| OLD | NEW |
| (Empty) | |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 4 |
| 5 |
| 6 #include "p12plcy.h" |
| 7 #include "secoid.h" |
| 8 #include "secport.h" |
| 9 #include "secpkcs5.h" |
| 10 |
| 11 #define PKCS12_NULL 0x0000 |
| 12 |
| 13 typedef struct pkcs12SuiteMapStr { |
| 14 SECOidTag algTag; |
| 15 unsigned int keyLengthBits; /* in bits */ |
| 16 unsigned long suite; |
| 17 PRBool allowed; |
| 18 PRBool preferred; |
| 19 } pkcs12SuiteMap; |
| 20 |
| 21 static pkcs12SuiteMap pkcs12SuiteMaps[] = { |
| 22 { SEC_OID_RC4, 40, PKCS12_RC4_40, PR_FALSE,
PR_FALSE}, |
| 23 { SEC_OID_RC4, 128, PKCS12_RC4_128, PR_FALSE,
PR_FALSE}, |
| 24 { SEC_OID_RC2_CBC, 40, PKCS12_RC2_CBC_40, PR_FALSE,
PR_TRUE}, |
| 25 { SEC_OID_RC2_CBC, 128, PKCS12_RC2_CBC_128, PR_FALSE,
PR_FALSE}, |
| 26 { SEC_OID_DES_CBC, 64, PKCS12_DES_56, PR_FALSE,
PR_FALSE}, |
| 27 { SEC_OID_DES_EDE3_CBC, 192, PKCS12_DES_EDE3_168, PR_FALSE,
PR_FALSE}, |
| 28 { SEC_OID_UNKNOWN, 0, PKCS12_NULL, PR_FALSE,
PR_FALSE}, |
| 29 { SEC_OID_UNKNOWN, 0, 0L, PR_FALSE,
PR_FALSE} |
| 30 }; |
| 31 |
| 32 /* determine if algid is an algorithm which is allowed */ |
| 33 PRBool |
| 34 SEC_PKCS12DecryptionAllowed(SECAlgorithmID *algid) |
| 35 { |
| 36 unsigned int keyLengthBits; |
| 37 SECOidTag algId; |
| 38 int i; |
| 39 |
| 40 algId = SEC_PKCS5GetCryptoAlgorithm(algid); |
| 41 if(algId == SEC_OID_UNKNOWN) { |
| 42 return PR_FALSE; |
| 43 } |
| 44 |
| 45 keyLengthBits = (unsigned int)(SEC_PKCS5GetKeyLength(algid) * 8); |
| 46 |
| 47 i = 0; |
| 48 while(pkcs12SuiteMaps[i].algTag != SEC_OID_UNKNOWN) { |
| 49 if((pkcs12SuiteMaps[i].algTag == algId) && |
| 50 (pkcs12SuiteMaps[i].keyLengthBits == keyLengthBits)) { |
| 51 |
| 52 return pkcs12SuiteMaps[i].allowed; |
| 53 } |
| 54 i++; |
| 55 } |
| 56 |
| 57 return PR_FALSE; |
| 58 } |
| 59 |
| 60 /* is any encryption allowed? */ |
| 61 PRBool |
| 62 SEC_PKCS12IsEncryptionAllowed(void) |
| 63 { |
| 64 int i; |
| 65 |
| 66 i = 0; |
| 67 while(pkcs12SuiteMaps[i].algTag != SEC_OID_UNKNOWN) { |
| 68 if(pkcs12SuiteMaps[i].allowed == PR_TRUE) { |
| 69 return PR_TRUE; |
| 70 } |
| 71 i++; |
| 72 } |
| 73 |
| 74 return PR_FALSE; |
| 75 } |
| 76 |
| 77 |
| 78 SECStatus |
| 79 SEC_PKCS12EnableCipher(long which, int on) |
| 80 { |
| 81 int i; |
| 82 |
| 83 i = 0; |
| 84 while(pkcs12SuiteMaps[i].suite != 0L) { |
| 85 if(pkcs12SuiteMaps[i].suite == (unsigned long)which) { |
| 86 if(on) { |
| 87 pkcs12SuiteMaps[i].allowed = PR_TRUE; |
| 88 } else { |
| 89 pkcs12SuiteMaps[i].allowed = PR_FALSE; |
| 90 } |
| 91 return SECSuccess; |
| 92 } |
| 93 i++; |
| 94 } |
| 95 |
| 96 return SECFailure; |
| 97 } |
| 98 |
| 99 SECStatus |
| 100 SEC_PKCS12SetPreferredCipher(long which, int on) |
| 101 { |
| 102 int i; |
| 103 PRBool turnedOff = PR_FALSE; |
| 104 PRBool turnedOn = PR_FALSE; |
| 105 |
| 106 i = 0; |
| 107 while(pkcs12SuiteMaps[i].suite != 0L) { |
| 108 if(pkcs12SuiteMaps[i].preferred == PR_TRUE) { |
| 109 pkcs12SuiteMaps[i].preferred = PR_FALSE; |
| 110 turnedOff = PR_TRUE; |
| 111 } |
| 112 if(pkcs12SuiteMaps[i].suite == (unsigned long)which) { |
| 113 pkcs12SuiteMaps[i].preferred = PR_TRUE; |
| 114 turnedOn = PR_TRUE; |
| 115 } |
| 116 i++; |
| 117 } |
| 118 |
| 119 if((turnedOn) && (turnedOff)) { |
| 120 return SECSuccess; |
| 121 } |
| 122 |
| 123 return SECFailure; |
| 124 } |
| 125 |
| OLD | NEW |