]>
Commit | Line | Data |
---|---|---|
8a73348b | 1 | /* |
33388b44 | 2 | * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. |
8a73348b MC |
3 | * |
4 | * Licensed under the Apache License 2.0 (the "License"). You may not use | |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
8 | */ | |
9 | ||
10 | #include <string.h> | |
11 | #include <stdio.h> | |
55a0a117 | 12 | #include <openssl/opensslconf.h> |
8a73348b | 13 | #include <openssl/core.h> |
23c48d94 | 14 | #include <openssl/core_dispatch.h> |
8a73348b MC |
15 | #include <openssl/core_names.h> |
16 | #include <openssl/params.h> | |
63665fff | 17 | #include "prov/bio.h" |
fdaad3f1 | 18 | #include "prov/provider_ctx.h" |
0d2bfe52 | 19 | #include "prov/providercommon.h" |
af3e7e1b | 20 | #include "prov/implementations.h" |
0d2bfe52 SL |
21 | #include "prov/provider_util.h" |
22 | #include "internal/nelem.h" | |
23 | ||
fdaad3f1 RL |
24 | /* |
25 | * Forward declarations to ensure that interface functions are correctly | |
26 | * defined. | |
27 | */ | |
363b1e5d DMSP |
28 | static OSSL_FUNC_provider_gettable_params_fn deflt_gettable_params; |
29 | static OSSL_FUNC_provider_get_params_fn deflt_get_params; | |
30 | static OSSL_FUNC_provider_query_operation_fn deflt_query; | |
fdaad3f1 | 31 | |
745fc918 | 32 | #define ALGC(NAMES, FUNC, CHECK) { { NAMES, "provider=default", FUNC }, CHECK } |
0d2bfe52 | 33 | #define ALG(NAMES, FUNC) ALGC(NAMES, FUNC, NULL) |
8a73348b MC |
34 | |
35 | /* Functions provided by the core */ | |
363b1e5d DMSP |
36 | static OSSL_FUNC_core_gettable_params_fn *c_gettable_params = NULL; |
37 | static OSSL_FUNC_core_get_params_fn *c_get_params = NULL; | |
8a73348b MC |
38 | |
39 | /* Parameters we provide to the core */ | |
26175013 RL |
40 | static const OSSL_PARAM deflt_param_types[] = { |
41 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
42 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_VERSION, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
43 | OSSL_PARAM_DEFN(OSSL_PROV_PARAM_BUILDINFO, OSSL_PARAM_UTF8_PTR, NULL, 0), | |
44 | OSSL_PARAM_END | |
8a73348b MC |
45 | }; |
46 | ||
fdaad3f1 | 47 | static const OSSL_PARAM *deflt_gettable_params(void *provctx) |
8a73348b MC |
48 | { |
49 | return deflt_param_types; | |
50 | } | |
51 | ||
fdaad3f1 | 52 | static int deflt_get_params(void *provctx, OSSL_PARAM params[]) |
8a73348b | 53 | { |
4e7991b4 | 54 | OSSL_PARAM *p; |
8a73348b MC |
55 | |
56 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME); | |
57 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, "OpenSSL Default Provider")) | |
58 | return 0; | |
59 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_VERSION); | |
60 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_VERSION_STR)) | |
61 | return 0; | |
62 | p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_BUILDINFO); | |
63 | if (p != NULL && !OSSL_PARAM_set_utf8_ptr(p, OPENSSL_FULL_VERSION_STR)) | |
64 | return 0; | |
65 | ||
66 | return 1; | |
67 | } | |
68 | ||
df553b79 RL |
69 | /* |
70 | * For the algorithm names, we use the following formula for our primary | |
71 | * names: | |
72 | * | |
73 | * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] | |
74 | * | |
75 | * VERSION is only present if there are multiple versions of | |
76 | * an alg (MD2, MD4, MD5). It may be omitted if there is only | |
77 | * one version (if a subsequent version is released in the future, | |
78 | * we can always change the canonical name, and add the old name | |
79 | * as an alias). | |
80 | * | |
81 | * SUBNAME may be present where we are combining multiple | |
82 | * algorithms together, e.g. MD5-SHA1. | |
83 | * | |
84 | * SIZE is only present if multiple versions of an algorithm exist | |
85 | * with different sizes (e.g. AES-128-CBC, AES-256-CBC) | |
86 | * | |
87 | * MODE is only present where applicable. | |
88 | * | |
89 | * We add diverse other names where applicable, such as the names that | |
90 | * NIST uses, or that are used for ASN.1 OBJECT IDENTIFIERs, or names | |
91 | * we have used historically. | |
cc35c3ed MC |
92 | * |
93 | * Algorithm names are case insensitive, but we use all caps in our "canonical" | |
94 | * names for consistency. | |
df553b79 | 95 | */ |
de29ff17 | 96 | static const OSSL_ALGORITHM deflt_digests[] = { |
df553b79 | 97 | /* Our primary name:NIST name[:our older names] */ |
745fc918 MC |
98 | { "SHA1:SHA-1", "provider=default", sha1_functions }, |
99 | { "SHA2-224:SHA-224:SHA224", "provider=default", sha224_functions }, | |
100 | { "SHA2-256:SHA-256:SHA256", "provider=default", sha256_functions }, | |
101 | { "SHA2-384:SHA-384:SHA384", "provider=default", sha384_functions }, | |
102 | { "SHA2-512:SHA-512:SHA512", "provider=default", sha512_functions }, | |
103 | { "SHA2-512/224:SHA-512/224:SHA512-224", "provider=default", | |
df553b79 | 104 | sha512_224_functions }, |
745fc918 | 105 | { "SHA2-512/256:SHA-512/256:SHA512-256", "provider=default", |
df553b79 | 106 | sha512_256_functions }, |
d5e5e2ff | 107 | |
df553b79 | 108 | /* We agree with NIST here, so one name only */ |
745fc918 MC |
109 | { "SHA3-224", "provider=default", sha3_224_functions }, |
110 | { "SHA3-256", "provider=default", sha3_256_functions }, | |
111 | { "SHA3-384", "provider=default", sha3_384_functions }, | |
112 | { "SHA3-512", "provider=default", sha3_512_functions }, | |
d5e5e2ff | 113 | |
e23cda00 | 114 | /* |
cc35c3ed MC |
115 | * KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for |
116 | * the KMAC-128 and KMAC-256. | |
e23cda00 | 117 | */ |
745fc918 MC |
118 | { "KECCAK-KMAC-128:KECCAK-KMAC128", "provider=default", keccak_kmac_128_functions }, |
119 | { "KECCAK-KMAC-256:KECCAK-KMAC256", "provider=default", keccak_kmac_256_functions }, | |
d5e5e2ff | 120 | |
df553b79 | 121 | /* Our primary name:NIST name */ |
745fc918 MC |
122 | { "SHAKE-128:SHAKE128", "provider=default", shake_128_functions }, |
123 | { "SHAKE-256:SHAKE256", "provider=default", shake_256_functions }, | |
d5e5e2ff SL |
124 | |
125 | #ifndef OPENSSL_NO_BLAKE2 | |
df553b79 RL |
126 | /* |
127 | * https://blake2.net/ doesn't specify size variants, | |
128 | * but mentions that Bouncy Castle uses the names | |
129 | * BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and BLAKE2b-512 | |
130 | * If we assume that "2b" and "2s" are versions, that pattern | |
131 | * fits with ours. We also add our historical names. | |
132 | */ | |
745fc918 MC |
133 | { "BLAKE2S-256:BLAKE2s256", "provider=default", blake2s256_functions }, |
134 | { "BLAKE2B-512:BLAKE2b512", "provider=default", blake2b512_functions }, | |
d5e5e2ff SL |
135 | #endif /* OPENSSL_NO_BLAKE2 */ |
136 | ||
137 | #ifndef OPENSSL_NO_SM3 | |
745fc918 | 138 | { "SM3", "provider=default", sm3_functions }, |
d5e5e2ff SL |
139 | #endif /* OPENSSL_NO_SM3 */ |
140 | ||
141 | #ifndef OPENSSL_NO_MD5 | |
745fc918 MC |
142 | { "MD5", "provider=default", md5_functions }, |
143 | { "MD5-SHA1", "provider=default", md5_sha1_functions }, | |
d5e5e2ff SL |
144 | #endif /* OPENSSL_NO_MD5 */ |
145 | ||
de29ff17 MC |
146 | { NULL, NULL, NULL } |
147 | }; | |
148 | ||
0d2bfe52 | 149 | static const OSSL_ALGORITHM_CAPABLE deflt_ciphers[] = { |
068489a2 | 150 | ALG("NULL", null_functions), |
0d2bfe52 SL |
151 | ALG("AES-256-ECB", aes256ecb_functions), |
152 | ALG("AES-192-ECB", aes192ecb_functions), | |
153 | ALG("AES-128-ECB", aes128ecb_functions), | |
154 | ALG("AES-256-CBC", aes256cbc_functions), | |
155 | ALG("AES-192-CBC", aes192cbc_functions), | |
156 | ALG("AES-128-CBC", aes128cbc_functions), | |
7cc355c2 SL |
157 | ALG("AES-128-CBC-CTS", aes128cbc_cts_functions), |
158 | ALG("AES-192-CBC-CTS", aes192cbc_cts_functions), | |
159 | ALG("AES-256-CBC-CTS", aes256cbc_cts_functions), | |
0d2bfe52 SL |
160 | ALG("AES-256-OFB", aes256ofb_functions), |
161 | ALG("AES-192-OFB", aes192ofb_functions), | |
162 | ALG("AES-128-OFB", aes128ofb_functions), | |
163 | ALG("AES-256-CFB", aes256cfb_functions), | |
164 | ALG("AES-192-CFB", aes192cfb_functions), | |
165 | ALG("AES-128-CFB", aes128cfb_functions), | |
166 | ALG("AES-256-CFB1", aes256cfb1_functions), | |
167 | ALG("AES-192-CFB1", aes192cfb1_functions), | |
168 | ALG("AES-128-CFB1", aes128cfb1_functions), | |
169 | ALG("AES-256-CFB8", aes256cfb8_functions), | |
170 | ALG("AES-192-CFB8", aes192cfb8_functions), | |
171 | ALG("AES-128-CFB8", aes128cfb8_functions), | |
172 | ALG("AES-256-CTR", aes256ctr_functions), | |
173 | ALG("AES-192-CTR", aes192ctr_functions), | |
174 | ALG("AES-128-CTR", aes128ctr_functions), | |
175 | ALG("AES-256-XTS", aes256xts_functions), | |
176 | ALG("AES-128-XTS", aes128xts_functions), | |
3837c202 | 177 | #ifndef OPENSSL_NO_OCB |
0d2bfe52 SL |
178 | ALG("AES-256-OCB", aes256ocb_functions), |
179 | ALG("AES-192-OCB", aes192ocb_functions), | |
180 | ALG("AES-128-OCB", aes128ocb_functions), | |
3837c202 | 181 | #endif /* OPENSSL_NO_OCB */ |
eb173822 | 182 | #ifndef OPENSSL_NO_SIV |
0d2bfe52 SL |
183 | ALG("AES-128-SIV", aes128siv_functions), |
184 | ALG("AES-192-SIV", aes192siv_functions), | |
185 | ALG("AES-256-SIV", aes256siv_functions), | |
eb173822 | 186 | #endif /* OPENSSL_NO_SIV */ |
0d2bfe52 SL |
187 | ALG("AES-256-GCM:id-aes256-GCM", aes256gcm_functions), |
188 | ALG("AES-192-GCM:id-aes192-GCM", aes192gcm_functions), | |
189 | ALG("AES-128-GCM:id-aes128-GCM", aes128gcm_functions), | |
190 | ALG("AES-256-CCM:id-aes256-CCM", aes256ccm_functions), | |
191 | ALG("AES-192-CCM:id-aes192-CCM", aes192ccm_functions), | |
192 | ALG("AES-128-CCM:id-aes128-CCM", aes128ccm_functions), | |
193 | ALG("AES-256-WRAP:id-aes256-wrap:AES256-WRAP", aes256wrap_functions), | |
194 | ALG("AES-192-WRAP:id-aes192-wrap:AES192-WRAP", aes192wrap_functions), | |
195 | ALG("AES-128-WRAP:id-aes128-wrap:AES128-WRAP", aes128wrap_functions), | |
196 | ALG("AES-256-WRAP-PAD:id-aes256-wrap-pad:AES256-WRAP-PAD", | |
197 | aes256wrappad_functions), | |
198 | ALG("AES-192-WRAP-PAD:id-aes192-wrap-pad:AES192-WRAP-PAD", | |
199 | aes192wrappad_functions), | |
200 | ALG("AES-128-WRAP-PAD:id-aes128-wrap-pad:AES128-WRAP-PAD", | |
201 | aes128wrappad_functions), | |
202 | ALGC("AES-128-CBC-HMAC-SHA1", aes128cbc_hmac_sha1_functions, | |
203 | cipher_capable_aes_cbc_hmac_sha1), | |
204 | ALGC("AES-256-CBC-HMAC-SHA1", aes256cbc_hmac_sha1_functions, | |
205 | cipher_capable_aes_cbc_hmac_sha1), | |
206 | ALGC("AES-128-CBC-HMAC-SHA256", aes128cbc_hmac_sha256_functions, | |
207 | cipher_capable_aes_cbc_hmac_sha256), | |
208 | ALGC("AES-256-CBC-HMAC-SHA256", aes256cbc_hmac_sha256_functions, | |
209 | cipher_capable_aes_cbc_hmac_sha256), | |
a672a02a | 210 | #ifndef OPENSSL_NO_ARIA |
0d2bfe52 SL |
211 | ALG("ARIA-256-GCM", aria256gcm_functions), |
212 | ALG("ARIA-192-GCM", aria192gcm_functions), | |
213 | ALG("ARIA-128-GCM", aria128gcm_functions), | |
214 | ALG("ARIA-256-CCM", aria256ccm_functions), | |
215 | ALG("ARIA-192-CCM", aria192ccm_functions), | |
216 | ALG("ARIA-128-CCM", aria128ccm_functions), | |
217 | ALG("ARIA-256-ECB", aria256ecb_functions), | |
218 | ALG("ARIA-192-ECB", aria192ecb_functions), | |
219 | ALG("ARIA-128-ECB", aria128ecb_functions), | |
220 | ALG("ARIA-256-CBC:ARIA256", aria256cbc_functions), | |
221 | ALG("ARIA-192-CBC:ARIA192", aria192cbc_functions), | |
222 | ALG("ARIA-128-CBC:ARIA128", aria128cbc_functions), | |
223 | ALG("ARIA-256-OFB", aria256ofb_functions), | |
224 | ALG("ARIA-192-OFB", aria192ofb_functions), | |
225 | ALG("ARIA-128-OFB", aria128ofb_functions), | |
226 | ALG("ARIA-256-CFB", aria256cfb_functions), | |
227 | ALG("ARIA-192-CFB", aria192cfb_functions), | |
228 | ALG("ARIA-128-CFB", aria128cfb_functions), | |
229 | ALG("ARIA-256-CFB1", aria256cfb1_functions), | |
230 | ALG("ARIA-192-CFB1", aria192cfb1_functions), | |
231 | ALG("ARIA-128-CFB1", aria128cfb1_functions), | |
232 | ALG("ARIA-256-CFB8", aria256cfb8_functions), | |
233 | ALG("ARIA-192-CFB8", aria192cfb8_functions), | |
234 | ALG("ARIA-128-CFB8", aria128cfb8_functions), | |
235 | ALG("ARIA-256-CTR", aria256ctr_functions), | |
236 | ALG("ARIA-192-CTR", aria192ctr_functions), | |
237 | ALG("ARIA-128-CTR", aria128ctr_functions), | |
a672a02a | 238 | #endif /* OPENSSL_NO_ARIA */ |
e1178600 | 239 | #ifndef OPENSSL_NO_CAMELLIA |
0d2bfe52 SL |
240 | ALG("CAMELLIA-256-ECB", camellia256ecb_functions), |
241 | ALG("CAMELLIA-192-ECB", camellia192ecb_functions), | |
242 | ALG("CAMELLIA-128-ECB", camellia128ecb_functions), | |
243 | ALG("CAMELLIA-256-CBC:CAMELLIA256", camellia256cbc_functions), | |
244 | ALG("CAMELLIA-192-CBC:CAMELLIA192", camellia192cbc_functions), | |
245 | ALG("CAMELLIA-128-CBC:CAMELLIA128", camellia128cbc_functions), | |
246 | ALG("CAMELLIA-256-OFB", camellia256ofb_functions), | |
247 | ALG("CAMELLIA-192-OFB", camellia192ofb_functions), | |
248 | ALG("CAMELLIA-128-OFB", camellia128ofb_functions), | |
249 | ALG("CAMELLIA-256-CFB", camellia256cfb_functions), | |
250 | ALG("CAMELLIA-192-CFB", camellia192cfb_functions), | |
251 | ALG("CAMELLIA-128-CFB", camellia128cfb_functions), | |
252 | ALG("CAMELLIA-256-CFB1", camellia256cfb1_functions), | |
253 | ALG("CAMELLIA-192-CFB1", camellia192cfb1_functions), | |
254 | ALG("CAMELLIA-128-CFB1", camellia128cfb1_functions), | |
255 | ALG("CAMELLIA-256-CFB8", camellia256cfb8_functions), | |
256 | ALG("CAMELLIA-192-CFB8", camellia192cfb8_functions), | |
257 | ALG("CAMELLIA-128-CFB8", camellia128cfb8_functions), | |
258 | ALG("CAMELLIA-256-CTR", camellia256ctr_functions), | |
259 | ALG("CAMELLIA-192-CTR", camellia192ctr_functions), | |
260 | ALG("CAMELLIA-128-CTR", camellia128ctr_functions), | |
e1178600 | 261 | #endif /* OPENSSL_NO_CAMELLIA */ |
cb1548bc | 262 | #ifndef OPENSSL_NO_DES |
0d2bfe52 SL |
263 | ALG("DES-EDE3-ECB:DES-EDE3", tdes_ede3_ecb_functions), |
264 | ALG("DES-EDE3-CBC:DES3", tdes_ede3_cbc_functions), | |
265 | ALG("DES-EDE3-OFB", tdes_ede3_ofb_functions), | |
266 | ALG("DES-EDE3-CFB", tdes_ede3_cfb_functions), | |
267 | ALG("DES-EDE3-CFB8", tdes_ede3_cfb8_functions), | |
268 | ALG("DES-EDE3-CFB1", tdes_ede3_cfb1_functions), | |
f5056577 | 269 | ALG("DES3-WRAP:id-smime-alg-CMS3DESwrap", tdes_wrap_cbc_functions), |
0d2bfe52 SL |
270 | ALG("DES-EDE-ECB:DES-EDE", tdes_ede2_ecb_functions), |
271 | ALG("DES-EDE-CBC", tdes_ede2_cbc_functions), | |
272 | ALG("DES-EDE-OFB", tdes_ede2_ofb_functions), | |
273 | ALG("DES-EDE-CFB", tdes_ede2_cfb_functions), | |
cb1548bc | 274 | #endif /* OPENSSL_NO_DES */ |
105dde25 | 275 | #ifndef OPENSSL_NO_SM4 |
0d2bfe52 SL |
276 | ALG("SM4-ECB", sm4128ecb_functions), |
277 | ALG("SM4-CBC:SM4", sm4128cbc_functions), | |
278 | ALG("SM4-CTR", sm4128ctr_functions), | |
279 | ALG("SM4-OFB:SM4-OFB128", sm4128ofb128_functions), | |
280 | ALG("SM4-CFB:SM4-CFB128", sm4128cfb128_functions), | |
105dde25 | 281 | #endif /* OPENSSL_NO_SM4 */ |
3d5a7578 | 282 | #ifndef OPENSSL_NO_CHACHA |
0d2bfe52 | 283 | ALG("ChaCha20", chacha20_functions), |
3d5a7578 | 284 | # ifndef OPENSSL_NO_POLY1305 |
0d2bfe52 | 285 | ALG("ChaCha20-Poly1305", chacha20_poly1305_functions), |
3d5a7578 SL |
286 | # endif /* OPENSSL_NO_POLY1305 */ |
287 | #endif /* OPENSSL_NO_CHACHA */ | |
0d2bfe52 | 288 | { { NULL, NULL, NULL }, NULL } |
aab26e6f | 289 | }; |
0d2bfe52 | 290 | static OSSL_ALGORITHM exported_ciphers[OSSL_NELEM(deflt_ciphers)]; |
aab26e6f | 291 | |
55a0a117 RL |
292 | static const OSSL_ALGORITHM deflt_macs[] = { |
293 | #ifndef OPENSSL_NO_BLAKE2 | |
745fc918 MC |
294 | { "BLAKE2BMAC", "provider=default", blake2bmac_functions }, |
295 | { "BLAKE2SMAC", "provider=default", blake2smac_functions }, | |
2e5db6ad RL |
296 | #endif |
297 | #ifndef OPENSSL_NO_CMAC | |
745fc918 | 298 | { "CMAC", "provider=default", cmac_functions }, |
55a0a117 | 299 | #endif |
745fc918 MC |
300 | { "GMAC", "provider=default", gmac_functions }, |
301 | { "HMAC", "provider=default", hmac_functions }, | |
302 | { "KMAC-128:KMAC128", "provider=default", kmac128_functions }, | |
303 | { "KMAC-256:KMAC256", "provider=default", kmac256_functions }, | |
4657693d | 304 | #ifndef OPENSSL_NO_SIPHASH |
745fc918 | 305 | { "SIPHASH", "provider=default", siphash_functions }, |
ae0b6b92 RL |
306 | #endif |
307 | #ifndef OPENSSL_NO_POLY1305 | |
745fc918 | 308 | { "POLY1305", "provider=default", poly1305_functions }, |
4657693d | 309 | #endif |
55a0a117 RL |
310 | { NULL, NULL, NULL } |
311 | }; | |
312 | ||
e3405a4a | 313 | static const OSSL_ALGORITHM deflt_kdfs[] = { |
745fc918 MC |
314 | { "HKDF", "provider=default", kdf_hkdf_functions }, |
315 | { "SSKDF", "provider=default", kdf_sskdf_functions }, | |
316 | { "PBKDF2", "provider=default", kdf_pbkdf2_functions }, | |
317 | { "SSHKDF", "provider=default", kdf_sshkdf_functions }, | |
318 | { "X963KDF", "provider=default", kdf_x963_kdf_functions }, | |
319 | { "TLS1-PRF", "provider=default", kdf_tls1_prf_functions }, | |
320 | { "KBKDF", "provider=default", kdf_kbkdf_functions }, | |
e3405a4a | 321 | #ifndef OPENSSL_NO_CMS |
745fc918 | 322 | { "X942KDF", "provider=default", kdf_x942_kdf_functions }, |
e3405a4a P |
323 | #endif |
324 | #ifndef OPENSSL_NO_SCRYPT | |
745fc918 | 325 | { "SCRYPT:id-scrypt", "provider=default", kdf_scrypt_functions }, |
e3405a4a | 326 | #endif |
745fc918 | 327 | { "KRB5KDF", "provider=default", kdf_krb5kdf_functions }, |
0fee1dff | 328 | { NULL, NULL, NULL } |
e3405a4a P |
329 | }; |
330 | ||
89e29174 | 331 | static const OSSL_ALGORITHM deflt_keyexch[] = { |
76ca35e7 | 332 | #ifndef OPENSSL_NO_DH |
745fc918 | 333 | { "DH:dhKeyAgreement", "provider=default", dh_keyexch_functions }, |
6f7d2135 MC |
334 | #endif |
335 | #ifndef OPENSSL_NO_EC | |
edd3b7a3 | 336 | { "ECDH", "provider=default", ecdh_keyexch_functions }, |
745fc918 MC |
337 | { "X25519", "provider=default", x25519_keyexch_functions }, |
338 | { "X448", "provider=default", x448_keyexch_functions }, | |
8b84b075 RL |
339 | #endif |
340 | { NULL, NULL, NULL } | |
341 | }; | |
342 | ||
bcc4ae67 | 343 | static const OSSL_ALGORITHM deflt_rands[] = { |
f000e828 | 344 | { "CTR-DRBG", "provider=default", drbg_ctr_functions }, |
bcc4ae67 | 345 | { "HASH-DRBG", "provider=default", drbg_hash_functions }, |
bcc4ae67 | 346 | { "HMAC-DRBG", "provider=default", drbg_hmac_functions }, |
f000e828 | 347 | { "TEST-RAND", "provider=default", test_rng_functions }, |
bcc4ae67 P |
348 | { NULL, NULL, NULL } |
349 | }; | |
350 | ||
4889dadc MC |
351 | static const OSSL_ALGORITHM deflt_signature[] = { |
352 | #ifndef OPENSSL_NO_DSA | |
745fc918 | 353 | { "DSA:dsaEncryption", "provider=default", dsa_signature_functions }, |
4889dadc | 354 | #endif |
e1182bdb | 355 | { "RSA:rsaEncryption", "provider=default", rsa_signature_functions }, |
3965480c MC |
356 | #ifndef OPENSSL_NO_EC |
357 | { "ED25519:Ed25519", "provider=default", ed25519_signature_functions }, | |
358 | { "ED448:Ed448", "provider=default", ed448_signature_functions }, | |
edd3b7a3 | 359 | { "ECDSA", "provider=default", ecdsa_signature_functions }, |
3965480c | 360 | #endif |
4889dadc MC |
361 | { NULL, NULL, NULL } |
362 | }; | |
363 | ||
89abd1b6 | 364 | static const OSSL_ALGORITHM deflt_asym_cipher[] = { |
745fc918 | 365 | { "RSA:rsaEncryption", "provider=default", rsa_asym_cipher_functions }, |
89abd1b6 MC |
366 | { NULL, NULL, NULL } |
367 | }; | |
4889dadc | 368 | |
8b84b075 RL |
369 | static const OSSL_ALGORITHM deflt_keymgmt[] = { |
370 | #ifndef OPENSSL_NO_DH | |
745fc918 | 371 | { "DH:dhKeyAgreement", "provider=default", dh_keymgmt_functions }, |
4889dadc MC |
372 | #endif |
373 | #ifndef OPENSSL_NO_DSA | |
745fc918 | 374 | { "DSA:dsaEncryption", "provider=default", dsa_keymgmt_functions }, |
76ca35e7 | 375 | #endif |
745fc918 | 376 | { "RSA:rsaEncryption", "provider=default", rsa_keymgmt_functions }, |
8a758e96 | 377 | { "RSA-PSS:RSASSA-PSS", "provider=default", rsapss_keymgmt_functions }, |
90d3cb57 | 378 | #ifndef OPENSSL_NO_EC |
745fc918 MC |
379 | { "EC:id-ecPublicKey", "provider=default", ec_keymgmt_functions }, |
380 | { "X25519", "provider=default", x25519_keymgmt_functions }, | |
381 | { "X448", "provider=default", x448_keymgmt_functions }, | |
af6d8dd3 MC |
382 | { "ED25519", "provider=default", ed25519_keymgmt_functions }, |
383 | { "ED448", "provider=default", ed448_keymgmt_functions }, | |
90d3cb57 | 384 | #endif |
89e29174 MC |
385 | { NULL, NULL, NULL } |
386 | }; | |
387 | ||
677add38 | 388 | static const OSSL_ALGORITHM deflt_serializer[] = { |
dfc0857d P |
389 | #define SER(name, fips, format, type, func_table) \ |
390 | { name, \ | |
a3f15e23 | 391 | "provider=default,fips=" fips ",format=" format ",type=" type, \ |
dfc0857d | 392 | (func_table) } |
1017b8e4 | 393 | |
dfc0857d | 394 | #include "serializers.inc" |
1017b8e4 RL |
395 | { NULL, NULL, NULL } |
396 | }; | |
dfc0857d | 397 | #undef SER |
1017b8e4 RL |
398 | |
399 | static const OSSL_ALGORITHM deflt_deserializer[] = { | |
a3f15e23 P |
400 | #define DESER(name, fips, input, func_table) \ |
401 | { name, \ | |
402 | "provider=default,fips=" fips ",input=" input, \ | |
403 | (func_table) } | |
dcfacbbf | 404 | |
a3f15e23 | 405 | #include "deserializers.inc" |
677add38 RL |
406 | { NULL, NULL, NULL } |
407 | }; | |
a3f15e23 | 408 | #undef DESER |
677add38 | 409 | |
fdaad3f1 | 410 | static const OSSL_ALGORITHM *deflt_query(void *provctx, int operation_id, |
de29ff17 MC |
411 | int *no_cache) |
412 | { | |
413 | *no_cache = 0; | |
414 | switch (operation_id) { | |
415 | case OSSL_OP_DIGEST: | |
416 | return deflt_digests; | |
aab26e6f | 417 | case OSSL_OP_CIPHER: |
0d2bfe52 SL |
418 | ossl_prov_cache_exported_algorithms(deflt_ciphers, exported_ciphers); |
419 | return exported_ciphers; | |
55a0a117 RL |
420 | case OSSL_OP_MAC: |
421 | return deflt_macs; | |
e3405a4a P |
422 | case OSSL_OP_KDF: |
423 | return deflt_kdfs; | |
bcc4ae67 P |
424 | case OSSL_OP_RAND: |
425 | return deflt_rands; | |
8b84b075 RL |
426 | case OSSL_OP_KEYMGMT: |
427 | return deflt_keymgmt; | |
89e29174 MC |
428 | case OSSL_OP_KEYEXCH: |
429 | return deflt_keyexch; | |
4889dadc MC |
430 | case OSSL_OP_SIGNATURE: |
431 | return deflt_signature; | |
89abd1b6 MC |
432 | case OSSL_OP_ASYM_CIPHER: |
433 | return deflt_asym_cipher; | |
677add38 RL |
434 | case OSSL_OP_SERIALIZER: |
435 | return deflt_serializer; | |
1017b8e4 RL |
436 | case OSSL_OP_DESERIALIZER: |
437 | return deflt_deserializer; | |
de29ff17 MC |
438 | } |
439 | return NULL; | |
440 | } | |
441 | ||
72bfc958 | 442 | |
78906fff RL |
443 | static void deflt_teardown(void *provctx) |
444 | { | |
d40b42ab | 445 | BIO_meth_free(PROV_CTX_get0_core_bio_method(provctx)); |
78906fff RL |
446 | PROV_CTX_free(provctx); |
447 | } | |
448 | ||
8a73348b MC |
449 | /* Functions we provide to the core */ |
450 | static const OSSL_DISPATCH deflt_dispatch_table[] = { | |
78906fff | 451 | { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))deflt_teardown }, |
dca97d00 | 452 | { OSSL_FUNC_PROVIDER_GETTABLE_PARAMS, (void (*)(void))deflt_gettable_params }, |
8a73348b | 453 | { OSSL_FUNC_PROVIDER_GET_PARAMS, (void (*)(void))deflt_get_params }, |
de29ff17 | 454 | { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))deflt_query }, |
72bfc958 | 455 | { OSSL_FUNC_PROVIDER_GET_CAPABILITIES, (void (*)(void))provider_get_capabilities }, |
8a73348b MC |
456 | { 0, NULL } |
457 | }; | |
458 | ||
459 | OSSL_provider_init_fn ossl_default_provider_init; | |
460 | ||
d40b42ab | 461 | int ossl_default_provider_init(const OSSL_CORE_HANDLE *handle, |
8a73348b | 462 | const OSSL_DISPATCH *in, |
a39eb840 RL |
463 | const OSSL_DISPATCH **out, |
464 | void **provctx) | |
8a73348b | 465 | { |
363b1e5d | 466 | OSSL_FUNC_core_get_library_context_fn *c_get_libctx = NULL; |
d40b42ab | 467 | BIO_METHOD *corebiometh; |
8013a933 | 468 | |
63665fff RL |
469 | if (!ossl_prov_bio_from_dispatch(in)) |
470 | return 0; | |
8a73348b MC |
471 | for (; in->function_id != 0; in++) { |
472 | switch (in->function_id) { | |
dca97d00 | 473 | case OSSL_FUNC_CORE_GETTABLE_PARAMS: |
363b1e5d | 474 | c_gettable_params = OSSL_FUNC_core_gettable_params(in); |
8a73348b MC |
475 | break; |
476 | case OSSL_FUNC_CORE_GET_PARAMS: | |
363b1e5d | 477 | c_get_params = OSSL_FUNC_core_get_params(in); |
8a73348b | 478 | break; |
8013a933 | 479 | case OSSL_FUNC_CORE_GET_LIBRARY_CONTEXT: |
363b1e5d | 480 | c_get_libctx = OSSL_FUNC_core_get_library_context(in); |
8013a933 | 481 | break; |
8a73348b MC |
482 | default: |
483 | /* Just ignore anything we don't understand */ | |
484 | break; | |
485 | } | |
486 | } | |
487 | ||
8013a933 RL |
488 | if (c_get_libctx == NULL) |
489 | return 0; | |
490 | ||
8013a933 RL |
491 | /* |
492 | * We want to make sure that all calls from this provider that requires | |
493 | * a library context use the same context as the one used to call our | |
d40b42ab | 494 | * functions. We do that by passing it along in the provider context. |
78906fff | 495 | * |
d40b42ab | 496 | * This only works for built-in providers. Most providers should |
78906fff | 497 | * create their own library context. |
8013a933 | 498 | */ |
d40b42ab MC |
499 | if ((*provctx = PROV_CTX_new()) == NULL |
500 | || (corebiometh = bio_prov_init_bio_method()) == NULL) { | |
501 | PROV_CTX_free(*provctx); | |
502 | *provctx = NULL; | |
78906fff | 503 | return 0; |
d40b42ab MC |
504 | } |
505 | PROV_CTX_set0_library_context(*provctx, (OPENSSL_CTX *)c_get_libctx(handle)); | |
506 | PROV_CTX_set0_handle(*provctx, handle); | |
507 | PROV_CTX_set0_core_bio_method(*provctx, corebiometh); | |
78906fff RL |
508 | |
509 | *out = deflt_dispatch_table; | |
510 | ||
8a73348b MC |
511 | return 1; |
512 | } |