bsafeAsymmetric.cpp   [plain text]


/*
 * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
 * 
 * The contents of this file constitute Original Code as defined in and are
 * subject to the Apple Public Source License Version 1.2 (the 'License').
 * You may not use this file except in compliance with the License. Please obtain
 * a copy of the License at http://www.apple.com/publicsource and read it before
 * using this file.
 * 
 * This Original Code and all software distributed under the License are
 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
 * specific language governing rights and limitations under the License.
 */

#ifdef	BSAFE_CSP_ENABLE


//
// bsafeAsymmetric.cpp - asymmetric encrypt/decrypt
//
#include "bsafecspi.h"

#include <stdio.h>	// debug

//
// Public key {en,de}cryption (currently RSA only)
//
// FIXME:
// We really should match the key algorithm to the en/decrypt
// algorithm. Also: verify key usage bits. 
void BSafe::PublicKeyCipherContext::init(const Context &context, bool encrypting)
{
	assert(context.algorithm() == CSSM_ALGID_RSA);
	
    if (reusing(encrypting))
        return;		// all set to go
    
    switch (context.getInt(CSSM_ATTRIBUTE_MODE)) {
        case CSSM_ALGMODE_PUBLIC_KEY:
            setAlgorithm(AI_PKCS_RSAPublic);
            break;
        case CSSM_ALGMODE_PRIVATE_KEY:
            setAlgorithm(AI_PKCS_RSAPrivate);
            break;
        case CSSM_ALGMODE_NONE:	
		{
			/* 
			 * None specified (getInt returns zero in that case) - 
			 * infer from key type 
			 */
			CssmKey &key = context.get<CssmKey>(
				CSSM_ATTRIBUTE_KEY, CSSMERR_CSP_MISSING_ATTR_KEY);
			B_INFO_TYPE bAlgType;
			switch (key.keyClass()) {
				case CSSM_KEYCLASS_PUBLIC_KEY:
					bAlgType = AI_PKCS_RSAPublic;
					break;
				case CSSM_KEYCLASS_PRIVATE_KEY:
					bAlgType = AI_PKCS_RSAPrivate;
					break;
				default:
					CssmError::throwMe(CSSMERR_CSP_INVALID_KEY_CLASS);
			}
            setAlgorithm(bAlgType);
            break;
		}
        default:
            CssmError::throwMe(CSSMERR_CSP_INVALID_ATTR_MODE);
    }

    // put it all together
    setKeyFromContext(context);		// set BSafe key
    setRandom();					// some PK cryption algs need random input
    cipherInit();					// common cipher init
    //@@@ calculate output buffer size
}

// we assume asymmetric crypto algorithms are one-shot output non-repeating

size_t BSafe::PublicKeyCipherContext::inputSize(size_t outSize)
{
    return 0xFFFFFFFF;	// perhaps not the biggest size_t, but big enough...
}
#endif	/* BSAFE_CSP_ENABLE */