396 | | #endif |
397 | | { "RSA:rsaEncryption", "default=yes", rsa_keymgmt_functions }, |
398 | | { NULL, NULL, NULL } |
399 | | }; |
400 | | |
401 | | static const OSSL_ALGORITHM deflt_serializer[] = { |
402 | | { "RSA", "default=yes,format=text,type=private", |
403 | | rsa_priv_text_serializer_functions }, |
404 | | { "RSA", "default=yes,format=text,type=public", |
405 | | rsa_pub_text_serializer_functions }, |
406 | | { "RSA", "default=yes,format=der,type=private", |
407 | | rsa_priv_der_serializer_functions }, |
408 | | { "RSA", "default=yes,format=der,type=public", |
409 | | rsa_pub_der_serializer_functions }, |
410 | | { "RSA", "default=yes,format=pem,type=private", |
411 | | rsa_priv_pem_serializer_functions }, |
412 | | { "RSA", "default=yes,format=pem,type=public", |
413 | | rsa_pub_pem_serializer_functions }, |
414 | | |
415 | | #ifndef OPENSSL_NO_DH |
416 | | { "DH", "default=yes,format=text,type=private", |
417 | | dh_priv_text_serializer_functions }, |
418 | | { "DH", "default=yes,format=text,type=public", |
419 | | dh_pub_text_serializer_functions }, |
420 | | { "DH", "default=yes,format=text,type=parameters", |
421 | | dh_param_text_serializer_functions }, |
422 | | { "DH", "default=yes,format=der,type=private", |
423 | | dh_priv_der_serializer_functions }, |
424 | | { "DH", "default=yes,format=der,type=public", |
425 | | dh_pub_der_serializer_functions }, |
426 | | { "DH", "default=yes,format=der,type=parameters", |
427 | | dh_param_der_serializer_functions }, |
428 | | { "DH", "default=yes,format=pem,type=private", |
429 | | dh_priv_pem_serializer_functions }, |
430 | | { "DH", "default=yes,format=pem,type=public", |
431 | | dh_pub_pem_serializer_functions }, |
432 | | { "DH", "default=yes,format=pem,type=parameters", |
433 | | dh_param_pem_serializer_functions }, |
434 | | #endif |
435 | | |
436 | | #ifndef OPENSSL_NO_DSA |
437 | | { "DSA", "default=yes,format=text,type=private", |
438 | | dsa_priv_text_serializer_functions }, |
439 | | { "DSA", "default=yes,format=text,type=public", |
440 | | dsa_pub_text_serializer_functions }, |
441 | | { "DSA", "default=yes,format=text,type=parameters", |
442 | | dsa_param_text_serializer_functions }, |
443 | | { "DSA", "default=yes,format=der,type=private", |
444 | | dsa_priv_der_serializer_functions }, |
445 | | { "DSA", "default=yes,format=der,type=public", |
446 | | dsa_pub_der_serializer_functions }, |
447 | | { "DSA", "default=yes,format=der,type=parameters", |
448 | | dsa_param_der_serializer_functions }, |
449 | | { "DSA", "default=yes,format=pem,type=private", |
450 | | dsa_priv_pem_serializer_functions }, |
451 | | { "DSA", "default=yes,format=pem,type=public", |
452 | | dsa_pub_pem_serializer_functions }, |
453 | | { "DSA", "default=yes,format=pem,type=parameters", |
454 | | dsa_param_pem_serializer_functions }, |
455 | | #endif |
456 | | |
457 | | { NULL, NULL, NULL } |
458 | | }; |
459 | | |
460 | | static const OSSL_ALGORITHM *deflt_query(OSSL_PROVIDER *prov, |
461 | | int operation_id, |
462 | | int *no_cache) |
463 | 0 | { |
464 | 0 | *no_cache = 0; |
465 | 0 | switch (operation_id) { |
466 | 0 | case OSSL_OP_DIGEST: |
467 | 0 | return deflt_digests; |
468 | 0 | case OSSL_OP_CIPHER: |
469 | 0 | ossl_prov_cache_exported_algorithms(deflt_ciphers, exported_ciphers); |
470 | 0 | return exported_ciphers; |
471 | 0 | case OSSL_OP_MAC: |
472 | 0 | return deflt_macs; |
473 | 0 | case OSSL_OP_KDF: |
474 | 0 | return deflt_kdfs; |
475 | 0 | case OSSL_OP_KEYMGMT: |
476 | 0 | return deflt_keymgmt; |
477 | 0 | case OSSL_OP_KEYEXCH: |
478 | 0 | return deflt_keyexch; |
479 | 0 | case OSSL_OP_SIGNATURE: |
480 | 0 | return deflt_signature; |
481 | 0 | case OSSL_OP_ASYM_CIPHER: |
482 | 0 | return deflt_asym_cipher; |
483 | 0 | case OSSL_OP_SERIALIZER: |
484 | 0 | return deflt_serializer; |
485 | 0 | } |
486 | 0 | return NULL; |
487 | 0 | } |
488 | | |
489 | | /* Functions we provide to the core */ |
490 | | static const OSSL_DISPATCH deflt_dispatch_table[] = { |
491 | | { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))deflt_gettable_params }, |
492 | | { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))deflt_get_params }, |
493 | | { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))deflt_query }, |
494 | | { 0, NULL } |
495 | | }; |
496 | | |
497 | | OSSL_provider_init_fn ossl_default_provider_init; |
498 | | |
499 | | int ossl_default_provider_init(const OSSL_PROVIDER *provider, |
500 | | const OSSL_DISPATCH *in, |
501 | | const OSSL_DISPATCH **out, |
502 | | void **provctx) |
503 | 0 | { |
504 | 0 | OSSL_core_get_library_context_fn *c_get_libctx = NULL; |
505 | |
|
506 | 0 | if (!ossl_prov_bio_from_dispatch(in)) |
507 | 0 | return 0; |
508 | 0 | for (; in->function_id != 0; in++) { |
509 | 0 | switch (in->function_id) { |
510 | 0 | case OSSL_FUNC_CORE_GETTABLE_PARAMS: |
511 | 0 | c_gettable_params = OSSL_get_core_gettable_params(in); |
512 | 0 | break; |
513 | 0 | case OSSL_FUNC_CORE_GET_PARAMS: |
514 | 0 | c_get_params = OSSL_get_core_get_params(in); |
515 | 0 | break; |
516 | 0 | case OSSL_FUNC_CORE_GET_LIBRARY_CONTEXT: |
517 | 0 | c_get_libctx = OSSL_get_core_get_library_context(in); |
518 | 0 | break; |
519 | 0 | default: |
520 | | /* Just ignore anything we don't understand */ |
521 | 0 | break; |
522 | 0 | } |
523 | 0 | } |
524 | | |
525 | 0 | if (c_get_libctx == NULL) |
526 | 0 | return 0; |
527 | | |
528 | 0 | *out = deflt_dispatch_table; |
529 | | |
530 | | /* |
531 | | * We want to make sure that all calls from this provider that requires |
532 | | * a library context use the same context as the one used to call our |
533 | | * functions. We do that by passing it along as the provider context. |
534 | | */ |
535 | 0 | *provctx = c_get_libctx(provider); |
536 | 0 | return 1; |
537 | 0 | } |