blob: 03a83319cad8461451bcefec4054c025a7ebbf98 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
|
/*
* Policies for TLS
* (C) 2004-2010 Jack Lloyd
*
* Released under the terms of the Botan license
*/
#include <botan/tls_policy.h>
#include <botan/tls_exceptn.h>
namespace Botan {
/**
* Return allowed ciphersuites
*/
std::vector<u16bit> TLS_Policy::ciphersuites() const
{
return suite_list(allow_static_rsa(), allow_edh_rsa(), allow_edh_dsa());
}
/**
* Return allowed ciphersuites
*/
std::vector<u16bit> TLS_Policy::suite_list(bool use_rsa,
bool use_edh_rsa,
bool use_edh_dsa) const
{
std::vector<u16bit> suites;
if(use_edh_dsa)
{
suites.push_back(TLS_DHE_DSS_WITH_AES_256_CBC_SHA);
suites.push_back(TLS_DHE_DSS_WITH_AES_128_CBC_SHA);
suites.push_back(TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA);
suites.push_back(TLS_DHE_DSS_WITH_SEED_CBC_SHA);
}
if(use_edh_rsa)
{
suites.push_back(TLS_DHE_RSA_WITH_AES_256_CBC_SHA);
suites.push_back(TLS_DHE_RSA_WITH_AES_128_CBC_SHA);
suites.push_back(TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA);
suites.push_back(TLS_DHE_RSA_WITH_SEED_CBC_SHA);
}
if(use_rsa)
{
suites.push_back(TLS_RSA_WITH_AES_256_CBC_SHA);
suites.push_back(TLS_RSA_WITH_AES_128_CBC_SHA);
suites.push_back(TLS_RSA_WITH_3DES_EDE_CBC_SHA);
suites.push_back(TLS_RSA_WITH_SEED_CBC_SHA);
suites.push_back(TLS_RSA_WITH_RC4_128_SHA);
suites.push_back(TLS_RSA_WITH_RC4_128_MD5);
}
if(suites.size() == 0)
throw TLS_Exception(INTERNAL_ERROR,
"TLS_Policy error: All ciphersuites disabled");
return suites;
}
/**
* Return allowed compression algorithms
*/
std::vector<byte> TLS_Policy::compression() const
{
std::vector<byte> algs;
algs.push_back(NO_COMPRESSION);
return algs;
}
/**
* Choose which ciphersuite to use
*/
u16bit TLS_Policy::choose_suite(const std::vector<u16bit>& c_suites,
bool have_rsa,
bool have_dsa) const
{
bool use_static_rsa = allow_static_rsa() && have_rsa;
bool use_edh_rsa = allow_edh_rsa() && have_rsa;
bool use_edh_dsa = allow_edh_dsa() && have_dsa;
std::vector<u16bit> s_suites = suite_list(use_static_rsa, use_edh_rsa,
use_edh_dsa);
for(u32bit j = 0; j != s_suites.size(); j++)
for(u32bit k = 0; k != c_suites.size(); k++)
if(s_suites[j] == c_suites[k])
return s_suites[j];
return 0;
}
/**
* Choose which compression algorithm to use
*/
byte TLS_Policy::choose_compression(const std::vector<byte>& c_comp) const
{
std::vector<byte> s_comp = compression();
for(u32bit j = 0; j != s_comp.size(); j++)
for(u32bit k = 0; k != c_comp.size(); k++)
if(s_comp[j] == c_comp[k])
return s_comp[j];
return NO_COMPRESSION;
}
/**
* Return the group to use for empheral DH
*/
DL_Group TLS_Policy::dh_group() const
{
return DL_Group("modp/ietf/1024");
}
/**
* Default certificate check
*/
bool TLS_Policy::check_cert(const std::vector<X509_Certificate>&,
const std::string&) const
{
return true;
}
}
|