2019-07-11 05:11:27 +08:00
|
|
|
/*
|
2021-03-11 21:27:36 +08:00
|
|
|
* Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2019-07-11 05:11:27 +08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <openssl/core.h>
|
2020-06-21 07:21:19 +08:00
|
|
|
#include <openssl/core_dispatch.h>
|
2019-07-11 05:11:27 +08:00
|
|
|
#include "internal/core.h"
|
|
|
|
#include "internal/property.h"
|
|
|
|
#include "internal/provider.h"
|
|
|
|
|
|
|
|
struct algorithm_data_st {
|
2020-10-15 17:55:50 +08:00
|
|
|
OSSL_LIB_CTX *libctx;
|
2019-07-11 05:11:27 +08:00
|
|
|
int operation_id; /* May be zero for finding them all */
|
2022-04-21 00:34:09 +08:00
|
|
|
int (*pre)(OSSL_PROVIDER *, int operation_id, int no_store, void *data,
|
|
|
|
int *result);
|
2022-04-14 23:52:12 +08:00
|
|
|
int (*reserve_store)(int no_store, void *data);
|
2019-07-11 05:11:27 +08:00
|
|
|
void (*fn)(OSSL_PROVIDER *, const OSSL_ALGORITHM *, int no_store,
|
|
|
|
void *data);
|
2022-04-14 23:52:12 +08:00
|
|
|
int (*unreserve_store)(void *data);
|
2020-05-15 21:56:05 +08:00
|
|
|
int (*post)(OSSL_PROVIDER *, int operation_id, int no_store, void *data,
|
|
|
|
int *result);
|
2019-07-11 05:11:27 +08:00
|
|
|
void *data;
|
|
|
|
};
|
|
|
|
|
2022-04-21 00:34:09 +08:00
|
|
|
/*
|
|
|
|
* Process one OSSL_ALGORITHM array, for the operation |cur_operation|,
|
|
|
|
* by constructing methods for all its implementations and adding those
|
|
|
|
* to the appropriate method store.
|
|
|
|
* Which method store is appropriate is given by |no_store| ("permanent"
|
|
|
|
* if 0, temporary if 1) and other data in |data->data|.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* -1 to quit adding algorithm implementations immediately
|
|
|
|
* 0 if not successful, but adding should continue
|
|
|
|
* 1 if successful so far, and adding should continue
|
|
|
|
*/
|
|
|
|
static int algorithm_do_map(OSSL_PROVIDER *provider, const OSSL_ALGORITHM *map,
|
|
|
|
int cur_operation, int no_store, void *cbdata)
|
|
|
|
{
|
|
|
|
struct algorithm_data_st *data = cbdata;
|
|
|
|
int ret = 0;
|
|
|
|
|
2022-04-14 23:52:12 +08:00
|
|
|
if (!data->reserve_store(no_store, data->data))
|
|
|
|
/* Error, bail out! */
|
|
|
|
return -1;
|
|
|
|
|
2022-04-21 00:34:09 +08:00
|
|
|
/* Do we fulfill pre-conditions? */
|
|
|
|
if (data->pre == NULL) {
|
|
|
|
/* If there is no pre-condition function, assume "yes" */
|
|
|
|
ret = 1;
|
|
|
|
} else if (!data->pre(provider, cur_operation, no_store, data->data,
|
|
|
|
&ret)) {
|
|
|
|
/* Error, bail out! */
|
2022-04-14 23:52:12 +08:00
|
|
|
ret = -1;
|
|
|
|
goto end;
|
2022-04-21 00:34:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If pre-condition not fulfilled don't add this set of implementations,
|
|
|
|
* but do continue with the next. This simply means that another thread
|
|
|
|
* got to it first.
|
|
|
|
*/
|
2022-04-14 23:52:12 +08:00
|
|
|
if (ret == 0) {
|
|
|
|
ret = 1;
|
|
|
|
goto end;
|
|
|
|
}
|
2022-04-21 00:34:09 +08:00
|
|
|
|
|
|
|
if (map != NULL) {
|
|
|
|
const OSSL_ALGORITHM *thismap;
|
|
|
|
|
|
|
|
for (thismap = map; thismap->algorithm_names != NULL; thismap++)
|
|
|
|
data->fn(provider, thismap, no_store, data->data);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Do we fulfill post-conditions? */
|
|
|
|
if (data->post == NULL) {
|
|
|
|
/* If there is no post-condition function, assume "yes" */
|
|
|
|
ret = 1;
|
|
|
|
} else if (!data->post(provider, cur_operation, no_store, data->data,
|
|
|
|
&ret)) {
|
|
|
|
/* Error, bail out! */
|
2022-04-14 23:52:12 +08:00
|
|
|
ret = -1;
|
2022-04-21 00:34:09 +08:00
|
|
|
}
|
|
|
|
|
2022-04-14 23:52:12 +08:00
|
|
|
end:
|
|
|
|
data->unreserve_store(data->data);
|
|
|
|
|
2022-04-21 00:34:09 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Given a provider, process one operation given by |data->operation_id|, or
|
|
|
|
* if that's zero, process all known operations.
|
|
|
|
* For each such operation, query the associated OSSL_ALGORITHM array from
|
|
|
|
* the provider, then process that array with |algorithm_do_map()|.
|
|
|
|
*/
|
2019-07-11 05:11:27 +08:00
|
|
|
static int algorithm_do_this(OSSL_PROVIDER *provider, void *cbdata)
|
|
|
|
{
|
|
|
|
struct algorithm_data_st *data = cbdata;
|
|
|
|
int first_operation = 1;
|
|
|
|
int last_operation = OSSL_OP__HIGHEST;
|
|
|
|
int cur_operation;
|
2020-09-02 02:50:03 +08:00
|
|
|
int ok = 1;
|
2019-07-11 05:11:27 +08:00
|
|
|
|
|
|
|
if (data->operation_id != 0)
|
|
|
|
first_operation = last_operation = data->operation_id;
|
|
|
|
|
|
|
|
for (cur_operation = first_operation;
|
|
|
|
cur_operation <= last_operation;
|
|
|
|
cur_operation++) {
|
2022-04-21 00:34:09 +08:00
|
|
|
int no_store = 0; /* Assume caching is ok */
|
2020-05-15 21:56:05 +08:00
|
|
|
const OSSL_ALGORITHM *map = NULL;
|
2022-04-14 23:52:12 +08:00
|
|
|
int ret = 0;
|
2019-07-11 05:11:27 +08:00
|
|
|
|
2020-05-15 21:56:05 +08:00
|
|
|
map = ossl_provider_query_operation(provider, cur_operation,
|
|
|
|
&no_store);
|
2022-04-21 00:34:09 +08:00
|
|
|
ret = algorithm_do_map(provider, map, cur_operation, no_store, data);
|
2020-09-25 08:19:19 +08:00
|
|
|
ossl_provider_unquery_operation(provider, cur_operation, map);
|
2020-05-15 21:56:05 +08:00
|
|
|
|
2022-04-21 00:34:09 +08:00
|
|
|
if (ret < 0)
|
|
|
|
/* Hard error, bail out immediately! */
|
|
|
|
return 0;
|
2020-05-15 21:56:05 +08:00
|
|
|
|
2020-09-02 02:50:03 +08:00
|
|
|
/* If post-condition not fulfilled, set general failure */
|
|
|
|
if (!ret)
|
|
|
|
ok = 0;
|
2019-07-11 05:11:27 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
2020-10-15 17:55:50 +08:00
|
|
|
void ossl_algorithm_do_all(OSSL_LIB_CTX *libctx, int operation_id,
|
2019-07-11 05:11:27 +08:00
|
|
|
OSSL_PROVIDER *provider,
|
2020-05-15 21:56:05 +08:00
|
|
|
int (*pre)(OSSL_PROVIDER *, int operation_id,
|
2022-04-21 00:34:09 +08:00
|
|
|
int no_store, void *data, int *result),
|
2022-04-14 23:52:12 +08:00
|
|
|
int (*reserve_store)(int no_store, void *data),
|
2019-07-11 05:11:27 +08:00
|
|
|
void (*fn)(OSSL_PROVIDER *provider,
|
|
|
|
const OSSL_ALGORITHM *algo,
|
|
|
|
int no_store, void *data),
|
2022-04-14 23:52:12 +08:00
|
|
|
int (*unreserve_store)(void *data),
|
2020-05-15 21:56:05 +08:00
|
|
|
int (*post)(OSSL_PROVIDER *, int operation_id,
|
|
|
|
int no_store, void *data, int *result),
|
2019-07-11 05:11:27 +08:00
|
|
|
void *data)
|
|
|
|
{
|
2020-05-15 21:56:05 +08:00
|
|
|
struct algorithm_data_st cbdata = { 0, };
|
2019-07-11 05:11:27 +08:00
|
|
|
|
|
|
|
cbdata.libctx = libctx;
|
|
|
|
cbdata.operation_id = operation_id;
|
2020-05-15 21:56:05 +08:00
|
|
|
cbdata.pre = pre;
|
2022-04-14 23:52:12 +08:00
|
|
|
cbdata.reserve_store = reserve_store;
|
2019-07-11 05:11:27 +08:00
|
|
|
cbdata.fn = fn;
|
2022-04-14 23:52:12 +08:00
|
|
|
cbdata.unreserve_store = unreserve_store;
|
2020-05-15 21:56:05 +08:00
|
|
|
cbdata.post = post;
|
2019-07-11 05:11:27 +08:00
|
|
|
cbdata.data = data;
|
|
|
|
|
2021-09-30 15:32:57 +08:00
|
|
|
if (provider == NULL) {
|
2021-03-10 17:37:02 +08:00
|
|
|
ossl_provider_doall_activated(libctx, algorithm_do_this, &cbdata);
|
2021-09-30 15:32:57 +08:00
|
|
|
} else {
|
|
|
|
OSSL_LIB_CTX *libctx2 = ossl_provider_libctx(provider);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If a provider is given, its library context MUST match the library
|
|
|
|
* context we're passed. If this turns out not to be true, there is
|
|
|
|
* a programming error in the functions up the call stack.
|
|
|
|
*/
|
|
|
|
if (!ossl_assert(ossl_lib_ctx_get_concrete(libctx)
|
|
|
|
== ossl_lib_ctx_get_concrete(libctx2)))
|
|
|
|
return;
|
|
|
|
|
|
|
|
cbdata.libctx = libctx2;
|
2019-07-11 05:11:27 +08:00
|
|
|
algorithm_do_this(provider, &cbdata);
|
2021-09-30 15:32:57 +08:00
|
|
|
}
|
2019-07-11 05:11:27 +08:00
|
|
|
}
|
2021-04-16 22:22:03 +08:00
|
|
|
|
|
|
|
char *ossl_algorithm_get1_first_name(const OSSL_ALGORITHM *algo)
|
|
|
|
{
|
|
|
|
const char *first_name_end = NULL;
|
|
|
|
size_t first_name_len = 0;
|
|
|
|
char *ret;
|
|
|
|
|
|
|
|
if (algo->algorithm_names == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
first_name_end = strchr(algo->algorithm_names, ':');
|
|
|
|
if (first_name_end == NULL)
|
|
|
|
first_name_len = strlen(algo->algorithm_names);
|
|
|
|
else
|
|
|
|
first_name_len = first_name_end - algo->algorithm_names;
|
|
|
|
|
|
|
|
ret = OPENSSL_strndup(algo->algorithm_names, first_name_len);
|
|
|
|
return ret;
|
|
|
|
}
|