1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117
|
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is the Netscape security libraries.
*
* The Initial Developer of the Original Code is
* Netscape Communications Corporation.
* Portions created by the Initial Developer are Copyright (C) 1994-2000
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
#include "secplcy.h"
#include "prmem.h"
SECCipherFind *sec_CipherFindInit(PRBool onlyAllowed,
secCPStruct *policy,
long *ciphers)
{
SECCipherFind *find = PR_NEWZAP(SECCipherFind);
if (find)
{
find->policy = policy;
find->ciphers = ciphers;
find->onlyAllowed = onlyAllowed;
find->index = -1;
}
return find;
}
long sec_CipherFindNext(SECCipherFind *find)
{
char *policy;
long rv = -1;
secCPStruct *policies = (secCPStruct *) find->policy;
long *ciphers = (long *) find->ciphers;
long numCiphers = policies->num_ciphers;
find->index++;
while((find->index < numCiphers) && (rv == -1))
{
/* Translate index to cipher. */
rv = ciphers[find->index];
/* If we're only looking for allowed ciphers, and if this
cipher isn't allowed, loop around.*/
if (find->onlyAllowed)
{
/* Find the appropriate policy flag. */
policy = (&(policies->begin_ciphers)) + find->index + 1;
/* If this cipher isn't allowed by policy, continue. */
if (! (*policy))
{
rv = -1;
find->index++;
}
}
}
return rv;
}
char sec_IsCipherAllowed(long cipher, secCPStruct *policies,
long *ciphers)
{
char result = SEC_CIPHER_NOT_ALLOWED; /* our default answer */
long numCiphers = policies->num_ciphers;
char *policy;
int i;
/* Convert the cipher number into a policy flag location. */
for (i=0, policy=(&(policies->begin_ciphers) + 1);
i<numCiphers;
i++, policy++)
{
if (cipher == ciphers[i])
break;
}
if (i < numCiphers)
{
/* Found the cipher, get the policy value. */
result = *policy;
}
return result;
}
void sec_CipherFindEnd(SECCipherFind *find)
{
PR_FREEIF(find);
}
|