/* * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved. * * The contents of this file constitute Original Code as defined in and are * subject to the Apple Public Source License Version 1.2 (the 'License'). * You may not use this file except in compliance with the License. Please obtain * a copy of the License at http://www.apple.com/publicsource and read it before * using this file. * * This Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the * specific language governing rights and limitations under the License. */ #ifdef BSAFE_CSP_ENABLE // // bsafeAsymmetric.cpp - asymmetric encrypt/decrypt // #include "bsafecspi.h" #include <stdio.h> // debug // // Public key {en,de}cryption (currently RSA only) // // FIXME: // We really should match the key algorithm to the en/decrypt // algorithm. Also: verify key usage bits. void BSafe::PublicKeyCipherContext::init(const Context &context, bool encrypting) { assert(context.algorithm() == CSSM_ALGID_RSA); if (reusing(encrypting)) return; // all set to go switch (context.getInt(CSSM_ATTRIBUTE_MODE)) { case CSSM_ALGMODE_PUBLIC_KEY: setAlgorithm(AI_PKCS_RSAPublic); break; case CSSM_ALGMODE_PRIVATE_KEY: setAlgorithm(AI_PKCS_RSAPrivate); break; case CSSM_ALGMODE_NONE: { /* * None specified (getInt returns zero in that case) - * infer from key type */ CssmKey &key = context.get<CssmKey>( CSSM_ATTRIBUTE_KEY, CSSMERR_CSP_MISSING_ATTR_KEY); B_INFO_TYPE bAlgType; switch (key.keyClass()) { case CSSM_KEYCLASS_PUBLIC_KEY: bAlgType = AI_PKCS_RSAPublic; break; case CSSM_KEYCLASS_PRIVATE_KEY: bAlgType = AI_PKCS_RSAPrivate; break; default: CssmError::throwMe(CSSMERR_CSP_INVALID_KEY_CLASS); } setAlgorithm(bAlgType); break; } default: CssmError::throwMe(CSSMERR_CSP_INVALID_ATTR_MODE); } // put it all together setKeyFromContext(context); // set BSafe key setRandom(); // some PK cryption algs need random input cipherInit(); // common cipher init //@@@ calculate output buffer size } // we assume asymmetric crypto algorithms are one-shot output non-repeating size_t BSafe::PublicKeyCipherContext::inputSize(size_t outSize) { return 0xFFFFFFFF; // perhaps not the biggest size_t, but big enough... } #endif /* BSAFE_CSP_ENABLE */