+++ /dev/null
-/*
- * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
- *
- * The contents of this file constitute Original Code as defined in and are
- * subject to the Apple Public Source License Version 1.2 (the 'License').
- * You may not use this file except in compliance with the License. Please obtain
- * a copy of the License at http://www.apple.com/publicsource and read it before
- * using this file.
- *
- * This Original Code and all software distributed under the License are
- * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
- * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
- * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
- * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
- * specific language governing rights and limitations under the License.
- */
-
-
-/*
- * RSA_DSA_csp.cpp - Algorithm factory for RSA/DSA
- */
-
-#include "RSA_DSA_csp.h"
-#include "RSA_DSA_signature.h" /* raw signer */
-#include <SHA1_MD5_Object.h> /* raw digest */
-#include <SignatureContext.h>
-#include <security_cdsa_utilities/digestobject.h>
-#include "RSA_DSA_keys.h"
-#include "RSA_asymmetric.h"
-#include <MD2Object.h>
-#include <SHA2_Object.h>
-#include <Security/cssmapple.h>
-
-#define OPENSSL_DSA_ENABLE 1
-
-Allocator *RSA_DSA_Factory::normAllocator;
-Allocator *RSA_DSA_Factory::privAllocator;
-
-/* normally found in crypto.h, which has way too much useless cruft....move these to
- * a local header.... */
-extern "C" {
-extern int CRYPTO_set_mem_functions(
- void *(*m)(size_t),
- void *(*r)(void *,size_t),
- void (*f)(void *));
-int CRYPTO_set_locked_mem_functions(
- void *(*m)(size_t),
- void (*free_func)(void *));
-}
-
-/*
- * openssl-style memory allocator callbacks
- */
-static void *osMalloc(size_t size)
-{
- return RSA_DSA_Factory::privAllocator->malloc(size);
-}
-static void osFree(void *data)
-{
- RSA_DSA_Factory::privAllocator->free(data);
-}
-static void *osRealloc(void *oldPtr, size_t newSize)
-{
- return RSA_DSA_Factory::privAllocator->realloc(oldPtr, newSize);
-}
-
-RSA_DSA_Factory::RSA_DSA_Factory(Allocator *normAlloc, Allocator *privAlloc)
-{
- setNormAllocator(normAlloc);
- setPrivAllocator(privAlloc);
- /* once-per-address space */
- CRYPTO_set_mem_functions(osMalloc, osRealloc, osFree);
- CRYPTO_set_locked_mem_functions(osMalloc, osFree);
- /* these should go in a lib somewhere */
- ERR_load_RSA_strings();
- ERR_load_BN_strings();
- ERR_load_DSA_strings();
-}
-
-RSA_DSA_Factory::~RSA_DSA_Factory()
-{
- // TBD terminateCryptKit();
-}
-
-bool RSA_DSA_Factory::setup(
- AppleCSPSession &session,
- CSPFullPluginSession::CSPContext * &cspCtx,
- const Context &context)
-{
- switch(context.type()) {
- case CSSM_ALGCLASS_SIGNATURE:
- switch(context.algorithm()) {
- case CSSM_ALGID_SHA1WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new SHA1Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_SHA1)));
- }
- return true;
- case CSSM_ALGID_MD5WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new MD5Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_MD5)));
- }
- return true;
- case CSSM_ALGID_MD2WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new MD2Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_MD2)));
- }
- return true;
- #if OPENSSL_DSA_ENABLE
- case CSSM_ALGID_SHA1WithDSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new SHA1Object()),
- *(new DSASigner(*privAllocator,
- session,
- CSSM_ALGID_SHA1)));
- }
- return true;
- case CSSM_ALGID_DSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new NullDigest()),
- *(new DSASigner(*privAllocator,
- session,
- // set later via setDigestAlgorithm but not used by DSA
- CSSM_ALGID_NONE)));
- }
- return true;
- #endif
- case CSSM_ALGID_RSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new NullDigest()),
- *(new RSASigner(*privAllocator,
- session,
- // set later via setDigestAlgorithm
- CSSM_ALGID_NONE)));
- }
- return true;
- case CSSM_ALGID_SHA256WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new SHA256Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_SHA256)));
- }
- return true;
- case CSSM_ALGID_SHA224WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new SHA224Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_SHA224)));
- }
- return true;
- case CSSM_ALGID_SHA384WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new SHA384Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_SHA384)));
- }
- return true;
- case CSSM_ALGID_SHA512WithRSA:
- if(cspCtx == NULL) {
- cspCtx = new SignatureContext(session,
- *(new SHA512Object()),
- *(new RSASigner(*privAllocator,
- session,
- CSSM_ALGID_SHA512)));
- }
- return true;
- default:
- break;
- }
- break;
-
- case CSSM_ALGCLASS_KEYGEN:
- switch(context.algorithm()) {
- case CSSM_ALGID_RSA:
- case CSSM_ALGMODE_PKCS1_EME_OAEP:
- if(cspCtx == NULL) {
- cspCtx = new RSAKeyPairGenContext(session, context);
- }
- return true;
- #if OPENSSL_DSA_ENABLE
- case CSSM_ALGID_DSA:
- if(cspCtx == NULL) {
- cspCtx = new DSAKeyPairGenContext(session, context);
- }
- return true;
- #endif
- default:
- break;
- }
- break;
-
- case CSSM_ALGCLASS_ASYMMETRIC:
- switch(context.algorithm()) {
- case CSSM_ALGID_RSA:
- case CSSM_ALGMODE_PKCS1_EME_OAEP:
- if(cspCtx == NULL) {
- cspCtx = new RSA_CryptContext(session);
- }
- return true;
- default:
- break;
- }
- break;
-
- /* more here - symmetric, etc. */
- default:
- break;
- }
- /* not implemented here */
- return false;
-}
-
-
-