]>
Commit | Line | Data |
---|---|---|
8a73348b | 1 | /* |
33388b44 | 2 | * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. |
8a73348b MC |
3 | * |
4 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | #include <string.h> | |
11 | #include <stdio.h> | |
55a0a117 | 12 | #include <openssl/opensslconf.h> |
8a73348b | 13 | #include <openssl/core.h> |
23c48d94 | 14 | #include <openssl/core_dispatch.h> |
8a73348b MC |
15 | #include <openssl/core_names.h> |
16 | #include <openssl/params.h> | |
63665fff | 17 | #include "prov/bio.h" |
fdaad3f1 | 18 | #include "prov/provider_ctx.h" |
0d2bfe52 | 19 | #include "prov/providercommon.h" |
af3e7e1b | 20 | #include "prov/implementations.h" |
0d2bfe52 SL |
21 | #include "prov/provider_util.h" |
22 | #include "internal/nelem.h" | |
23 | ||
fdaad3f1 RL |
24 | /* |
25 | * Forward declarations to ensure that interface functions are correctly | |
26 | * defined. | |
27 | */ | |
363b1e5d DMSP |
28 | static OSSL_FUNC_provider_gettable_params_fn deflt_gettable_params; |
29 | static OSSL_FUNC_provider_get_params_fn deflt_get_params; | |
30 | static OSSL_FUNC_provider_query_operation_fn deflt_query; | |
fdaad3f1 | 31 | |
745fc918 | 32 | #define ALGC(NAMES, FUNC, CHECK) { { NAMES, "provider=default", FUNC }, CHECK } |
0d2bfe52 | 33 | #define ALG(NAMES, FUNC) ALGC(NAMES, FUNC, NULL) |
8a73348b MC |
34 | |
35 | /* Functions provided by the core */ | |
363b1e5d DMSP |
36 | static OSSL_FUNC_core_gettable_params_fn *c_gettable_params = NULL; |
37 | static OSSL_FUNC_core_get_params_fn *c_get_params = NULL; | |
8a73348b MC |
38 | |
39 | /* Parameters we provide to the core */ | |
26175013 RL |
40 | static const OSSL_PARAM deflt_param_types[] = { |
41 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
42 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
43 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
eab7b424 | 44 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_STATUS, OSSL_PARAM_INTEGER, NULL, 0), |
26175013 | 45 | OSSL_PARAM_END |
8a73348b MC |
46 | }; |
47 | ||
fdaad3f1 | 48 | static const OSSL_PARAM *deflt_gettable_params(void *provctx) |
8a73348b MC |
49 | { |
50 | return deflt_param_types; | |
51 | } | |
52 | ||
fdaad3f1 | 53 | static int deflt_get_params(void *provctx, OSSL_PARAM params[]) |
8a73348b | 54 | { |
4e7991b4 | 55 | OSSL_PARAM *p; |
8a73348b MC |
56 | |
57 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); | |
58 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Default Provider")) | |
59 | return 0; | |
60 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); | |
61 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) | |
62 | return 0; | |
63 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); | |
64 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) | |
65 | return 0; | |
04cb5ec0 | 66 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS); |
eab7b424 | 67 | if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running())) |
04cb5ec0 | 68 | return 0; |
8a73348b MC |
69 | return 1; |
70 | } | |
71 | ||
df553b79 RL |
72 | /* |
73 | * For the algorithm names, we use the following formula for our primary | |
74 | * names: | |
75 | * | |
76 | * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] | |
77 | * | |
78 | * VERSION is only present if there are multiple versions of | |
79 | * an alg (MD2, MD4, MD5). It may be omitted if there is only | |
80 | * one version (if a subsequent version is released in the future, | |
81 | * we can always change the canonical name, and add the old name | |
82 | * as an alias). | |
83 | * | |
84 | * SUBNAME may be present where we are combining multiple | |
85 | * algorithms together, e.g. MD5-SHA1. | |
86 | * | |
87 | * SIZE is only present if multiple versions of an algorithm exist | |
88 | * with different sizes (e.g. AES-128-CBC, AES-256-CBC) | |
89 | * | |
90 | * MODE is only present where applicable. | |
91 | * | |
92 | * We add diverse other names where applicable, such as the names that | |
93 | * NIST uses, or that are used for ASN.1 OBJECT IDENTIFIERs, or names | |
94 | * we have used historically. | |
cc35c3ed MC |
95 | * |
96 | * Algorithm names are case insensitive, but we use all caps in our "canonical" | |
97 | * names for consistency. | |
df553b79 | 98 | */ |
de29ff17 | 99 | static const OSSL_ALGORITHM deflt_digests[] = { |
df553b79 | 100 | /* Our primary name:NIST name[:our older names] */ |
5ccada09 | 101 | { "SHA1:SHA-1:SSL3-SHA1", "provider=default", sha1_functions }, |
745fc918 MC |
102 | { "SHA2-224:SHA-224:SHA224", "provider=default", sha224_functions }, |
103 | { "SHA2-256:SHA-256:SHA256", "provider=default", sha256_functions }, | |
104 | { "SHA2-384:SHA-384:SHA384", "provider=default", sha384_functions }, | |
105 | { "SHA2-512:SHA-512:SHA512", "provider=default", sha512_functions }, | |
106 | { "SHA2-512/224:SHA-512/224:SHA512-224", "provider=default", | |
df553b79 | 107 | sha512_224_functions }, |
745fc918 | 108 | { "SHA2-512/256:SHA-512/256:SHA512-256", "provider=default", |
df553b79 | 109 | sha512_256_functions }, |
d5e5e2ff | 110 | |
df553b79 | 111 | /* We agree with NIST here, so one name only */ |
745fc918 MC |
112 | { "SHA3-224", "provider=default", sha3_224_functions }, |
113 | { "SHA3-256", "provider=default", sha3_256_functions }, | |
114 | { "SHA3-384", "provider=default", sha3_384_functions }, | |
115 | { "SHA3-512", "provider=default", sha3_512_functions }, | |
d5e5e2ff | 116 | |
e23cda00 | 117 | /* |
cc35c3ed MC |
118 | * KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for |
119 | * the KMAC-128 and KMAC-256. | |
e23cda00 | 120 | */ |
745fc918 MC |
121 | { "KECCAK-KMAC-128:KECCAK-KMAC128", "provider=default", keccak_kmac_128_functions }, |
122 | { "KECCAK-KMAC-256:KECCAK-KMAC256", "provider=default", keccak_kmac_256_functions }, | |
d5e5e2ff | 123 | |
df553b79 | 124 | /* Our primary name:NIST name */ |
745fc918 MC |
125 | { "SHAKE-128:SHAKE128", "provider=default", shake_128_functions }, |
126 | { "SHAKE-256:SHAKE256", "provider=default", shake_256_functions }, | |
d5e5e2ff SL |
127 | |
128 | #ifndef OPENSSL_NO_BLAKE2 | |
df553b79 RL |
129 | /* |
130 | * https://blake2.net/ doesn't specify size variants, | |
131 | * but mentions that Bouncy Castle uses the names | |
132 | * BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and BLAKE2b-512 | |
133 | * If we assume that "2b" and "2s" are versions, that pattern | |
134 | * fits with ours. We also add our historical names. | |
135 | */ | |
745fc918 MC |
136 | { "BLAKE2S-256:BLAKE2s256", "provider=default", blake2s256_functions }, |
137 | { "BLAKE2B-512:BLAKE2b512", "provider=default", blake2b512_functions }, | |
d5e5e2ff SL |
138 | #endif /* OPENSSL_NO_BLAKE2 */ |
139 | ||
140 | #ifndef OPENSSL_NO_SM3 | |
745fc918 | 141 | { "SM3", "provider=default", sm3_functions }, |
d5e5e2ff SL |
142 | #endif /* OPENSSL_NO_SM3 */ |
143 | ||
144 | #ifndef OPENSSL_NO_MD5 | |
5ccada09 | 145 | { "MD5:SSL3-MD5", "provider=default", md5_functions }, |
745fc918 | 146 | { "MD5-SHA1", "provider=default", md5_sha1_functions }, |
d5e5e2ff SL |
147 | #endif /* OPENSSL_NO_MD5 */ |
148 | ||
de29ff17 MC |
149 | { NULL, NULL, NULL } |
150 | }; | |
151 | ||
0d2bfe52 | 152 | static const OSSL_ALGORITHM_CAPABLE deflt_ciphers[] = { |
068489a2 | 153 | ALG("NULL", null_functions), |
0d2bfe52 SL |
154 | ALG("AES-256-ECB", aes256ecb_functions), |
155 | ALG("AES-192-ECB", aes192ecb_functions), | |
156 | ALG("AES-128-ECB", aes128ecb_functions), | |
5ccada09 SL |
157 | ALG("AES-256-CBC:AES256", aes256cbc_functions), |
158 | ALG("AES-192-CBC:AES192", aes192cbc_functions), | |
159 | ALG("AES-128-CBC:AES128", aes128cbc_functions), | |
7cc355c2 SL |
160 | ALG("AES-128-CBC-CTS", aes128cbc_cts_functions), |
161 | ALG("AES-192-CBC-CTS", aes192cbc_cts_functions), | |
162 | ALG("AES-256-CBC-CTS", aes256cbc_cts_functions), | |
0d2bfe52 SL |
163 | ALG("AES-256-OFB", aes256ofb_functions), |
164 | ALG("AES-192-OFB", aes192ofb_functions), | |
165 | ALG("AES-128-OFB", aes128ofb_functions), | |
166 | ALG("AES-256-CFB", aes256cfb_functions), | |
167 | ALG("AES-192-CFB", aes192cfb_functions), | |
168 | ALG("AES-128-CFB", aes128cfb_functions), | |
169 | ALG("AES-256-CFB1", aes256cfb1_functions), | |
170 | ALG("AES-192-CFB1", aes192cfb1_functions), | |
171 | ALG("AES-128-CFB1", aes128cfb1_functions), | |
172 | ALG("AES-256-CFB8", aes256cfb8_functions), | |
173 | ALG("AES-192-CFB8", aes192cfb8_functions), | |
174 | ALG("AES-128-CFB8", aes128cfb8_functions), | |
175 | ALG("AES-256-CTR", aes256ctr_functions), | |
176 | ALG("AES-192-CTR", aes192ctr_functions), | |
177 | ALG("AES-128-CTR", aes128ctr_functions), | |
178 | ALG("AES-256-XTS", aes256xts_functions), | |
179 | ALG("AES-128-XTS", aes128xts_functions), | |
3837c202 | 180 | #ifndef OPENSSL_NO_OCB |
0d2bfe52 SL |
181 | ALG("AES-256-OCB", aes256ocb_functions), |
182 | ALG("AES-192-OCB", aes192ocb_functions), | |
183 | ALG("AES-128-OCB", aes128ocb_functions), | |
3837c202 | 184 | #endif /* OPENSSL_NO_OCB */ |
eb173822 | 185 | #ifndef OPENSSL_NO_SIV |
0d2bfe52 SL |
186 | ALG("AES-128-SIV", aes128siv_functions), |
187 | ALG("AES-192-SIV", aes192siv_functions), | |
188 | ALG("AES-256-SIV", aes256siv_functions), | |
eb173822 | 189 | #endif /* OPENSSL_NO_SIV */ |
0d2bfe52 SL |
190 | ALG("AES-256-GCM:id-aes256-GCM", aes256gcm_functions), |
191 | ALG("AES-192-GCM:id-aes192-GCM", aes192gcm_functions), | |
192 | ALG("AES-128-GCM:id-aes128-GCM", aes128gcm_functions), | |
193 | ALG("AES-256-CCM:id-aes256-CCM", aes256ccm_functions), | |
194 | ALG("AES-192-CCM:id-aes192-CCM", aes192ccm_functions), | |
195 | ALG("AES-128-CCM:id-aes128-CCM", aes128ccm_functions), | |
196 | ALG("AES-256-WRAP:id-aes256-wrap:AES256-WRAP", aes256wrap_functions), | |
197 | ALG("AES-192-WRAP:id-aes192-wrap:AES192-WRAP", aes192wrap_functions), | |
198 | ALG("AES-128-WRAP:id-aes128-wrap:AES128-WRAP", aes128wrap_functions), | |
199 | ALG("AES-256-WRAP-PAD:id-aes256-wrap-pad:AES256-WRAP-PAD", | |
200 | aes256wrappad_functions), | |
201 | ALG("AES-192-WRAP-PAD:id-aes192-wrap-pad:AES192-WRAP-PAD", | |
202 | aes192wrappad_functions), | |
203 | ALG("AES-128-WRAP-PAD:id-aes128-wrap-pad:AES128-WRAP-PAD", | |
204 | aes128wrappad_functions), | |
205 | ALGC("AES-128-CBC-HMAC-SHA1", aes128cbc_hmac_sha1_functions, | |
206 | cipher_capable_aes_cbc_hmac_sha1), | |
207 | ALGC("AES-256-CBC-HMAC-SHA1", aes256cbc_hmac_sha1_functions, | |
208 | cipher_capable_aes_cbc_hmac_sha1), | |
209 | ALGC("AES-128-CBC-HMAC-SHA256", aes128cbc_hmac_sha256_functions, | |
210 | cipher_capable_aes_cbc_hmac_sha256), | |
211 | ALGC("AES-256-CBC-HMAC-SHA256", aes256cbc_hmac_sha256_functions, | |
212 | cipher_capable_aes_cbc_hmac_sha256), | |
a672a02a | 213 | #ifndef OPENSSL_NO_ARIA |
0d2bfe52 SL |
214 | ALG("ARIA-256-GCM", aria256gcm_functions), |
215 | ALG("ARIA-192-GCM", aria192gcm_functions), | |
216 | ALG("ARIA-128-GCM", aria128gcm_functions), | |
217 | ALG("ARIA-256-CCM", aria256ccm_functions), | |
218 | ALG("ARIA-192-CCM", aria192ccm_functions), | |
219 | ALG("ARIA-128-CCM", aria128ccm_functions), | |
220 | ALG("ARIA-256-ECB", aria256ecb_functions), | |
221 | ALG("ARIA-192-ECB", aria192ecb_functions), | |
222 | ALG("ARIA-128-ECB", aria128ecb_functions), | |
223 | ALG("ARIA-256-CBC:ARIA256", aria256cbc_functions), | |
224 | ALG("ARIA-192-CBC:ARIA192", aria192cbc_functions), | |
225 | ALG("ARIA-128-CBC:ARIA128", aria128cbc_functions), | |
226 | ALG("ARIA-256-OFB", aria256ofb_functions), | |
227 | ALG("ARIA-192-OFB", aria192ofb_functions), | |
228 | ALG("ARIA-128-OFB", aria128ofb_functions), | |
229 | ALG("ARIA-256-CFB", aria256cfb_functions), | |
230 | ALG("ARIA-192-CFB", aria192cfb_functions), | |
231 | ALG("ARIA-128-CFB", aria128cfb_functions), | |
232 | ALG("ARIA-256-CFB1", aria256cfb1_functions), | |
233 | ALG("ARIA-192-CFB1", aria192cfb1_functions), | |
234 | ALG("ARIA-128-CFB1", aria128cfb1_functions), | |
235 | ALG("ARIA-256-CFB8", aria256cfb8_functions), | |
236 | ALG("ARIA-192-CFB8", aria192cfb8_functions), | |
237 | ALG("ARIA-128-CFB8", aria128cfb8_functions), | |
238 | ALG("ARIA-256-CTR", aria256ctr_functions), | |
239 | ALG("ARIA-192-CTR", aria192ctr_functions), | |
240 | ALG("ARIA-128-CTR", aria128ctr_functions), | |
a672a02a | 241 | #endif /* OPENSSL_NO_ARIA */ |
e1178600 | 242 | #ifndef OPENSSL_NO_CAMELLIA |
0d2bfe52 SL |
243 | ALG("CAMELLIA-256-ECB", camellia256ecb_functions), |
244 | ALG("CAMELLIA-192-ECB", camellia192ecb_functions), | |
245 | ALG("CAMELLIA-128-ECB", camellia128ecb_functions), | |
246 | ALG("CAMELLIA-256-CBC:CAMELLIA256", camellia256cbc_functions), | |
247 | ALG("CAMELLIA-192-CBC:CAMELLIA192", camellia192cbc_functions), | |
248 | ALG("CAMELLIA-128-CBC:CAMELLIA128", camellia128cbc_functions), | |
249 | ALG("CAMELLIA-256-OFB", camellia256ofb_functions), | |
250 | ALG("CAMELLIA-192-OFB", camellia192ofb_functions), | |
251 | ALG("CAMELLIA-128-OFB", camellia128ofb_functions), | |
252 | ALG("CAMELLIA-256-CFB", camellia256cfb_functions), | |
253 | ALG("CAMELLIA-192-CFB", camellia192cfb_functions), | |
254 | ALG("CAMELLIA-128-CFB", camellia128cfb_functions), | |
255 | ALG("CAMELLIA-256-CFB1", camellia256cfb1_functions), | |
256 | ALG("CAMELLIA-192-CFB1", camellia192cfb1_functions), | |
257 | ALG("CAMELLIA-128-CFB1", camellia128cfb1_functions), | |
258 | ALG("CAMELLIA-256-CFB8", camellia256cfb8_functions), | |
259 | ALG("CAMELLIA-192-CFB8", camellia192cfb8_functions), | |
260 | ALG("CAMELLIA-128-CFB8", camellia128cfb8_functions), | |
261 | ALG("CAMELLIA-256-CTR", camellia256ctr_functions), | |
262 | ALG("CAMELLIA-192-CTR", camellia192ctr_functions), | |
263 | ALG("CAMELLIA-128-CTR", camellia128ctr_functions), | |
e1178600 | 264 | #endif /* OPENSSL_NO_CAMELLIA */ |
cb1548bc | 265 | #ifndef OPENSSL_NO_DES |
0d2bfe52 SL |
266 | ALG("DES-EDE3-ECB:DES-EDE3", tdes_ede3_ecb_functions), |
267 | ALG("DES-EDE3-CBC:DES3", tdes_ede3_cbc_functions), | |
268 | ALG("DES-EDE3-OFB", tdes_ede3_ofb_functions), | |
269 | ALG("DES-EDE3-CFB", tdes_ede3_cfb_functions), | |
270 | ALG("DES-EDE3-CFB8", tdes_ede3_cfb8_functions), | |
271 | ALG("DES-EDE3-CFB1", tdes_ede3_cfb1_functions), | |
f5056577 | 272 | ALG("DES3-WRAP:id-smime-alg-CMS3DESwrap", tdes_wrap_cbc_functions), |
0d2bfe52 SL |
273 | ALG("DES-EDE-ECB:DES-EDE", tdes_ede2_ecb_functions), |
274 | ALG("DES-EDE-CBC", tdes_ede2_cbc_functions), | |
275 | ALG("DES-EDE-OFB", tdes_ede2_ofb_functions), | |
276 | ALG("DES-EDE-CFB", tdes_ede2_cfb_functions), | |
cb1548bc | 277 | #endif /* OPENSSL_NO_DES */ |
105dde25 | 278 | #ifndef OPENSSL_NO_SM4 |
0d2bfe52 SL |
279 | ALG("SM4-ECB", sm4128ecb_functions), |
280 | ALG("SM4-CBC:SM4", sm4128cbc_functions), | |
281 | ALG("SM4-CTR", sm4128ctr_functions), | |
282 | ALG("SM4-OFB:SM4-OFB128", sm4128ofb128_functions), | |
283 | ALG("SM4-CFB:SM4-CFB128", sm4128cfb128_functions), | |
105dde25 | 284 | #endif /* OPENSSL_NO_SM4 */ |
3d5a7578 | 285 | #ifndef OPENSSL_NO_CHACHA |
0d2bfe52 | 286 | ALG("ChaCha20", chacha20_functions), |
3d5a7578 | 287 | # ifndef OPENSSL_NO_POLY1305 |
0d2bfe52 | 288 | ALG("ChaCha20-Poly1305", chacha20_poly1305_functions), |
3d5a7578 SL |
289 | # endif /* OPENSSL_NO_POLY1305 */ |
290 | #endif /* OPENSSL_NO_CHACHA */ | |
0d2bfe52 | 291 | { { NULL, NULL, NULL }, NULL } |
aab26e6f | 292 | }; |
0d2bfe52 | 293 | static OSSL_ALGORITHM exported_ciphers[OSSL_NELEM(deflt_ciphers)]; |
aab26e6f | 294 | |
55a0a117 RL |
295 | static const OSSL_ALGORITHM deflt_macs[] = { |
296 | #ifndef OPENSSL_NO_BLAKE2 | |
745fc918 MC |
297 | { "BLAKE2BMAC", "provider=default", blake2bmac_functions }, |
298 | { "BLAKE2SMAC", "provider=default", blake2smac_functions }, | |
2e5db6ad RL |
299 | #endif |
300 | #ifndef OPENSSL_NO_CMAC | |
745fc918 | 301 | { "CMAC", "provider=default", cmac_functions }, |
55a0a117 | 302 | #endif |
745fc918 MC |
303 | { "GMAC", "provider=default", gmac_functions }, |
304 | { "HMAC", "provider=default", hmac_functions }, | |
305 | { "KMAC-128:KMAC128", "provider=default", kmac128_functions }, | |
306 | { "KMAC-256:KMAC256", "provider=default", kmac256_functions }, | |
4657693d | 307 | #ifndef OPENSSL_NO_SIPHASH |
745fc918 | 308 | { "SIPHASH", "provider=default", siphash_functions }, |
ae0b6b92 RL |
309 | #endif |
310 | #ifndef OPENSSL_NO_POLY1305 | |
745fc918 | 311 | { "POLY1305", "provider=default", poly1305_functions }, |
4657693d | 312 | #endif |
55a0a117 RL |
313 | { NULL, NULL, NULL } |
314 | }; | |
315 | ||
e3405a4a | 316 | static const OSSL_ALGORITHM deflt_kdfs[] = { |
745fc918 MC |
317 | { "HKDF", "provider=default", kdf_hkdf_functions }, |
318 | { "SSKDF", "provider=default", kdf_sskdf_functions }, | |
319 | { "PBKDF2", "provider=default", kdf_pbkdf2_functions }, | |
b7466c13 | 320 | { "PKCS12KDF", "provider=default", kdf_pkcs12_functions }, |
745fc918 MC |
321 | { "SSHKDF", "provider=default", kdf_sshkdf_functions }, |
322 | { "X963KDF", "provider=default", kdf_x963_kdf_functions }, | |
323 | { "TLS1-PRF", "provider=default", kdf_tls1_prf_functions }, | |
324 | { "KBKDF", "provider=default", kdf_kbkdf_functions }, | |
e3405a4a | 325 | #ifndef OPENSSL_NO_CMS |
745fc918 | 326 | { "X942KDF", "provider=default", kdf_x942_kdf_functions }, |
e3405a4a P |
327 | #endif |
328 | #ifndef OPENSSL_NO_SCRYPT | |
745fc918 | 329 | { "SCRYPT:id-scrypt", "provider=default", kdf_scrypt_functions }, |
e3405a4a | 330 | #endif |
745fc918 | 331 | { "KRB5KDF", "provider=default", kdf_krb5kdf_functions }, |
0fee1dff | 332 | { NULL, NULL, NULL } |
e3405a4a P |
333 | }; |
334 | ||
89e29174 | 335 | static const OSSL_ALGORITHM deflt_keyexch[] = { |
76ca35e7 | 336 | #ifndef OPENSSL_NO_DH |
745fc918 | 337 | { "DH:dhKeyAgreement", "provider=default", dh_keyexch_functions }, |
6f7d2135 MC |
338 | #endif |
339 | #ifndef OPENSSL_NO_EC | |
edd3b7a3 | 340 | { "ECDH", "provider=default", ecdh_keyexch_functions }, |
745fc918 MC |
341 | { "X25519", "provider=default", x25519_keyexch_functions }, |
342 | { "X448", "provider=default", x448_keyexch_functions }, | |
8b84b075 | 343 | #endif |
05d2f72e MC |
344 | { "TLS1-PRF", "provider=default", kdf_tls1_prf_keyexch_functions }, |
345 | { "HKDF", "provider=default", kdf_hkdf_keyexch_functions }, | |
194de849 | 346 | { "SCRYPT:id-scrypt", "provider=default", kdf_scrypt_keyexch_functions }, |
8b84b075 RL |
347 | { NULL, NULL, NULL } |
348 | }; | |
349 | ||
bcc4ae67 | 350 | static const OSSL_ALGORITHM deflt_rands[] = { |
f000e828 | 351 | { "CTR-DRBG", "provider=default", drbg_ctr_functions }, |
bcc4ae67 | 352 | { "HASH-DRBG", "provider=default", drbg_hash_functions }, |
bcc4ae67 | 353 | { "HMAC-DRBG", "provider=default", drbg_hmac_functions }, |
f000e828 | 354 | { "TEST-RAND", "provider=default", test_rng_functions }, |
bcc4ae67 P |
355 | { NULL, NULL, NULL } |
356 | }; | |
357 | ||
4889dadc MC |
358 | static const OSSL_ALGORITHM deflt_signature[] = { |
359 | #ifndef OPENSSL_NO_DSA | |
745fc918 | 360 | { "DSA:dsaEncryption", "provider=default", dsa_signature_functions }, |
4889dadc | 361 | #endif |
e1182bdb | 362 | { "RSA:rsaEncryption", "provider=default", rsa_signature_functions }, |
3965480c MC |
363 | #ifndef OPENSSL_NO_EC |
364 | { "ED25519:Ed25519", "provider=default", ed25519_signature_functions }, | |
365 | { "ED448:Ed448", "provider=default", ed448_signature_functions }, | |
edd3b7a3 | 366 | { "ECDSA", "provider=default", ecdsa_signature_functions }, |
3965480c | 367 | #endif |
e3bf65da MC |
368 | { "HMAC", "provider=default", mac_legacy_hmac_signature_functions }, |
369 | { "SIPHASH", "provider=default", mac_legacy_siphash_signature_functions }, | |
4db71d01 | 370 | #ifndef OPENSSL_NO_POLY1305 |
e3bf65da | 371 | { "POLY1305", "provider=default", mac_legacy_poly1305_signature_functions }, |
a540ef90 MC |
372 | #endif |
373 | #ifndef OPENSSL_NO_CMAC | |
e3bf65da | 374 | { "CMAC", "provider=default", mac_legacy_cmac_signature_functions }, |
4db71d01 | 375 | #endif |
4889dadc MC |
376 | { NULL, NULL, NULL } |
377 | }; | |
378 | ||
89abd1b6 | 379 | static const OSSL_ALGORITHM deflt_asym_cipher[] = { |
745fc918 | 380 | { "RSA:rsaEncryption", "provider=default", rsa_asym_cipher_functions }, |
89abd1b6 MC |
381 | { NULL, NULL, NULL } |
382 | }; | |
4889dadc | 383 | |
8b84b075 RL |
384 | static const OSSL_ALGORITHM deflt_keymgmt[] = { |
385 | #ifndef OPENSSL_NO_DH | |
745fc918 | 386 | { "DH:dhKeyAgreement", "provider=default", dh_keymgmt_functions }, |
627c2203 | 387 | { "DHX:X9.42 DH:dhpublicnumber", "provider=default", dhx_keymgmt_functions }, |
4889dadc MC |
388 | #endif |
389 | #ifndef OPENSSL_NO_DSA | |
745fc918 | 390 | { "DSA:dsaEncryption", "provider=default", dsa_keymgmt_functions }, |
76ca35e7 | 391 | #endif |
745fc918 | 392 | { "RSA:rsaEncryption", "provider=default", rsa_keymgmt_functions }, |
8a758e96 | 393 | { "RSA-PSS:RSASSA-PSS", "provider=default", rsapss_keymgmt_functions }, |
90d3cb57 | 394 | #ifndef OPENSSL_NO_EC |
745fc918 MC |
395 | { "EC:id-ecPublicKey", "provider=default", ec_keymgmt_functions }, |
396 | { "X25519", "provider=default", x25519_keymgmt_functions }, | |
397 | { "X448", "provider=default", x448_keymgmt_functions }, | |
af6d8dd3 MC |
398 | { "ED25519", "provider=default", ed25519_keymgmt_functions }, |
399 | { "ED448", "provider=default", ed448_keymgmt_functions }, | |
90d3cb57 | 400 | #endif |
ac2d58c7 | 401 | { "TLS1-PRF", "provider=default", kdf_keymgmt_functions }, |
05d2f72e | 402 | { "HKDF", "provider=default", kdf_keymgmt_functions }, |
194de849 | 403 | { "SCRYPT:id-scrypt", "provider=default", kdf_keymgmt_functions }, |
e3bf65da MC |
404 | { "HMAC", "provider=default", mac_legacy_keymgmt_functions }, |
405 | { "SIPHASH", "provider=default", mac_legacy_keymgmt_functions }, | |
4db71d01 | 406 | #ifndef OPENSSL_NO_POLY1305 |
e3bf65da | 407 | { "POLY1305", "provider=default", mac_legacy_keymgmt_functions }, |
a540ef90 MC |
408 | #endif |
409 | #ifndef OPENSSL_NO_CMAC | |
e3bf65da | 410 | { "CMAC", "provider=default", cmac_legacy_keymgmt_functions }, |
4db71d01 | 411 | #endif |
89e29174 MC |
412 | { NULL, NULL, NULL } |
413 | }; | |
414 | ||
ece9304c | 415 | static const OSSL_ALGORITHM deflt_encoder[] = { |
b48ca22a | 416 | #define ENCODER(name, _fips, _format, _type, func_table) \ |
dfc0857d | 417 | { name, \ |
b48ca22a | 418 | "provider=default,fips=" _fips ",format=" _format ",type=" _type, \ |
dfc0857d | 419 | (func_table) } |
1017b8e4 | 420 | |
ece9304c | 421 | #include "encoders.inc" |
1017b8e4 RL |
422 | { NULL, NULL, NULL } |
423 | }; | |
ece9304c | 424 | #undef ENCODER |
1017b8e4 | 425 | |
ece9304c | 426 | static const OSSL_ALGORITHM deflt_decoder[] = { |
b48ca22a | 427 | #define DECODER(name, _fips, _input, func_table) \ |
a3f15e23 | 428 | { name, \ |
b48ca22a | 429 | "provider=default,fips=" _fips ",input=" _input, \ |
a3f15e23 | 430 | (func_table) } |
dcfacbbf | 431 | |
ece9304c | 432 | #include "decoders.inc" |
677add38 RL |
433 | { NULL, NULL, NULL } |
434 | }; | |
ece9304c | 435 | #undef DECODER |
677add38 | 436 | |
63f187cf | 437 | static const OSSL_ALGORITHM deflt_store[] = { |
ce43db7a JS |
438 | #define STORE(name, _fips, func_table) \ |
439 | { name, "provider=default,fips=" _fips, (func_table) }, | |
63f187cf RL |
440 | |
441 | #include "stores.inc" | |
442 | { NULL, NULL, NULL } | |
443 | #undef STORE | |
444 | }; | |
445 | ||
fdaad3f1 | 446 | static const OSSL_ALGORITHM *deflt_query(void *provctx, int operation_id, |
de29ff17 MC |
447 | int *no_cache) |
448 | { | |
449 | *no_cache = 0; | |
450 | switch (operation_id) { | |
451 | case OSSL_OP_DIGEST: | |
452 | return deflt_digests; | |
aab26e6f | 453 | case OSSL_OP_CIPHER: |
0d2bfe52 SL |
454 | ossl_prov_cache_exported_algorithms(deflt_ciphers, exported_ciphers); |
455 | return exported_ciphers; | |
55a0a117 RL |
456 | case OSSL_OP_MAC: |
457 | return deflt_macs; | |
e3405a4a P |
458 | case OSSL_OP_KDF: |
459 | return deflt_kdfs; | |
bcc4ae67 P |
460 | case OSSL_OP_RAND: |
461 | return deflt_rands; | |
8b84b075 RL |
462 | case OSSL_OP_KEYMGMT: |
463 | return deflt_keymgmt; | |
89e29174 MC |
464 | case OSSL_OP_KEYEXCH: |
465 | return deflt_keyexch; | |
4889dadc MC |
466 | case OSSL_OP_SIGNATURE: |
467 | return deflt_signature; | |
89abd1b6 MC |
468 | case OSSL_OP_ASYM_CIPHER: |
469 | return deflt_asym_cipher; | |
ece9304c RL |
470 | case OSSL_OP_ENCODER: |
471 | return deflt_encoder; | |
472 | case OSSL_OP_DECODER: | |
473 | return deflt_decoder; | |
63f187cf RL |
474 | case OSSL_OP_STORE: |
475 | return deflt_store; | |
de29ff17 MC |
476 | } |
477 | return NULL; | |
478 | } | |
479 | ||
72bfc958 | 480 | |
78906fff RL |
481 | static void deflt_teardown(void *provctx) |
482 | { | |
d40b42ab | 483 | BIO_meth_free(PROV_CTX_get0_core_bio_method(provctx)); |
78906fff RL |
484 | PROV_CTX_free(provctx); |
485 | } | |
486 | ||
8a73348b MC |
487 | /* Functions we provide to the core */ |
488 | static const OSSL_DISPATCH deflt_dispatch_table[] = { | |
78906fff | 489 | { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))deflt_teardown }, |
dca97d00 | 490 | { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))deflt_gettable_params }, |
8a73348b | 491 | { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))deflt_get_params }, |
de29ff17 | 492 | { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))deflt_query }, |
72bfc958 | 493 | { OSSL_FUNC_PROVIDER_GET_CAPABILITIES, (void (*)(void))provider_get_capabilities }, |
8a73348b MC |
494 | { 0, NULL } |
495 | }; | |
496 | ||
497 | OSSL_provider_init_fn ossl_default_provider_init; | |
498 | ||
d40b42ab | 499 | int ossl_default_provider_init(const OSSL_CORE_HANDLE *handle, |
8a73348b | 500 | const OSSL_DISPATCH *in, |
a39eb840 RL |
501 | const OSSL_DISPATCH **out, |
502 | void **provctx) | |
8a73348b | 503 | { |
363b1e5d | 504 | OSSL_FUNC_core_get_library_context_fn *c_get_libctx = NULL; |
d40b42ab | 505 | BIO_METHOD *corebiometh; |
8013a933 | 506 | |
63665fff RL |
507 | if (!ossl_prov_bio_from_dispatch(in)) |
508 | return 0; | |
8a73348b MC |
509 | for (; in->function_id != 0; in++) { |
510 | switch (in->function_id) { | |
dca97d00 | 511 | case OSSL_FUNC_CORE_GETTABLE_PARAMS: |
363b1e5d | 512 | c_gettable_params = OSSL_FUNC_core_gettable_params(in); |
8a73348b MC |
513 | break; |
514 | case OSSL_FUNC_CORE_GET_PARAMS: | |
363b1e5d | 515 | c_get_params = OSSL_FUNC_core_get_params(in); |
8a73348b | 516 | break; |
8013a933 | 517 | case OSSL_FUNC_CORE_GET_LIBRARY_CONTEXT: |
363b1e5d | 518 | c_get_libctx = OSSL_FUNC_core_get_library_context(in); |
8013a933 | 519 | break; |
8a73348b MC |
520 | default: |
521 | /* Just ignore anything we don't understand */ | |
522 | break; | |
523 | } | |
524 | } | |
525 | ||
8013a933 RL |
526 | if (c_get_libctx == NULL) |
527 | return 0; | |
528 | ||
8013a933 RL |
529 | /* |
530 | * We want to make sure that all calls from this provider that requires | |
531 | * a library context use the same context as the one used to call our | |
d40b42ab | 532 | * functions. We do that by passing it along in the provider context. |
78906fff | 533 | * |
d40b42ab | 534 | * This only works for built-in providers. Most providers should |
78906fff | 535 | * create their own library context. |
8013a933 | 536 | */ |
d40b42ab MC |
537 | if ((*provctx = PROV_CTX_new()) == NULL |
538 | || (corebiometh = bio_prov_init_bio_method()) == NULL) { | |
539 | PROV_CTX_free(*provctx); | |
540 | *provctx = NULL; | |
78906fff | 541 | return 0; |
d40b42ab MC |
542 | } |
543 | PROV_CTX_set0_library_context(*provctx, (OPENSSL_CTX *)c_get_libctx(handle)); | |
544 | PROV_CTX_set0_handle(*provctx, handle); | |
545 | PROV_CTX_set0_core_bio_method(*provctx, corebiometh); | |
78906fff RL |
546 | |
547 | *out = deflt_dispatch_table; | |
548 | ||
8a73348b MC |
549 | return 1; |
550 | } |