/* * Copyright (C) 2010 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.conscrypt; import java.security.Provider; /** * Provider that goes through OpenSSL for operations. * <p> * Every algorithm should have its IANA assigned OID as an alias. See the following URLs for each type: * <ul> * <li><a href="http://www.iana.org/assignments/hash-function-text-names/hash-function-text-names.xml">Hash functions</a></li> * <li><a href="http://www.iana.org/assignments/dssc/dssc.xml">Signature algorithms</a></li> * <li><a href="http://csrc.nist.gov/groups/ST/crypto_apps_infra/csor/algorithms.html">NIST cryptographic algorithms</a></li> * </ul> */ public final class OpenSSLProvider extends Provider { private static final long serialVersionUID = 2996752495318905136L; public static final String PROVIDER_NAME = "AndroidOpenSSL"; public OpenSSLProvider() { this(PROVIDER_NAME); } public OpenSSLProvider(String providerName) { super(providerName, 1.0, "Android's OpenSSL-backed security provider"); // Make sure the platform is initialized. Platform.setup(); final String prefix = getClass().getPackage().getName() + "."; /* === SSL Contexts === */ final String classOpenSSLContextImpl = prefix + "OpenSSLContextImpl"; put("SSLContext.SSL", classOpenSSLContextImpl); put("SSLContext.SSLv3", classOpenSSLContextImpl); put("SSLContext.TLS", classOpenSSLContextImpl); put("SSLContext.TLSv1", classOpenSSLContextImpl); put("SSLContext.TLSv1.1", classOpenSSLContextImpl); put("SSLContext.TLSv1.2", classOpenSSLContextImpl); put("SSLContext.Default", prefix + "DefaultSSLContextImpl"); /* === Message Digests === */ put("MessageDigest.SHA-1", prefix + "OpenSSLMessageDigestJDK$SHA1"); put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); put("Alg.Alias.MessageDigest.SHA", "SHA-1"); put("Alg.Alias.MessageDigest.1.3.14.3.2.26", "SHA-1"); put("MessageDigest.SHA-224", prefix + "OpenSSLMessageDigestJDK$SHA224"); put("Alg.Alias.MessageDigest.SHA224", "SHA-224"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4", "SHA-224"); put("MessageDigest.SHA-256", prefix + "OpenSSLMessageDigestJDK$SHA256"); put("Alg.Alias.MessageDigest.SHA256", "SHA-256"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1", "SHA-256"); put("MessageDigest.SHA-384", prefix + "OpenSSLMessageDigestJDK$SHA384"); put("Alg.Alias.MessageDigest.SHA384", "SHA-384"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2", "SHA-384"); put("MessageDigest.SHA-512", prefix + "OpenSSLMessageDigestJDK$SHA512"); put("Alg.Alias.MessageDigest.SHA512", "SHA-512"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3", "SHA-512"); // iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) md5(5) put("MessageDigest.MD5", prefix + "OpenSSLMessageDigestJDK$MD5"); put("Alg.Alias.MessageDigest.1.2.840.113549.2.5", "MD5"); /* == KeyPairGenerators == */ put("KeyPairGenerator.RSA", prefix + "OpenSSLRSAKeyPairGenerator"); put("Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1.1", "RSA"); put("KeyPairGenerator.DH", prefix + "OpenSSLDHKeyPairGenerator"); put("Alg.Alias.KeyPairGenerator.1.2.840.113549.1.3.1", "DH"); put("KeyPairGenerator.DSA", prefix + "OpenSSLDSAKeyPairGenerator"); put("KeyPairGenerator.EC", prefix + "OpenSSLECKeyPairGenerator"); /* == KeyFactory == */ put("KeyFactory.RSA", prefix + "OpenSSLRSAKeyFactory"); put("Alg.Alias.KeyFactory.1.2.840.113549.1.1.1", "RSA"); put("KeyFactory.DH", prefix + "OpenSSLDHKeyFactory"); put("Alg.Alias.KeyFactory.1.2.840.113549.1.3.1", "DH"); put("KeyFactory.DSA", prefix + "OpenSSLDSAKeyFactory"); put("KeyFactory.EC", prefix + "OpenSSLECKeyFactory"); /* == KeyAgreement == */ put("KeyAgreement.ECDH", prefix + "OpenSSLECDHKeyAgreement"); /* == Signatures == */ put("Signature.MD5WithRSA", prefix + "OpenSSLSignature$MD5RSA"); put("Alg.Alias.Signature.MD5WithRSAEncryption", "MD5WithRSA"); put("Alg.Alias.Signature.MD5/RSA", "MD5WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.4", "MD5WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.2.5with1.2.840.113549.1.1.1", "MD5WithRSA"); put("Signature.SHA1WithRSA", prefix + "OpenSSLSignature$SHA1RSA"); put("Alg.Alias.Signature.SHA1WithRSAEncryption", "SHA1WithRSA"); put("Alg.Alias.Signature.SHA1/RSA", "SHA1WithRSA"); put("Alg.Alias.Signature.SHA-1/RSA", "SHA1WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.5", "SHA1WithRSA"); put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.113549.1.1.1", "SHA1WithRSA"); put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.113549.1.1.5", "SHA1WithRSA"); put("Alg.Alias.Signature.1.3.14.3.2.29", "SHA1WithRSA"); put("Signature.SHA224WithRSA", prefix + "OpenSSLSignature$SHA224RSA"); put("Alg.Alias.Signature.SHA224WithRSAEncryption", "SHA224WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.11", "SHA224WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.4with1.2.840.113549.1.1.1", "SHA224WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.4with1.2.840.113549.1.1.11", "SHA224WithRSA"); put("Signature.SHA256WithRSA", prefix + "OpenSSLSignature$SHA256RSA"); put("Alg.Alias.Signature.SHA256WithRSAEncryption", "SHA256WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.11", "SHA256WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.1with1.2.840.113549.1.1.1", "SHA256WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.1with1.2.840.113549.1.1.11", "SHA256WithRSA"); put("Signature.SHA384WithRSA", prefix + "OpenSSLSignature$SHA384RSA"); put("Alg.Alias.Signature.SHA384WithRSAEncryption", "SHA384WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.12", "SHA384WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.2with1.2.840.113549.1.1.1", "SHA384WithRSA"); put("Signature.SHA512WithRSA", prefix + "OpenSSLSignature$SHA512RSA"); put("Alg.Alias.Signature.SHA512WithRSAEncryption", "SHA512WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.13", "SHA512WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.3with1.2.840.113549.1.1.1", "SHA512WithRSA"); put("Signature.SHA1withDSA", prefix + "OpenSSLSignature$SHA1DSA"); put("Alg.Alias.Signature.SHA/DSA", "SHA1withDSA"); put("Alg.Alias.Signature.DSA", "SHA1withDSA"); put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.10040.4.1", "SHA1withDSA"); put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.10040.4.3", "SHA1withDSA"); put("Alg.Alias.Signature.DSAWithSHA1", "SHA1withDSA"); put("Alg.Alias.Signature.1.2.840.10040.4.3", "SHA1withDSA"); put("Signature.NONEwithRSA", prefix + "OpenSSLSignatureRawRSA"); put("Signature.ECDSA", prefix + "OpenSSLSignature$SHA1ECDSA"); put("Alg.Alias.Signature.SHA1withECDSA", "ECDSA"); put("Alg.Alias.Signature.ECDSAwithSHA1", "ECDSA"); // iso(1) member-body(2) us(840) ansi-x962(10045) signatures(4) ecdsa-with-SHA1(1) put("Alg.Alias.Signature.1.2.840.10045.4.1", "ECDSA"); put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.10045.2.1", "ECDSA"); // iso(1) member-body(2) us(840) ansi-x962(10045) signatures(4) ecdsa-with-SHA2(3) put("Signature.SHA224withECDSA", prefix + "OpenSSLSignature$SHA224ECDSA"); // ecdsa-with-SHA224(1) put("Alg.Alias.Signature.1.2.840.10045.4.3.1", "SHA224withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.4with1.2.840.10045.2.1", "SHA224withECDSA"); // iso(1) member-body(2) us(840) ansi-x962(10045) signatures(4) ecdsa-with-SHA2(3) put("Signature.SHA256withECDSA", prefix + "OpenSSLSignature$SHA256ECDSA"); // ecdsa-with-SHA256(2) put("Alg.Alias.Signature.1.2.840.10045.4.3.2", "SHA256withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.1with1.2.840.10045.2.1", "SHA256withECDSA"); put("Signature.SHA384withECDSA", prefix + "OpenSSLSignature$SHA384ECDSA"); // ecdsa-with-SHA384(3) put("Alg.Alias.Signature.1.2.840.10045.4.3.3", "SHA384withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.2with1.2.840.10045.2.1", "SHA384withECDSA"); put("Signature.SHA512withECDSA", prefix + "OpenSSLSignature$SHA512ECDSA"); // ecdsa-with-SHA512(4) put("Alg.Alias.Signature.1.2.840.10045.4.3.4", "SHA512withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.3with1.2.840.10045.2.1", "SHA512withECDSA"); /* === SecureRandom === */ /* * We have to specify SHA1PRNG because various documentation mentions * that algorithm by name instead of just recommending calling * "new SecureRandom()" */ put("SecureRandom.SHA1PRNG", prefix + "OpenSSLRandom"); put("SecureRandom.SHA1PRNG ImplementedIn", "Software"); /* === Cipher === */ put("Cipher.RSA/ECB/NoPadding", prefix + "OpenSSLCipherRSA$Raw"); put("Alg.Alias.Cipher.RSA/None/NoPadding", "RSA/ECB/NoPadding"); put("Cipher.RSA/ECB/PKCS1Padding", prefix + "OpenSSLCipherRSA$PKCS1"); put("Alg.Alias.Cipher.RSA/None/PKCS1Padding", "RSA/ECB/PKCS1Padding"); /* * OpenSSL only supports a subset of modes, so we'll name them * explicitly here. * * Moreover, OpenSSL only supports PKCS#7 padding. PKCS#5 padding * is also supported because it's a special case of PKCS#7 for 64-bit * blocks. PKCS#5 technically supports only 64-bit blocks and won't * produce the same result as PKCS#7 for blocks that are not 64 bits * long. However, everybody assumes PKCS#7 when they say PKCS#5. For * example, lots of code uses PKCS#5 with AES whose blocks are longer * than 64 bits. We solve this confusion by making PKCS7Padding an * alias for PKCS5Padding. */ put("Cipher.AES/ECB/NoPadding", prefix + "OpenSSLCipher$AES$ECB$NoPadding"); put("Cipher.AES/ECB/PKCS5Padding", prefix + "OpenSSLCipher$AES$ECB$PKCS5Padding"); put("Alg.Alias.Cipher.AES/ECB/PKCS7Padding", "AES/ECB/PKCS5Padding"); put("Cipher.AES/CBC/NoPadding", prefix + "OpenSSLCipher$AES$CBC$NoPadding"); put("Cipher.AES/CBC/PKCS5Padding", prefix + "OpenSSLCipher$AES$CBC$PKCS5Padding"); put("Alg.Alias.Cipher.AES/CBC/PKCS7Padding", "AES/CBC/PKCS5Padding"); put("Cipher.AES/CFB/NoPadding", prefix + "OpenSSLCipher$AES$CFB"); put("Cipher.AES/CTR/NoPadding", prefix + "OpenSSLCipher$AES$CTR"); put("Cipher.AES/OFB/NoPadding", prefix + "OpenSSLCipher$AES$OFB"); put("Cipher.DESEDE/ECB/NoPadding", prefix + "OpenSSLCipher$DESEDE$ECB$NoPadding"); put("Cipher.DESEDE/ECB/PKCS5Padding", prefix + "OpenSSLCipher$DESEDE$ECB$PKCS5Padding"); put("Alg.Alias.Cipher.DESEDE/ECB/PKCS7Padding", "DESEDE/ECB/PKCS5Padding"); put("Cipher.DESEDE/CBC/NoPadding", prefix + "OpenSSLCipher$DESEDE$CBC$NoPadding"); put("Cipher.DESEDE/CBC/PKCS5Padding", prefix + "OpenSSLCipher$DESEDE$CBC$PKCS5Padding"); put("Alg.Alias.Cipher.DESEDE/CBC/PKCS7Padding", "DESEDE/CBC/PKCS5Padding"); put("Cipher.DESEDE/CFB/NoPadding", prefix + "OpenSSLCipher$DESEDE$CFB"); put("Cipher.DESEDE/OFB/NoPadding", prefix + "OpenSSLCipher$DESEDE$OFB"); put("Cipher.ARC4", prefix + "OpenSSLCipher$ARC4"); /* === Mac === */ put("Mac.HmacMD5", prefix + "OpenSSLMac$HmacMD5"); // PKCS#2 - iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) // http://www.oid-info.com/get/1.2.840.113549.2 // HMAC-SHA-1 PRF (7) put("Mac.HmacSHA1", prefix + "OpenSSLMac$HmacSHA1"); put("Alg.Alias.Mac.1.2.840.113549.2.7", "HmacSHA1"); put("Alg.Alias.Mac.HMAC-SHA1", "HmacSHA1"); put("Alg.Alias.Mac.HMAC/SHA1", "HmacSHA1"); // id-hmacWithSHA224 (8) put("Mac.HmacSHA224", prefix + "OpenSSLMac$HmacSHA224"); put("Alg.Alias.Mac.1.2.840.113549.2.9", "HmacSHA224"); put("Alg.Alias.Mac.HMAC-SHA224", "HmacSHA224"); put("Alg.Alias.Mac.HMAC/SHA224", "HmacSHA224"); // id-hmacWithSHA256 (9) put("Mac.HmacSHA256", prefix + "OpenSSLMac$HmacSHA256"); put("Alg.Alias.Mac.1.2.840.113549.2.9", "HmacSHA256"); put("Alg.Alias.Mac.HMAC-SHA256", "HmacSHA256"); put("Alg.Alias.Mac.HMAC/SHA256", "HmacSHA256"); // id-hmacWithSHA384 (10) put("Mac.HmacSHA384", prefix + "OpenSSLMac$HmacSHA384"); put("Alg.Alias.Mac.1.2.840.113549.2.10", "HmacSHA384"); put("Alg.Alias.Mac.HMAC-SHA384", "HmacSHA384"); put("Alg.Alias.Mac.HMAC/SHA384", "HmacSHA384"); // id-hmacWithSHA384 (11) put("Mac.HmacSHA512", prefix + "OpenSSLMac$HmacSHA512"); put("Alg.Alias.Mac.1.2.840.113549.2.11", "HmacSHA512"); put("Alg.Alias.Mac.HMAC-SHA512", "HmacSHA512"); put("Alg.Alias.Mac.HMAC/SHA512", "HmacSHA512"); /* === Certificate === */ put("CertificateFactory.X509", prefix + "OpenSSLX509CertificateFactory"); put("Alg.Alias.CertificateFactory.X.509", "X509"); } }