]> git.saurik.com Git - apple/security.git/blob - AppleCSP/MiscCSPAlgs/miscAlgFactory.cpp
Security-163.tar.gz
[apple/security.git] / AppleCSP / MiscCSPAlgs / miscAlgFactory.cpp
1 /*
2 * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
3 *
4 * The contents of this file constitute Original Code as defined in and are
5 * subject to the Apple Public Source License Version 1.2 (the 'License').
6 * You may not use this file except in compliance with the License. Please obtain
7 * a copy of the License at http://www.apple.com/publicsource and read it before
8 * using this file.
9 *
10 * This Original Code and all software distributed under the License are
11 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
12 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
13 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
14 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
15 * specific language governing rights and limitations under the License.
16 */
17
18
19 //
20 // miscAlgFactory.h - miscellaneous algorithm factory
21 // Written by Doug Mitchell 3/28/2001
22 //
23
24 #include "miscAlgFactory.h"
25 #include <AES/aescspi.h>
26 #include <AES/gladmanContext.h>
27 #include "desContext.h"
28 #include "rc2Context.h"
29 #include "rc4Context.h"
30 #include "rc5Context.h"
31 #include "MacContext.h"
32 #include "DigestContext.h"
33 #include "SHA1_MD5_Object.h" /* raw digest */
34 #include "MD2Object.h"
35 #include "NullCryptor.h"
36 #include "bfContext.h"
37 #include "castContext.h"
38 #include <Security/cssmapple.h>
39
40 /*
41 * These #defines are mainly to facilitate measuring the performance of our own
42 * implementation vs. the ones in BSafe. This factory gets called first; if
43 * we disable e.g. DES here the BSAFE version will be used.
44 */
45 #ifdef BSAFE_CSP_ENABLE
46
47 #define MAF_DES_ENABLE 0
48 #define MAF_DES3_ENABLE 0
49 #define MAF_RC2_ENABLE 0
50 #define MAF_RC4_ENABLE 0
51 #define MAF_RC5_ENABLE 0
52 #define MAF_MAC_ENABLE 0
53
54 #else /* !BSAFE_CSP_ENABLE, normal case */
55
56 #define MAF_DES_ENABLE 1
57 #define MAF_DES3_ENABLE 1
58 #define MAF_RC2_ENABLE 1
59 #define MAF_RC4_ENABLE 1
60 #define MAF_RC5_ENABLE 1
61 #define MAF_MAC_ENABLE 1
62
63 #endif /* BSAFE_CSP_ENABLE */
64
65 #if (!MAF_DES_ENABLE || !MAF_DES3_ENABLE || !MAF_RC2_ENABLE || !MAF_RC4_ENABLE || \
66 !MAF_RC5_ENABLE || !MAF_MAC_ENABLE)
67 #warning Internal DES/RC2/RC4/RC5/Mac implementation disabled!
68 #endif
69
70 bool MiscAlgFactory::setup(
71 AppleCSPSession &session,
72 CSPFullPluginSession::CSPContext * &cspCtx,
73 const Context &context)
74 {
75 CSSM_CONTEXT_TYPE ctype = context.type();
76 CSSM_ALGORITHMS alg = context.algorithm();
77
78 switch(ctype) {
79 case CSSM_ALGCLASS_SYMMETRIC:
80 switch(alg) {
81 case CSSM_ALGID_AES:
82 if(cspCtx == NULL) {
83 /*
84 * Get optional block size to determine correct implementation
85 */
86 uint32 blockSize = context.getInt(CSSM_ATTRIBUTE_BLOCK_SIZE);
87 if(blockSize == 0) {
88 blockSize = GLADMAN_BLOCK_SIZE_BYTES;
89 }
90 if(GLADMAN_AES_128_ENABLE &&
91 (blockSize == GLADMAN_BLOCK_SIZE_BYTES)) {
92 cspCtx = new GAESContext(session);
93 }
94 else {
95 cspCtx = new AESContext(session);
96 }
97 }
98 return true;
99
100 #if MAF_DES_ENABLE
101 case CSSM_ALGID_DES:
102 if(cspCtx == NULL) {
103 cspCtx = new DESContext(session);
104 }
105 return true;
106 #endif /* MAF_DES_ENABLE */
107
108 #if MAF_DES3_ENABLE
109 /*
110 * TripleDES: for some reason, cssmtype.h defines different symbols
111 * for CSSM_ALGID_3DES_3KEY (key gen) and CSSM_ALGID_3DES_3KEY_EDE
112 * (an encrypt alg with mode), but they define to the same value.
113 */
114 case CSSM_ALGID_3DES_3KEY_EDE:
115 if(cspCtx == NULL) {
116 cspCtx = new DES3Context(session);
117 }
118 return true;
119 #endif
120
121 #if MAF_RC2_ENABLE
122 case CSSM_ALGID_RC2:
123 if(cspCtx == NULL) {
124 cspCtx = new RC2Context(session);
125 }
126 return true;
127 #endif
128
129 #if MAF_RC4_ENABLE
130 case CSSM_ALGID_RC4:
131 if(cspCtx == NULL) {
132 cspCtx = new RC4Context(session);
133 }
134 return true;
135 #endif
136
137 #if MAF_RC5_ENABLE
138 case CSSM_ALGID_RC5:
139 if(cspCtx == NULL) {
140 cspCtx = new RC5Context(session);
141 }
142 return true;
143 #endif
144
145 case CSSM_ALGID_BLOWFISH:
146 if(cspCtx == NULL) {
147 cspCtx = new BlowfishContext(session);
148 }
149 return true;
150
151 case CSSM_ALGID_CAST:
152 case CSSM_ALGID_CAST5:
153 if(cspCtx == NULL) {
154 cspCtx = new CastContext(session);
155 }
156 return true;
157
158 #if NULL_CRYPT_ENABLE
159 case CSSM_ALGID_NONE:
160 if(cspCtx == NULL) {
161 cspCtx = new NullCryptor(session);
162 }
163 return true;
164 #endif /* NULL_CRYPT_ENABLE */
165
166 default:
167 break; // not our symmetric alg
168 } // switch alg for symmetric
169 break; // from case CSSM_ALGCLASS_SYMMETRIC
170
171 /* digest algorithms always enabled here */
172 case CSSM_ALGCLASS_DIGEST:
173 switch(alg) {
174 case CSSM_ALGID_SHA1:
175 if(cspCtx == NULL) {
176 /* reuse is OK */
177 cspCtx = new DigestContext(session,
178 *(new SHA1Object));
179 }
180 return true;
181 case CSSM_ALGID_MD5:
182 if(cspCtx == NULL) {
183 /* reuse is OK */
184 cspCtx = new DigestContext(session,
185 *(new MD5Object));
186 }
187 return true;
188 case CSSM_ALGID_MD2:
189 if(cspCtx == NULL) {
190 /* reuse is OK */
191 cspCtx = new DigestContext(session,
192 *(new MD2Object));
193 }
194 return true;
195 default:
196 break; // not our digest alg
197 } // switch digest alg
198 break; // from case CSSM_ALGCLASS_DIGEST
199
200 case CSSM_ALGCLASS_KEYGEN:
201 switch(alg) {
202 case CSSM_ALGID_AES:
203 if(cspCtx == NULL) {
204 cspCtx = new AESKeyGenContext(session);
205 }
206 return true;
207
208 #if MAF_DES_ENABLE
209 case CSSM_ALGID_DES:
210 if(cspCtx == NULL) {
211 cspCtx = new AppleSymmKeyGenerator(session,
212 DES_KEY_SIZE_BITS_EXTERNAL,
213 DES_KEY_SIZE_BITS_EXTERNAL,
214 true); // must be byte size
215 }
216 return true;
217 #endif /* MAF_DES_ENABLE */
218
219 #if MAF_DES3_ENABLE
220 case CSSM_ALGID_3DES_3KEY_EDE:
221 if(cspCtx == NULL) {
222 cspCtx = new AppleSymmKeyGenerator(session,
223 DES3_KEY_SIZE_BYTES * 8,
224 DES3_KEY_SIZE_BYTES * 8,
225 true); // must be byte size
226 }
227 return true;
228 #endif
229
230 #if MAF_RC2_ENABLE
231 case CSSM_ALGID_RC2:
232 if(cspCtx == NULL) {
233 cspCtx = new AppleSymmKeyGenerator(session,
234 RC2_MIN_KEY_SIZE_BYTES * 8,
235 RC2_MAX_KEY_SIZE_BYTES * 8,
236 true); // must be byte size
237 }
238 return true;
239 #endif
240
241 #if MAF_RC4_ENABLE
242 case CSSM_ALGID_RC4:
243 if(cspCtx == NULL) {
244 cspCtx = new AppleSymmKeyGenerator(session,
245 RC4_MIN_KEY_SIZE_BYTES * 8,
246 RC4_MAX_KEY_SIZE_BYTES * 8,
247 true); // must be byte size
248 }
249 return true;
250 #endif
251
252 #if MAF_RC5_ENABLE
253 case CSSM_ALGID_RC5:
254 if(cspCtx == NULL) {
255 cspCtx = new AppleSymmKeyGenerator(session,
256 RC5_MIN_KEY_SIZE_BYTES * 8,
257 RC5_MAX_KEY_SIZE_BYTES * 8,
258 true); // must be byte size
259 }
260 return true;
261 #endif
262
263 case CSSM_ALGID_BLOWFISH:
264 if(cspCtx == NULL) {
265 cspCtx = new AppleSymmKeyGenerator(session,
266 BF_MIN_KEY_SIZE_BYTES * 8,
267 BF_MAX_KEY_SIZE_BYTES * 8,
268 true); // must be byte size
269 }
270 return true;
271
272 /* Note we require keys to be ALGID_CAST, not ALGID_CAST5 */
273 case CSSM_ALGID_CAST:
274 if(cspCtx == NULL) {
275 cspCtx = new AppleSymmKeyGenerator(session,
276 CAST_MIN_KEY_LENGTH * 8,
277 CAST_KEY_LENGTH * 8,
278 true); // must be byte size
279 }
280 return true;
281
282 #if MAF_MAC_ENABLE
283 case CSSM_ALGID_SHA1HMAC:
284 if(cspCtx == NULL) {
285 cspCtx = new AppleSymmKeyGenerator(session,
286 HMAC_SHA_MIN_KEY_SIZE * 8,
287 HMAC_MAX_KEY_SIZE * 8,
288 true); // must be byte size
289 }
290 return true;
291 case CSSM_ALGID_MD5HMAC:
292 if(cspCtx == NULL) {
293 cspCtx = new AppleSymmKeyGenerator(session,
294 HMAC_MD5_MIN_KEY_SIZE * 8,
295 HMAC_MAX_KEY_SIZE * 8,
296 true); // must be byte size
297 }
298 return true;
299 #endif
300
301 #if NULL_CRYPT_ENABLE
302 case CSSM_ALGID_NONE:
303 if(cspCtx == NULL) {
304 cspCtx = new AppleSymmKeyGenerator(session,
305 NULL_CRYPT_BLOCK_SIZE * 8,
306 NULL_CRYPT_BLOCK_SIZE * 8,
307 true); // must be byte size
308 }
309 return true;
310 #endif /* NULL_CRYPT_ENABLE */
311
312 default:
313 break; // not our keygen alg
314 } // switch alg for keygen
315 break; // from case CSSM_ALGCLASS_KEYGEN
316
317 case CSSM_ALGCLASS_MAC:
318 switch(alg) {
319 #if MAF_MAC_ENABLE
320 case CSSM_ALGID_SHA1HMAC:
321 case CSSM_ALGID_MD5HMAC:
322 if(cspCtx == NULL) {
323 cspCtx = new MacContext(session, alg);
324 }
325 return true;
326 #endif
327 #if CRYPTKIT_CSP_ENABLE
328 case CSSM_ALGID_SHA1HMAC_LEGACY:
329 if(cspCtx == NULL) {
330 cspCtx = new MacLegacyContext(session, alg);
331 }
332 return true;
333 #endif
334 default:
335 /* not our mac alg */
336 break;
337 }
338 break;
339
340 default:
341 break; // not our context type
342 } // switch context type
343
344 /* not ours */
345 return false;
346 }