1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
|
/*
* Policies for TLS
* (C) 2004-2010 Jack Lloyd
*
* Released under the terms of the Botan license
*/
#include <botan/tls_policy.h>
#include <botan/tls_exceptn.h>
namespace Botan {
/*
* Return allowed ciphersuites
*/
std::vector<u16bit> TLS_Policy::ciphersuites(bool have_srp) const
{
return suite_list(allow_static_rsa(), allow_edh_rsa(), allow_edh_dsa(),
allow_srp() && have_srp);
}
/*
* Return allowed ciphersuites
*/
std::vector<u16bit> TLS_Policy::suite_list(bool use_rsa,
bool use_edh_rsa,
bool use_edh_dsa,
bool use_srp) const
{
std::vector<u16bit> suites;
if(use_srp)
{
if(use_edh_rsa)
{
suites.push_back(TLS_SRP_SHA_DSS_WITH_AES_256_SHA);
suites.push_back(TLS_SRP_SHA_DSS_WITH_AES_128_SHA);
suites.push_back(TLS_SRP_SHA_DSS_WITH_3DES_EDE_SHA);
}
if(use_edh_dsa)
{
suites.push_back(TLS_SRP_SHA_RSA_WITH_AES_256_SHA);
suites.push_back(TLS_SRP_SHA_RSA_WITH_AES_128_SHA);
suites.push_back(TLS_SRP_SHA_RSA_WITH_3DES_EDE_SHA);
}
}
if(use_edh_dsa)
{
suites.push_back(TLS_DHE_DSS_WITH_AES_256_CBC_SHA);
suites.push_back(TLS_DHE_DSS_WITH_AES_128_CBC_SHA);
suites.push_back(TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA);
suites.push_back(TLS_DHE_DSS_WITH_SEED_CBC_SHA);
}
if(use_edh_rsa)
{
suites.push_back(TLS_DHE_RSA_WITH_AES_256_CBC_SHA);
suites.push_back(TLS_DHE_RSA_WITH_AES_128_CBC_SHA);
suites.push_back(TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA);
suites.push_back(TLS_DHE_RSA_WITH_SEED_CBC_SHA);
}
if(use_rsa)
{
suites.push_back(TLS_RSA_WITH_AES_256_CBC_SHA);
suites.push_back(TLS_RSA_WITH_AES_128_CBC_SHA);
suites.push_back(TLS_RSA_WITH_3DES_EDE_CBC_SHA);
suites.push_back(TLS_RSA_WITH_SEED_CBC_SHA);
suites.push_back(TLS_RSA_WITH_RC4_128_SHA);
suites.push_back(TLS_RSA_WITH_RC4_128_MD5);
}
if(suites.size() == 0)
throw TLS_Exception(INTERNAL_ERROR,
"TLS_Policy error: All ciphersuites disabled");
return suites;
}
/*
* Return allowed compression algorithms
*/
std::vector<byte> TLS_Policy::compression() const
{
std::vector<byte> algs;
algs.push_back(NO_COMPRESSION);
return algs;
}
/*
* Choose which ciphersuite to use
*/
u16bit TLS_Policy::choose_suite(const std::vector<u16bit>& c_suites,
bool have_rsa,
bool have_dsa,
bool have_srp) const
{
const bool use_static_rsa = allow_static_rsa() && have_rsa;
const bool use_edh_rsa = allow_edh_rsa() && have_rsa;
const bool use_edh_dsa = allow_edh_dsa() && have_dsa;
const bool use_srp = allow_srp() && have_srp;
std::vector<u16bit> s_suites = suite_list(use_static_rsa, use_edh_rsa,
use_edh_dsa, use_srp);
for(size_t i = 0; i != s_suites.size(); ++i)
for(size_t j = 0; j != c_suites.size(); ++j)
if(s_suites[i] == c_suites[j])
return s_suites[i];
return 0;
}
/*
* Choose which compression algorithm to use
*/
byte TLS_Policy::choose_compression(const std::vector<byte>& c_comp) const
{
std::vector<byte> s_comp = compression();
for(size_t i = 0; i != s_comp.size(); ++i)
for(size_t j = 0; j != c_comp.size(); ++j)
if(s_comp[i] == c_comp[j])
return s_comp[i];
return NO_COMPRESSION;
}
/*
* Return the group to use for empheral DH
*/
DL_Group TLS_Policy::dh_group() const
{
return DL_Group("modp/ietf/1024");
}
}
|