]>
Commit | Line | Data |
---|---|---|
8a73348b MC |
1 | /* |
2 | * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved. | |
3 | * | |
4 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | #include <string.h> | |
11 | #include <stdio.h> | |
55a0a117 | 12 | #include <openssl/opensslconf.h> |
8a73348b MC |
13 | #include <openssl/core.h> |
14 | #include <openssl/core_numbers.h> | |
15 | #include <openssl/core_names.h> | |
16 | #include <openssl/params.h> | |
63665fff | 17 | #include "prov/bio.h" |
0d2bfe52 | 18 | #include "prov/providercommon.h" |
af3e7e1b | 19 | #include "prov/implementations.h" |
0d2bfe52 SL |
20 | #include "prov/provider_util.h" |
21 | #include "internal/nelem.h" | |
22 | ||
745fc918 | 23 | #define ALGC(NAMES, FUNC, CHECK) { { NAMES, "provider=default", FUNC }, CHECK } |
0d2bfe52 | 24 | #define ALG(NAMES, FUNC) ALGC(NAMES, FUNC, NULL) |
8a73348b MC |
25 | |
26 | /* Functions provided by the core */ | |
dca97d00 | 27 | static OSSL_core_gettable_params_fn *c_gettable_params = NULL; |
8a73348b MC |
28 | static OSSL_core_get_params_fn *c_get_params = NULL; |
29 | ||
30 | /* Parameters we provide to the core */ | |
26175013 RL |
31 | static const OSSL_PARAM deflt_param_types[] = { |
32 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
33 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
34 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
35 | OSSL_PARAM_END | |
8a73348b MC |
36 | }; |
37 | ||
dca97d00 | 38 | static const OSSL_PARAM *deflt_gettable_params(const OSSL_PROVIDER *prov) |
8a73348b MC |
39 | { |
40 | return deflt_param_types; | |
41 | } | |
42 | ||
4e7991b4 | 43 | static int deflt_get_params(const OSSL_PROVIDER *prov, OSSL_PARAM params[]) |
8a73348b | 44 | { |
4e7991b4 | 45 | OSSL_PARAM *p; |
8a73348b MC |
46 | |
47 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); | |
48 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Default Provider")) | |
49 | return 0; | |
50 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); | |
51 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) | |
52 | return 0; | |
53 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); | |
54 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) | |
55 | return 0; | |
56 | ||
57 | return 1; | |
58 | } | |
59 | ||
df553b79 RL |
60 | /* |
61 | * For the algorithm names, we use the following formula for our primary | |
62 | * names: | |
63 | * | |
64 | * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] | |
65 | * | |
66 | * VERSION is only present if there are multiple versions of | |
67 | * an alg (MD2, MD4, MD5). It may be omitted if there is only | |
68 | * one version (if a subsequent version is released in the future, | |
69 | * we can always change the canonical name, and add the old name | |
70 | * as an alias). | |
71 | * | |
72 | * SUBNAME may be present where we are combining multiple | |
73 | * algorithms together, e.g. MD5-SHA1. | |
74 | * | |
75 | * SIZE is only present if multiple versions of an algorithm exist | |
76 | * with different sizes (e.g. AES-128-CBC, AES-256-CBC) | |
77 | * | |
78 | * MODE is only present where applicable. | |
79 | * | |
80 | * We add diverse other names where applicable, such as the names that | |
81 | * NIST uses, or that are used for ASN.1 OBJECT IDENTIFIERs, or names | |
82 | * we have used historically. | |
cc35c3ed MC |
83 | * |
84 | * Algorithm names are case insensitive, but we use all caps in our "canonical" | |
85 | * names for consistency. | |
df553b79 | 86 | */ |
de29ff17 | 87 | static const OSSL_ALGORITHM deflt_digests[] = { |
df553b79 | 88 | /* Our primary name:NIST name[:our older names] */ |
745fc918 MC |
89 | { "SHA1:SHA-1", "provider=default", sha1_functions }, |
90 | { "SHA2-224:SHA-224:SHA224", "provider=default", sha224_functions }, | |
91 | { "SHA2-256:SHA-256:SHA256", "provider=default", sha256_functions }, | |
92 | { "SHA2-384:SHA-384:SHA384", "provider=default", sha384_functions }, | |
93 | { "SHA2-512:SHA-512:SHA512", "provider=default", sha512_functions }, | |
94 | { "SHA2-512/224:SHA-512/224:SHA512-224", "provider=default", | |
df553b79 | 95 | sha512_224_functions }, |
745fc918 | 96 | { "SHA2-512/256:SHA-512/256:SHA512-256", "provider=default", |
df553b79 | 97 | sha512_256_functions }, |
d5e5e2ff | 98 | |
df553b79 | 99 | /* We agree with NIST here, so one name only */ |
745fc918 MC |
100 | { "SHA3-224", "provider=default", sha3_224_functions }, |
101 | { "SHA3-256", "provider=default", sha3_256_functions }, | |
102 | { "SHA3-384", "provider=default", sha3_384_functions }, | |
103 | { "SHA3-512", "provider=default", sha3_512_functions }, | |
d5e5e2ff | 104 | |
e23cda00 | 105 | /* |
cc35c3ed MC |
106 | * KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for |
107 | * the KMAC-128 and KMAC-256. | |
e23cda00 | 108 | */ |
745fc918 MC |
109 | { "KECCAK-KMAC-128:KECCAK-KMAC128", "provider=default", keccak_kmac_128_functions }, |
110 | { "KECCAK-KMAC-256:KECCAK-KMAC256", "provider=default", keccak_kmac_256_functions }, | |
d5e5e2ff | 111 | |
df553b79 | 112 | /* Our primary name:NIST name */ |
745fc918 MC |
113 | { "SHAKE-128:SHAKE128", "provider=default", shake_128_functions }, |
114 | { "SHAKE-256:SHAKE256", "provider=default", shake_256_functions }, | |
d5e5e2ff SL |
115 | |
116 | #ifndef OPENSSL_NO_BLAKE2 | |
df553b79 RL |
117 | /* |
118 | * https://blake2.net/ doesn't specify size variants, | |
119 | * but mentions that Bouncy Castle uses the names | |
120 | * BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and BLAKE2b-512 | |
121 | * If we assume that "2b" and "2s" are versions, that pattern | |
122 | * fits with ours. We also add our historical names. | |
123 | */ | |
745fc918 MC |
124 | { "BLAKE2S-256:BLAKE2s256", "provider=default", blake2s256_functions }, |
125 | { "BLAKE2B-512:BLAKE2b512", "provider=default", blake2b512_functions }, | |
d5e5e2ff SL |
126 | #endif /* OPENSSL_NO_BLAKE2 */ |
127 | ||
128 | #ifndef OPENSSL_NO_SM3 | |
745fc918 | 129 | { "SM3", "provider=default", sm3_functions }, |
d5e5e2ff SL |
130 | #endif /* OPENSSL_NO_SM3 */ |
131 | ||
132 | #ifndef OPENSSL_NO_MD5 | |
745fc918 MC |
133 | { "MD5", "provider=default", md5_functions }, |
134 | { "MD5-SHA1", "provider=default", md5_sha1_functions }, | |
d5e5e2ff SL |
135 | #endif /* OPENSSL_NO_MD5 */ |
136 | ||
de29ff17 MC |
137 | { NULL, NULL, NULL } |
138 | }; | |
139 | ||
0d2bfe52 | 140 | static const OSSL_ALGORITHM_CAPABLE deflt_ciphers[] = { |
068489a2 | 141 | ALG("NULL", null_functions), |
0d2bfe52 SL |
142 | ALG("AES-256-ECB", aes256ecb_functions), |
143 | ALG("AES-192-ECB", aes192ecb_functions), | |
144 | ALG("AES-128-ECB", aes128ecb_functions), | |
145 | ALG("AES-256-CBC", aes256cbc_functions), | |
146 | ALG("AES-192-CBC", aes192cbc_functions), | |
147 | ALG("AES-128-CBC", aes128cbc_functions), | |
148 | ALG("AES-256-OFB", aes256ofb_functions), | |
149 | ALG("AES-192-OFB", aes192ofb_functions), | |
150 | ALG("AES-128-OFB", aes128ofb_functions), | |
151 | ALG("AES-256-CFB", aes256cfb_functions), | |
152 | ALG("AES-192-CFB", aes192cfb_functions), | |
153 | ALG("AES-128-CFB", aes128cfb_functions), | |
154 | ALG("AES-256-CFB1", aes256cfb1_functions), | |
155 | ALG("AES-192-CFB1", aes192cfb1_functions), | |
156 | ALG("AES-128-CFB1", aes128cfb1_functions), | |
157 | ALG("AES-256-CFB8", aes256cfb8_functions), | |
158 | ALG("AES-192-CFB8", aes192cfb8_functions), | |
159 | ALG("AES-128-CFB8", aes128cfb8_functions), | |
160 | ALG("AES-256-CTR", aes256ctr_functions), | |
161 | ALG("AES-192-CTR", aes192ctr_functions), | |
162 | ALG("AES-128-CTR", aes128ctr_functions), | |
163 | ALG("AES-256-XTS", aes256xts_functions), | |
164 | ALG("AES-128-XTS", aes128xts_functions), | |
3837c202 | 165 | #ifndef OPENSSL_NO_OCB |
0d2bfe52 SL |
166 | ALG("AES-256-OCB", aes256ocb_functions), |
167 | ALG("AES-192-OCB", aes192ocb_functions), | |
168 | ALG("AES-128-OCB", aes128ocb_functions), | |
3837c202 | 169 | #endif /* OPENSSL_NO_OCB */ |
eb173822 | 170 | #ifndef OPENSSL_NO_SIV |
0d2bfe52 SL |
171 | ALG("AES-128-SIV", aes128siv_functions), |
172 | ALG("AES-192-SIV", aes192siv_functions), | |
173 | ALG("AES-256-SIV", aes256siv_functions), | |
eb173822 | 174 | #endif /* OPENSSL_NO_SIV */ |
0d2bfe52 SL |
175 | ALG("AES-256-GCM:id-aes256-GCM", aes256gcm_functions), |
176 | ALG("AES-192-GCM:id-aes192-GCM", aes192gcm_functions), | |
177 | ALG("AES-128-GCM:id-aes128-GCM", aes128gcm_functions), | |
178 | ALG("AES-256-CCM:id-aes256-CCM", aes256ccm_functions), | |
179 | ALG("AES-192-CCM:id-aes192-CCM", aes192ccm_functions), | |
180 | ALG("AES-128-CCM:id-aes128-CCM", aes128ccm_functions), | |
181 | ALG("AES-256-WRAP:id-aes256-wrap:AES256-WRAP", aes256wrap_functions), | |
182 | ALG("AES-192-WRAP:id-aes192-wrap:AES192-WRAP", aes192wrap_functions), | |
183 | ALG("AES-128-WRAP:id-aes128-wrap:AES128-WRAP", aes128wrap_functions), | |
184 | ALG("AES-256-WRAP-PAD:id-aes256-wrap-pad:AES256-WRAP-PAD", | |
185 | aes256wrappad_functions), | |
186 | ALG("AES-192-WRAP-PAD:id-aes192-wrap-pad:AES192-WRAP-PAD", | |
187 | aes192wrappad_functions), | |
188 | ALG("AES-128-WRAP-PAD:id-aes128-wrap-pad:AES128-WRAP-PAD", | |
189 | aes128wrappad_functions), | |
190 | ALGC("AES-128-CBC-HMAC-SHA1", aes128cbc_hmac_sha1_functions, | |
191 | cipher_capable_aes_cbc_hmac_sha1), | |
192 | ALGC("AES-256-CBC-HMAC-SHA1", aes256cbc_hmac_sha1_functions, | |
193 | cipher_capable_aes_cbc_hmac_sha1), | |
194 | ALGC("AES-128-CBC-HMAC-SHA256", aes128cbc_hmac_sha256_functions, | |
195 | cipher_capable_aes_cbc_hmac_sha256), | |
196 | ALGC("AES-256-CBC-HMAC-SHA256", aes256cbc_hmac_sha256_functions, | |
197 | cipher_capable_aes_cbc_hmac_sha256), | |
a672a02a | 198 | #ifndef OPENSSL_NO_ARIA |
0d2bfe52 SL |
199 | ALG("ARIA-256-GCM", aria256gcm_functions), |
200 | ALG("ARIA-192-GCM", aria192gcm_functions), | |
201 | ALG("ARIA-128-GCM", aria128gcm_functions), | |
202 | ALG("ARIA-256-CCM", aria256ccm_functions), | |
203 | ALG("ARIA-192-CCM", aria192ccm_functions), | |
204 | ALG("ARIA-128-CCM", aria128ccm_functions), | |
205 | ALG("ARIA-256-ECB", aria256ecb_functions), | |
206 | ALG("ARIA-192-ECB", aria192ecb_functions), | |
207 | ALG("ARIA-128-ECB", aria128ecb_functions), | |
208 | ALG("ARIA-256-CBC:ARIA256", aria256cbc_functions), | |
209 | ALG("ARIA-192-CBC:ARIA192", aria192cbc_functions), | |
210 | ALG("ARIA-128-CBC:ARIA128", aria128cbc_functions), | |
211 | ALG("ARIA-256-OFB", aria256ofb_functions), | |
212 | ALG("ARIA-192-OFB", aria192ofb_functions), | |
213 | ALG("ARIA-128-OFB", aria128ofb_functions), | |
214 | ALG("ARIA-256-CFB", aria256cfb_functions), | |
215 | ALG("ARIA-192-CFB", aria192cfb_functions), | |
216 | ALG("ARIA-128-CFB", aria128cfb_functions), | |
217 | ALG("ARIA-256-CFB1", aria256cfb1_functions), | |
218 | ALG("ARIA-192-CFB1", aria192cfb1_functions), | |
219 | ALG("ARIA-128-CFB1", aria128cfb1_functions), | |
220 | ALG("ARIA-256-CFB8", aria256cfb8_functions), | |
221 | ALG("ARIA-192-CFB8", aria192cfb8_functions), | |
222 | ALG("ARIA-128-CFB8", aria128cfb8_functions), | |
223 | ALG("ARIA-256-CTR", aria256ctr_functions), | |
224 | ALG("ARIA-192-CTR", aria192ctr_functions), | |
225 | ALG("ARIA-128-CTR", aria128ctr_functions), | |
a672a02a | 226 | #endif /* OPENSSL_NO_ARIA */ |
e1178600 | 227 | #ifndef OPENSSL_NO_CAMELLIA |
0d2bfe52 SL |
228 | ALG("CAMELLIA-256-ECB", camellia256ecb_functions), |
229 | ALG("CAMELLIA-192-ECB", camellia192ecb_functions), | |
230 | ALG("CAMELLIA-128-ECB", camellia128ecb_functions), | |
231 | ALG("CAMELLIA-256-CBC:CAMELLIA256", camellia256cbc_functions), | |
232 | ALG("CAMELLIA-192-CBC:CAMELLIA192", camellia192cbc_functions), | |
233 | ALG("CAMELLIA-128-CBC:CAMELLIA128", camellia128cbc_functions), | |
234 | ALG("CAMELLIA-256-OFB", camellia256ofb_functions), | |
235 | ALG("CAMELLIA-192-OFB", camellia192ofb_functions), | |
236 | ALG("CAMELLIA-128-OFB", camellia128ofb_functions), | |
237 | ALG("CAMELLIA-256-CFB", camellia256cfb_functions), | |
238 | ALG("CAMELLIA-192-CFB", camellia192cfb_functions), | |
239 | ALG("CAMELLIA-128-CFB", camellia128cfb_functions), | |
240 | ALG("CAMELLIA-256-CFB1", camellia256cfb1_functions), | |
241 | ALG("CAMELLIA-192-CFB1", camellia192cfb1_functions), | |
242 | ALG("CAMELLIA-128-CFB1", camellia128cfb1_functions), | |
243 | ALG("CAMELLIA-256-CFB8", camellia256cfb8_functions), | |
244 | ALG("CAMELLIA-192-CFB8", camellia192cfb8_functions), | |
245 | ALG("CAMELLIA-128-CFB8", camellia128cfb8_functions), | |
246 | ALG("CAMELLIA-256-CTR", camellia256ctr_functions), | |
247 | ALG("CAMELLIA-192-CTR", camellia192ctr_functions), | |
248 | ALG("CAMELLIA-128-CTR", camellia128ctr_functions), | |
e1178600 | 249 | #endif /* OPENSSL_NO_CAMELLIA */ |
cb1548bc | 250 | #ifndef OPENSSL_NO_DES |
0d2bfe52 SL |
251 | ALG("DES-EDE3-ECB:DES-EDE3", tdes_ede3_ecb_functions), |
252 | ALG("DES-EDE3-CBC:DES3", tdes_ede3_cbc_functions), | |
253 | ALG("DES-EDE3-OFB", tdes_ede3_ofb_functions), | |
254 | ALG("DES-EDE3-CFB", tdes_ede3_cfb_functions), | |
255 | ALG("DES-EDE3-CFB8", tdes_ede3_cfb8_functions), | |
256 | ALG("DES-EDE3-CFB1", tdes_ede3_cfb1_functions), | |
257 | ALG("DES-EDE-ECB:DES-EDE", tdes_ede2_ecb_functions), | |
258 | ALG("DES-EDE-CBC", tdes_ede2_cbc_functions), | |
259 | ALG("DES-EDE-OFB", tdes_ede2_ofb_functions), | |
260 | ALG("DES-EDE-CFB", tdes_ede2_cfb_functions), | |
261 | ALG("DESX-CBC:DESX", tdes_desx_cbc_functions), | |
262 | ALG("DES3-WRAP:id-smime-alg-CMS3DESwrap", tdes_wrap_cbc_functions), | |
263 | ALG("DES-ECB", des_ecb_functions), | |
264 | ALG("DES-CBC:DES", des_cbc_functions), | |
265 | ALG("DES-OFB", des_ofb64_functions), | |
266 | ALG("DES-CFB", des_cfb64_functions), | |
267 | ALG("DES-CFB1", des_cfb1_functions), | |
268 | ALG("DES-CFB8", des_cfb8_functions), | |
cb1548bc | 269 | #endif /* OPENSSL_NO_DES */ |
55c7dc79 | 270 | #ifndef OPENSSL_NO_BF |
0d2bfe52 SL |
271 | ALG("BF-ECB", blowfish128ecb_functions), |
272 | ALG("BF-CBC:BF:BLOWFISH", blowfish128cbc_functions), | |
273 | ALG("BF-OFB", blowfish64ofb64_functions), | |
274 | ALG("BF-CFB", blowfish64cfb64_functions), | |
55c7dc79 | 275 | #endif /* OPENSSL_NO_BF */ |
f22431f2 | 276 | #ifndef OPENSSL_NO_IDEA |
0d2bfe52 SL |
277 | ALG("IDEA-ECB", idea128ecb_functions), |
278 | ALG("IDEA-CBC:IDEA", idea128cbc_functions), | |
279 | ALG("IDEA-OFB:IDEA-OFB64", idea128ofb64_functions), | |
280 | ALG("IDEA-CFB:IDEA-CFB64", idea128cfb64_functions), | |
f22431f2 | 281 | #endif /* OPENSSL_NO_IDEA */ |
18b00427 | 282 | #ifndef OPENSSL_NO_CAST |
0d2bfe52 SL |
283 | ALG("CAST5-ECB", cast5128ecb_functions), |
284 | ALG("CAST5-CBC:CAST-CBC:CAST", cast5128cbc_functions), | |
285 | ALG("CAST5-OFB", cast564ofb64_functions), | |
286 | ALG("CAST5-CFB", cast564cfb64_functions), | |
18b00427 | 287 | #endif /* OPENSSL_NO_CAST */ |
70adc646 | 288 | #ifndef OPENSSL_NO_SEED |
0d2bfe52 SL |
289 | ALG("SEED-ECB", seed128ecb_functions), |
290 | ALG("SEED-CBC:SEED", seed128cbc_functions), | |
291 | ALG("SEED-OFB:SEED-OFB128", seed128ofb128_functions), | |
292 | ALG("SEED-CFB:SEED-CFB128", seed128cfb128_functions), | |
70adc646 | 293 | #endif /* OPENSSL_NO_SEED */ |
105dde25 | 294 | #ifndef OPENSSL_NO_SM4 |
0d2bfe52 SL |
295 | ALG("SM4-ECB", sm4128ecb_functions), |
296 | ALG("SM4-CBC:SM4", sm4128cbc_functions), | |
297 | ALG("SM4-CTR", sm4128ctr_functions), | |
298 | ALG("SM4-OFB:SM4-OFB128", sm4128ofb128_functions), | |
299 | ALG("SM4-CFB:SM4-CFB128", sm4128cfb128_functions), | |
105dde25 | 300 | #endif /* OPENSSL_NO_SM4 */ |
bafde183 | 301 | #ifndef OPENSSL_NO_RC4 |
0d2bfe52 SL |
302 | ALG("RC4", rc4128_functions), |
303 | ALG("RC4-40", rc440_functions), | |
8fece335 | 304 | # ifndef OPENSSL_NO_MD5 |
0d2bfe52 | 305 | ALG("RC4-HMAC-MD5", rc4_hmac_md5_functions), |
8fece335 | 306 | # endif /* OPENSSL_NO_MD5 */ |
bafde183 | 307 | #endif /* OPENSSL_NO_RC4 */ |
6a41156c | 308 | #ifndef OPENSSL_NO_RC5 |
0d2bfe52 SL |
309 | ALG("RC5-ECB", rc5128ecb_functions), |
310 | ALG("RC5-CBC", rc5128cbc_functions), | |
311 | ALG("RC5-OFB", rc5128ofb64_functions), | |
312 | ALG("RC5-CFB", rc5128cfb64_functions), | |
6a41156c | 313 | #endif /* OPENSSL_NO_RC5 */ |
f816aa47 | 314 | #ifndef OPENSSL_NO_RC2 |
0d2bfe52 SL |
315 | ALG("RC2-ECB", rc2128ecb_functions), |
316 | ALG("RC2-CBC", rc2128cbc_functions), | |
317 | ALG("RC2-40-CBC", rc240cbc_functions), | |
318 | ALG("RC2-64-CBC", rc264cbc_functions), | |
319 | ALG("RC2-CFB", rc2128cfb128_functions), | |
320 | ALG("RC2-OFB", rc2128ofb128_functions), | |
f816aa47 | 321 | #endif /* OPENSSL_NO_RC2 */ |
3d5a7578 | 322 | #ifndef OPENSSL_NO_CHACHA |
0d2bfe52 | 323 | ALG("ChaCha20", chacha20_functions), |
3d5a7578 | 324 | # ifndef OPENSSL_NO_POLY1305 |
0d2bfe52 | 325 | ALG("ChaCha20-Poly1305", chacha20_poly1305_functions), |
3d5a7578 SL |
326 | # endif /* OPENSSL_NO_POLY1305 */ |
327 | #endif /* OPENSSL_NO_CHACHA */ | |
0d2bfe52 | 328 | { { NULL, NULL, NULL }, NULL } |
aab26e6f | 329 | }; |
0d2bfe52 | 330 | static OSSL_ALGORITHM exported_ciphers[OSSL_NELEM(deflt_ciphers)]; |
aab26e6f | 331 | |
55a0a117 RL |
332 | static const OSSL_ALGORITHM deflt_macs[] = { |
333 | #ifndef OPENSSL_NO_BLAKE2 | |
745fc918 MC |
334 | { "BLAKE2BMAC", "provider=default", blake2bmac_functions }, |
335 | { "BLAKE2SMAC", "provider=default", blake2smac_functions }, | |
2e5db6ad RL |
336 | #endif |
337 | #ifndef OPENSSL_NO_CMAC | |
745fc918 | 338 | { "CMAC", "provider=default", cmac_functions }, |
55a0a117 | 339 | #endif |
745fc918 MC |
340 | { "GMAC", "provider=default", gmac_functions }, |
341 | { "HMAC", "provider=default", hmac_functions }, | |
342 | { "KMAC-128:KMAC128", "provider=default", kmac128_functions }, | |
343 | { "KMAC-256:KMAC256", "provider=default", kmac256_functions }, | |
4657693d | 344 | #ifndef OPENSSL_NO_SIPHASH |
745fc918 | 345 | { "SIPHASH", "provider=default", siphash_functions }, |
ae0b6b92 RL |
346 | #endif |
347 | #ifndef OPENSSL_NO_POLY1305 | |
745fc918 | 348 | { "POLY1305", "provider=default", poly1305_functions }, |
4657693d | 349 | #endif |
55a0a117 RL |
350 | { NULL, NULL, NULL } |
351 | }; | |
352 | ||
e3405a4a | 353 | static const OSSL_ALGORITHM deflt_kdfs[] = { |
745fc918 MC |
354 | { "HKDF", "provider=default", kdf_hkdf_functions }, |
355 | { "SSKDF", "provider=default", kdf_sskdf_functions }, | |
356 | { "PBKDF2", "provider=default", kdf_pbkdf2_functions }, | |
357 | { "SSHKDF", "provider=default", kdf_sshkdf_functions }, | |
358 | { "X963KDF", "provider=default", kdf_x963_kdf_functions }, | |
359 | { "TLS1-PRF", "provider=default", kdf_tls1_prf_functions }, | |
360 | { "KBKDF", "provider=default", kdf_kbkdf_functions }, | |
e3405a4a | 361 | #ifndef OPENSSL_NO_CMS |
745fc918 | 362 | { "X942KDF", "provider=default", kdf_x942_kdf_functions }, |
e3405a4a P |
363 | #endif |
364 | #ifndef OPENSSL_NO_SCRYPT | |
745fc918 | 365 | { "SCRYPT:id-scrypt", "provider=default", kdf_scrypt_functions }, |
e3405a4a | 366 | #endif |
745fc918 | 367 | { "KRB5KDF", "provider=default", kdf_krb5kdf_functions }, |
0fee1dff | 368 | { NULL, NULL, NULL } |
e3405a4a P |
369 | }; |
370 | ||
89e29174 | 371 | static const OSSL_ALGORITHM deflt_keyexch[] = { |
76ca35e7 | 372 | #ifndef OPENSSL_NO_DH |
745fc918 | 373 | { "DH:dhKeyAgreement", "provider=default", dh_keyexch_functions }, |
6f7d2135 MC |
374 | #endif |
375 | #ifndef OPENSSL_NO_EC | |
745fc918 MC |
376 | { "ECDH:id-ecPublicKey", "provider=default", ecdh_keyexch_functions }, |
377 | { "X25519", "provider=default", x25519_keyexch_functions }, | |
378 | { "X448", "provider=default", x448_keyexch_functions }, | |
8b84b075 RL |
379 | #endif |
380 | { NULL, NULL, NULL } | |
381 | }; | |
382 | ||
4889dadc MC |
383 | static const OSSL_ALGORITHM deflt_signature[] = { |
384 | #ifndef OPENSSL_NO_DSA | |
745fc918 | 385 | { "DSA:dsaEncryption", "provider=default", dsa_signature_functions }, |
4889dadc MC |
386 | #endif |
387 | { NULL, NULL, NULL } | |
388 | }; | |
389 | ||
89abd1b6 | 390 | static const OSSL_ALGORITHM deflt_asym_cipher[] = { |
745fc918 | 391 | { "RSA:rsaEncryption", "provider=default", rsa_asym_cipher_functions }, |
89abd1b6 MC |
392 | { NULL, NULL, NULL } |
393 | }; | |
4889dadc | 394 | |
8b84b075 RL |
395 | static const OSSL_ALGORITHM deflt_keymgmt[] = { |
396 | #ifndef OPENSSL_NO_DH | |
745fc918 | 397 | { "DH:dhKeyAgreement", "provider=default", dh_keymgmt_functions }, |
4889dadc MC |
398 | #endif |
399 | #ifndef OPENSSL_NO_DSA | |
745fc918 | 400 | { "DSA:dsaEncryption", "provider=default", dsa_keymgmt_functions }, |
76ca35e7 | 401 | #endif |
745fc918 | 402 | { "RSA:rsaEncryption", "provider=default", rsa_keymgmt_functions }, |
90d3cb57 | 403 | #ifndef OPENSSL_NO_EC |
745fc918 MC |
404 | { "EC:id-ecPublicKey", "provider=default", ec_keymgmt_functions }, |
405 | { "X25519", "provider=default", x25519_keymgmt_functions }, | |
406 | { "X448", "provider=default", x448_keymgmt_functions }, | |
90d3cb57 | 407 | #endif |
89e29174 MC |
408 | { NULL, NULL, NULL } |
409 | }; | |
410 | ||
745fc918 MC |
411 | /* |
412 | * Unlike most algorithms in the default provider, the serializers are allowed | |
413 | * for use in FIPS mode because they are not FIPS relevant, and therefore have | |
414 | * the "fips=yes" property. | |
415 | */ | |
677add38 | 416 | static const OSSL_ALGORITHM deflt_serializer[] = { |
745fc918 | 417 | { "RSA", "provider=default,fips=yes,format=text,type=private", |
677add38 | 418 | rsa_priv_text_serializer_functions }, |
745fc918 | 419 | { "RSA", "provider=default,fips=yes,format=text,type=public", |
677add38 | 420 | rsa_pub_text_serializer_functions }, |
745fc918 | 421 | { "RSA", "provider=default,fips=yes,format=der,type=private", |
677add38 | 422 | rsa_priv_der_serializer_functions }, |
745fc918 | 423 | { "RSA", "provider=default,fips=yes,format=der,type=public", |
677add38 | 424 | rsa_pub_der_serializer_functions }, |
745fc918 | 425 | { "RSA", "provider=default,fips=yes,format=pem,type=private", |
677add38 | 426 | rsa_priv_pem_serializer_functions }, |
745fc918 | 427 | { "RSA", "provider=default,fips=yes,format=pem,type=public", |
677add38 RL |
428 | rsa_pub_pem_serializer_functions }, |
429 | ||
285c6913 | 430 | #ifndef OPENSSL_NO_DH |
745fc918 | 431 | { "DH", "provider=default,fips=yes,format=text,type=private", |
045e51cb | 432 | dh_priv_text_serializer_functions }, |
745fc918 | 433 | { "DH", "provider=default,fips=yes,format=text,type=public", |
045e51cb | 434 | dh_pub_text_serializer_functions }, |
745fc918 | 435 | { "DH", "provider=default,fips=yes,format=text,type=parameters", |
045e51cb | 436 | dh_param_text_serializer_functions }, |
745fc918 | 437 | { "DH", "provider=default,fips=yes,format=der,type=private", |
045e51cb | 438 | dh_priv_der_serializer_functions }, |
745fc918 | 439 | { "DH", "provider=default,fips=yes,format=der,type=public", |
045e51cb | 440 | dh_pub_der_serializer_functions }, |
745fc918 | 441 | { "DH", "provider=default,fips=yes,format=der,type=parameters", |
045e51cb | 442 | dh_param_der_serializer_functions }, |
745fc918 | 443 | { "DH", "provider=default,fips=yes,format=pem,type=private", |
045e51cb | 444 | dh_priv_pem_serializer_functions }, |
745fc918 | 445 | { "DH", "provider=default,fips=yes,format=pem,type=public", |
045e51cb | 446 | dh_pub_pem_serializer_functions }, |
745fc918 | 447 | { "DH", "provider=default,fips=yes,format=pem,type=parameters", |
045e51cb | 448 | dh_param_pem_serializer_functions }, |
285c6913 | 449 | #endif |
045e51cb | 450 | |
a0e594d6 | 451 | #ifndef OPENSSL_NO_DSA |
745fc918 | 452 | { "DSA", "provider=default,fips=yes,format=text,type=private", |
a0e594d6 | 453 | dsa_priv_text_serializer_functions }, |
745fc918 | 454 | { "DSA", "provider=default,fips=yes,format=text,type=public", |
a0e594d6 | 455 | dsa_pub_text_serializer_functions }, |
745fc918 | 456 | { "DSA", "provider=default,fips=yes,format=text,type=parameters", |
a0e594d6 | 457 | dsa_param_text_serializer_functions }, |
745fc918 | 458 | { "DSA", "provider=default,fips=yes,format=der,type=private", |
a0e594d6 | 459 | dsa_priv_der_serializer_functions }, |
745fc918 | 460 | { "DSA", "provider=default,fips=yes,format=der,type=public", |
a0e594d6 | 461 | dsa_pub_der_serializer_functions }, |
745fc918 | 462 | { "DSA", "provider=default,fips=yes,format=der,type=parameters", |
a0e594d6 | 463 | dsa_param_der_serializer_functions }, |
745fc918 | 464 | { "DSA", "provider=default,fips=yes,format=pem,type=private", |
a0e594d6 | 465 | dsa_priv_pem_serializer_functions }, |
745fc918 | 466 | { "DSA", "provider=default,fips=yes,format=pem,type=public", |
a0e594d6 | 467 | dsa_pub_pem_serializer_functions }, |
745fc918 | 468 | { "DSA", "provider=default,fips=yes,format=pem,type=parameters", |
a0e594d6 RL |
469 | dsa_param_pem_serializer_functions }, |
470 | #endif | |
471 | ||
677add38 RL |
472 | { NULL, NULL, NULL } |
473 | }; | |
474 | ||
de29ff17 MC |
475 | static const OSSL_ALGORITHM *deflt_query(OSSL_PROVIDER *prov, |
476 | int operation_id, | |
477 | int *no_cache) | |
478 | { | |
479 | *no_cache = 0; | |
480 | switch (operation_id) { | |
481 | case OSSL_OP_DIGEST: | |
482 | return deflt_digests; | |
aab26e6f | 483 | case OSSL_OP_CIPHER: |
0d2bfe52 SL |
484 | ossl_prov_cache_exported_algorithms(deflt_ciphers, exported_ciphers); |
485 | return exported_ciphers; | |
55a0a117 RL |
486 | case OSSL_OP_MAC: |
487 | return deflt_macs; | |
e3405a4a P |
488 | case OSSL_OP_KDF: |
489 | return deflt_kdfs; | |
8b84b075 RL |
490 | case OSSL_OP_KEYMGMT: |
491 | return deflt_keymgmt; | |
89e29174 MC |
492 | case OSSL_OP_KEYEXCH: |
493 | return deflt_keyexch; | |
4889dadc MC |
494 | case OSSL_OP_SIGNATURE: |
495 | return deflt_signature; | |
89abd1b6 MC |
496 | case OSSL_OP_ASYM_CIPHER: |
497 | return deflt_asym_cipher; | |
677add38 RL |
498 | case OSSL_OP_SERIALIZER: |
499 | return deflt_serializer; | |
de29ff17 MC |
500 | } |
501 | return NULL; | |
502 | } | |
503 | ||
8a73348b MC |
504 | /* Functions we provide to the core */ |
505 | static const OSSL_DISPATCH deflt_dispatch_table[] = { | |
dca97d00 | 506 | { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))deflt_gettable_params }, |
8a73348b | 507 | { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))deflt_get_params }, |
de29ff17 | 508 | { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))deflt_query }, |
8a73348b MC |
509 | { 0, NULL } |
510 | }; | |
511 | ||
512 | OSSL_provider_init_fn ossl_default_provider_init; | |
513 | ||
514 | int ossl_default_provider_init(const OSSL_PROVIDER *provider, | |
515 | const OSSL_DISPATCH *in, | |
a39eb840 RL |
516 | const OSSL_DISPATCH **out, |
517 | void **provctx) | |
8a73348b | 518 | { |
8013a933 RL |
519 | OSSL_core_get_library_context_fn *c_get_libctx = NULL; |
520 | ||
63665fff RL |
521 | if (!ossl_prov_bio_from_dispatch(in)) |
522 | return 0; | |
8a73348b MC |
523 | for (; in->function_id != 0; in++) { |
524 | switch (in->function_id) { | |
dca97d00 RL |
525 | case OSSL_FUNC_CORE_GETTABLE_PARAMS: |
526 | c_gettable_params = OSSL_get_core_gettable_params(in); | |
8a73348b MC |
527 | break; |
528 | case OSSL_FUNC_CORE_GET_PARAMS: | |
529 | c_get_params = OSSL_get_core_get_params(in); | |
530 | break; | |
8013a933 RL |
531 | case OSSL_FUNC_CORE_GET_LIBRARY_CONTEXT: |
532 | c_get_libctx = OSSL_get_core_get_library_context(in); | |
533 | break; | |
8a73348b MC |
534 | default: |
535 | /* Just ignore anything we don't understand */ | |
536 | break; | |
537 | } | |
538 | } | |
539 | ||
8013a933 RL |
540 | if (c_get_libctx == NULL) |
541 | return 0; | |
542 | ||
8a73348b | 543 | *out = deflt_dispatch_table; |
8013a933 RL |
544 | |
545 | /* | |
546 | * We want to make sure that all calls from this provider that requires | |
547 | * a library context use the same context as the one used to call our | |
548 | * functions. We do that by passing it along as the provider context. | |
549 | */ | |
550 | *provctx = c_get_libctx(provider); | |
8a73348b MC |
551 | return 1; |
552 | } |