| OLD | NEW |
| (Empty) |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 4 | |
| 5 | |
| 6 #include "p12plcy.h" | |
| 7 #include "secoid.h" | |
| 8 #include "secport.h" | |
| 9 #include "secpkcs5.h" | |
| 10 | |
| 11 #define PKCS12_NULL 0x0000 | |
| 12 | |
| 13 typedef struct pkcs12SuiteMapStr { | |
| 14 SECOidTag algTag; | |
| 15 unsigned int keyLengthBits; /* in bits */ | |
| 16 unsigned long suite; | |
| 17 PRBool allowed; | |
| 18 PRBool preferred; | |
| 19 } pkcs12SuiteMap; | |
| 20 | |
| 21 static pkcs12SuiteMap pkcs12SuiteMaps[] = { | |
| 22 { SEC_OID_RC4, 40, PKCS12_RC4_40, PR_FALSE,
PR_FALSE}, | |
| 23 { SEC_OID_RC4, 128, PKCS12_RC4_128, PR_FALSE,
PR_FALSE}, | |
| 24 { SEC_OID_RC2_CBC, 40, PKCS12_RC2_CBC_40, PR_FALSE,
PR_TRUE}, | |
| 25 { SEC_OID_RC2_CBC, 128, PKCS12_RC2_CBC_128, PR_FALSE,
PR_FALSE}, | |
| 26 { SEC_OID_DES_CBC, 64, PKCS12_DES_56, PR_FALSE,
PR_FALSE}, | |
| 27 { SEC_OID_DES_EDE3_CBC, 192, PKCS12_DES_EDE3_168, PR_FALSE,
PR_FALSE}, | |
| 28 { SEC_OID_UNKNOWN, 0, PKCS12_NULL, PR_FALSE,
PR_FALSE}, | |
| 29 { SEC_OID_UNKNOWN, 0, 0L, PR_FALSE,
PR_FALSE} | |
| 30 }; | |
| 31 | |
| 32 /* determine if algid is an algorithm which is allowed */ | |
| 33 PRBool | |
| 34 SEC_PKCS12DecryptionAllowed(SECAlgorithmID *algid) | |
| 35 { | |
| 36 unsigned int keyLengthBits; | |
| 37 SECOidTag algId; | |
| 38 int i; | |
| 39 | |
| 40 algId = SEC_PKCS5GetCryptoAlgorithm(algid); | |
| 41 if(algId == SEC_OID_UNKNOWN) { | |
| 42 return PR_FALSE; | |
| 43 } | |
| 44 | |
| 45 keyLengthBits = (unsigned int)(SEC_PKCS5GetKeyLength(algid) * 8); | |
| 46 | |
| 47 i = 0; | |
| 48 while(pkcs12SuiteMaps[i].algTag != SEC_OID_UNKNOWN) { | |
| 49 if((pkcs12SuiteMaps[i].algTag == algId) && | |
| 50 (pkcs12SuiteMaps[i].keyLengthBits == keyLengthBits)) { | |
| 51 | |
| 52 return pkcs12SuiteMaps[i].allowed; | |
| 53 } | |
| 54 i++; | |
| 55 } | |
| 56 | |
| 57 return PR_FALSE; | |
| 58 } | |
| 59 | |
| 60 /* is any encryption allowed? */ | |
| 61 PRBool | |
| 62 SEC_PKCS12IsEncryptionAllowed(void) | |
| 63 { | |
| 64 int i; | |
| 65 | |
| 66 i = 0; | |
| 67 while(pkcs12SuiteMaps[i].algTag != SEC_OID_UNKNOWN) { | |
| 68 if(pkcs12SuiteMaps[i].allowed == PR_TRUE) { | |
| 69 return PR_TRUE; | |
| 70 } | |
| 71 i++; | |
| 72 } | |
| 73 | |
| 74 return PR_FALSE; | |
| 75 } | |
| 76 | |
| 77 | |
| 78 SECStatus | |
| 79 SEC_PKCS12EnableCipher(long which, int on) | |
| 80 { | |
| 81 int i; | |
| 82 | |
| 83 i = 0; | |
| 84 while(pkcs12SuiteMaps[i].suite != 0L) { | |
| 85 if(pkcs12SuiteMaps[i].suite == (unsigned long)which) { | |
| 86 if(on) { | |
| 87 pkcs12SuiteMaps[i].allowed = PR_TRUE; | |
| 88 } else { | |
| 89 pkcs12SuiteMaps[i].allowed = PR_FALSE; | |
| 90 } | |
| 91 return SECSuccess; | |
| 92 } | |
| 93 i++; | |
| 94 } | |
| 95 | |
| 96 return SECFailure; | |
| 97 } | |
| 98 | |
| 99 SECStatus | |
| 100 SEC_PKCS12SetPreferredCipher(long which, int on) | |
| 101 { | |
| 102 int i; | |
| 103 PRBool turnedOff = PR_FALSE; | |
| 104 PRBool turnedOn = PR_FALSE; | |
| 105 | |
| 106 i = 0; | |
| 107 while(pkcs12SuiteMaps[i].suite != 0L) { | |
| 108 if(pkcs12SuiteMaps[i].preferred == PR_TRUE) { | |
| 109 pkcs12SuiteMaps[i].preferred = PR_FALSE; | |
| 110 turnedOff = PR_TRUE; | |
| 111 } | |
| 112 if(pkcs12SuiteMaps[i].suite == (unsigned long)which) { | |
| 113 pkcs12SuiteMaps[i].preferred = PR_TRUE; | |
| 114 turnedOn = PR_TRUE; | |
| 115 } | |
| 116 i++; | |
| 117 } | |
| 118 | |
| 119 if((turnedOn) && (turnedOff)) { | |
| 120 return SECSuccess; | |
| 121 } | |
| 122 | |
| 123 return SECFailure; | |
| 124 } | |
| 125 | |
| OLD | NEW |