/* * Copyright (c) 2000-2001,2011,2014 Apple Inc. All Rights Reserved. * * The contents of this file constitute Original Code as defined in and are * subject to the Apple Public Source License Version 1.2 (the 'License'). * You may not use this file except in compliance with the License. Please obtain * a copy of the License at http://www.apple.com/publicsource and read it before * using this file. * * This Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the * specific language governing rights and limitations under the License. */ /* * RSA_DSA_csp.cpp - Algorithm factory for RSA/DSA */ #include "RSA_DSA_csp.h" #include "RSA_DSA_signature.h" /* raw signer */ #include /* raw digest */ #include #include #include "RSA_DSA_keys.h" #include "RSA_asymmetric.h" #include #include #include #define OPENSSL_DSA_ENABLE 1 Allocator *RSA_DSA_Factory::normAllocator; Allocator *RSA_DSA_Factory::privAllocator; /* normally found in crypto.h, which has way too much useless cruft....move these to * a local header.... */ extern "C" { extern int CRYPTO_set_mem_functions( void *(*m)(size_t), void *(*r)(void *,size_t), void (*f)(void *)); int CRYPTO_set_locked_mem_functions( void *(*m)(size_t), void (*free_func)(void *)); } /* * openssl-style memory allocator callbacks */ static void *osMalloc(size_t size) { return RSA_DSA_Factory::privAllocator->malloc(size); } static void osFree(void *data) { RSA_DSA_Factory::privAllocator->free(data); } static void *osRealloc(void *oldPtr, size_t newSize) { return RSA_DSA_Factory::privAllocator->realloc(oldPtr, newSize); } RSA_DSA_Factory::RSA_DSA_Factory(Allocator *normAlloc, Allocator *privAlloc) { setNormAllocator(normAlloc); setPrivAllocator(privAlloc); /* once-per-address space */ CRYPTO_set_mem_functions(osMalloc, osRealloc, osFree); CRYPTO_set_locked_mem_functions(osMalloc, osFree); /* these should go in a lib somewhere */ ERR_load_RSA_strings(); ERR_load_BN_strings(); ERR_load_DSA_strings(); } RSA_DSA_Factory::~RSA_DSA_Factory() { // TBD terminateCryptKit(); } bool RSA_DSA_Factory::setup( AppleCSPSession &session, CSPFullPluginSession::CSPContext * &cspCtx, const Context &context) { switch(context.type()) { case CSSM_ALGCLASS_SIGNATURE: switch(context.algorithm()) { case CSSM_ALGID_SHA1WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new SHA1Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_SHA1))); } return true; case CSSM_ALGID_MD5WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new MD5Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_MD5))); } return true; case CSSM_ALGID_MD2WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new MD2Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_MD2))); } return true; #if OPENSSL_DSA_ENABLE case CSSM_ALGID_SHA1WithDSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new SHA1Object()), *(new DSASigner(*privAllocator, session, CSSM_ALGID_SHA1))); } return true; case CSSM_ALGID_DSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new NullDigest()), *(new DSASigner(*privAllocator, session, // set later via setDigestAlgorithm but not used by DSA CSSM_ALGID_NONE))); } return true; #endif case CSSM_ALGID_RSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new NullDigest()), *(new RSASigner(*privAllocator, session, // set later via setDigestAlgorithm CSSM_ALGID_NONE))); } return true; case CSSM_ALGID_SHA256WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new SHA256Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_SHA256))); } return true; case CSSM_ALGID_SHA224WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new SHA224Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_SHA224))); } return true; case CSSM_ALGID_SHA384WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new SHA384Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_SHA384))); } return true; case CSSM_ALGID_SHA512WithRSA: if(cspCtx == NULL) { cspCtx = new SignatureContext(session, *(new SHA512Object()), *(new RSASigner(*privAllocator, session, CSSM_ALGID_SHA512))); } return true; default: break; } break; case CSSM_ALGCLASS_KEYGEN: switch(context.algorithm()) { case CSSM_ALGID_RSA: case CSSM_ALGMODE_PKCS1_EME_OAEP: if(cspCtx == NULL) { cspCtx = new RSAKeyPairGenContext(session, context); } return true; #if OPENSSL_DSA_ENABLE case CSSM_ALGID_DSA: if(cspCtx == NULL) { cspCtx = new DSAKeyPairGenContext(session, context); } return true; #endif default: break; } break; case CSSM_ALGCLASS_ASYMMETRIC: switch(context.algorithm()) { case CSSM_ALGID_RSA: case CSSM_ALGMODE_PKCS1_EME_OAEP: if(cspCtx == NULL) { cspCtx = new RSA_CryptContext(session); } return true; default: break; } break; /* more here - symmetric, etc. */ default: break; } /* not implemented here */ return false; }