OLD | NEW |
| (Empty) |
1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
4 | |
5 | |
6 #include "p12plcy.h" | |
7 #include "secoid.h" | |
8 #include "secport.h" | |
9 #include "secpkcs5.h" | |
10 | |
11 #define PKCS12_NULL 0x0000 | |
12 | |
13 typedef struct pkcs12SuiteMapStr { | |
14 SECOidTag algTag; | |
15 unsigned int keyLengthBits; /* in bits */ | |
16 unsigned long suite; | |
17 PRBool allowed; | |
18 PRBool preferred; | |
19 } pkcs12SuiteMap; | |
20 | |
21 static pkcs12SuiteMap pkcs12SuiteMaps[] = { | |
22 { SEC_OID_RC4, 40, PKCS12_RC4_40, PR_FALSE,
PR_FALSE}, | |
23 { SEC_OID_RC4, 128, PKCS12_RC4_128, PR_FALSE,
PR_FALSE}, | |
24 { SEC_OID_RC2_CBC, 40, PKCS12_RC2_CBC_40, PR_FALSE,
PR_TRUE}, | |
25 { SEC_OID_RC2_CBC, 128, PKCS12_RC2_CBC_128, PR_FALSE,
PR_FALSE}, | |
26 { SEC_OID_DES_CBC, 64, PKCS12_DES_56, PR_FALSE,
PR_FALSE}, | |
27 { SEC_OID_DES_EDE3_CBC, 192, PKCS12_DES_EDE3_168, PR_FALSE,
PR_FALSE}, | |
28 { SEC_OID_UNKNOWN, 0, PKCS12_NULL, PR_FALSE,
PR_FALSE}, | |
29 { SEC_OID_UNKNOWN, 0, 0L, PR_FALSE,
PR_FALSE} | |
30 }; | |
31 | |
32 /* determine if algid is an algorithm which is allowed */ | |
33 PRBool | |
34 SEC_PKCS12DecryptionAllowed(SECAlgorithmID *algid) | |
35 { | |
36 unsigned int keyLengthBits; | |
37 SECOidTag algId; | |
38 int i; | |
39 | |
40 algId = SEC_PKCS5GetCryptoAlgorithm(algid); | |
41 if(algId == SEC_OID_UNKNOWN) { | |
42 return PR_FALSE; | |
43 } | |
44 | |
45 keyLengthBits = (unsigned int)(SEC_PKCS5GetKeyLength(algid) * 8); | |
46 | |
47 i = 0; | |
48 while(pkcs12SuiteMaps[i].algTag != SEC_OID_UNKNOWN) { | |
49 if((pkcs12SuiteMaps[i].algTag == algId) && | |
50 (pkcs12SuiteMaps[i].keyLengthBits == keyLengthBits)) { | |
51 | |
52 return pkcs12SuiteMaps[i].allowed; | |
53 } | |
54 i++; | |
55 } | |
56 | |
57 return PR_FALSE; | |
58 } | |
59 | |
60 /* is any encryption allowed? */ | |
61 PRBool | |
62 SEC_PKCS12IsEncryptionAllowed(void) | |
63 { | |
64 int i; | |
65 | |
66 i = 0; | |
67 while(pkcs12SuiteMaps[i].algTag != SEC_OID_UNKNOWN) { | |
68 if(pkcs12SuiteMaps[i].allowed == PR_TRUE) { | |
69 return PR_TRUE; | |
70 } | |
71 i++; | |
72 } | |
73 | |
74 return PR_FALSE; | |
75 } | |
76 | |
77 | |
78 SECStatus | |
79 SEC_PKCS12EnableCipher(long which, int on) | |
80 { | |
81 int i; | |
82 | |
83 i = 0; | |
84 while(pkcs12SuiteMaps[i].suite != 0L) { | |
85 if(pkcs12SuiteMaps[i].suite == (unsigned long)which) { | |
86 if(on) { | |
87 pkcs12SuiteMaps[i].allowed = PR_TRUE; | |
88 } else { | |
89 pkcs12SuiteMaps[i].allowed = PR_FALSE; | |
90 } | |
91 return SECSuccess; | |
92 } | |
93 i++; | |
94 } | |
95 | |
96 return SECFailure; | |
97 } | |
98 | |
99 SECStatus | |
100 SEC_PKCS12SetPreferredCipher(long which, int on) | |
101 { | |
102 int i; | |
103 PRBool turnedOff = PR_FALSE; | |
104 PRBool turnedOn = PR_FALSE; | |
105 | |
106 i = 0; | |
107 while(pkcs12SuiteMaps[i].suite != 0L) { | |
108 if(pkcs12SuiteMaps[i].preferred == PR_TRUE) { | |
109 pkcs12SuiteMaps[i].preferred = PR_FALSE; | |
110 turnedOff = PR_TRUE; | |
111 } | |
112 if(pkcs12SuiteMaps[i].suite == (unsigned long)which) { | |
113 pkcs12SuiteMaps[i].preferred = PR_TRUE; | |
114 turnedOn = PR_TRUE; | |
115 } | |
116 i++; | |
117 } | |
118 | |
119 if((turnedOn) && (turnedOff)) { | |
120 return SECSuccess; | |
121 } | |
122 | |
123 return SECFailure; | |
124 } | |
125 | |
OLD | NEW |