X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/5dd5f9ec28f304ca377c42fd7f711d6cf12b90e1..5c19dc3ae3bd8e40a9c028b0deddd50ff337692c:/Security/libsecurity_smime/lib/secalgid.c diff --git a/Security/libsecurity_smime/lib/secalgid.c b/Security/libsecurity_smime/lib/secalgid.c deleted file mode 100644 index 623b7f9f..00000000 --- a/Security/libsecurity_smime/lib/secalgid.c +++ /dev/null @@ -1,172 +0,0 @@ -/* - * The contents of this file are subject to the Mozilla Public - * License Version 1.1 (the "License"); you may not use this file - * except in compliance with the License. You may obtain a copy of - * the License at http://www.mozilla.org/MPL/ - * - * Software distributed under the License is distributed on an "AS - * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or - * implied. See the License for the specific language governing - * rights and limitations under the License. - * - * The Original Code is the Netscape security libraries. - * - * The Initial Developer of the Original Code is Netscape - * Communications Corporation. Portions created by Netscape are - * Copyright (C) 1994-2000 Netscape Communications Corporation. All - * Rights Reserved. - * - * Contributor(s): - * - * Alternatively, the contents of this file may be used under the - * terms of the GNU General Public License Version 2 or later (the - * "GPL"), in which case the provisions of the GPL are applicable - * instead of those above. If you wish to allow use of your - * version of this file only under the terms of the GPL and not to - * allow others to use your version of this file under the MPL, - * indicate your decision by deleting the provisions above and - * replace them with the notice and other provisions required by - * the GPL. If you do not delete the provisions above, a recipient - * may use your version of this file under either the MPL or the - * GPL. - */ - -#include "secoid.h" -#include "secitem.h" -#include -#include - -const SecAsn1Template SECOID_AlgorithmIDTemplate[] = { - { SEC_ASN1_SEQUENCE, - 0, NULL, sizeof(SECAlgorithmID) }, - { SEC_ASN1_OBJECT_ID, - offsetof(SECAlgorithmID,algorithm), }, - { SEC_ASN1_OPTIONAL | SEC_ASN1_ANY, - offsetof(SECAlgorithmID,parameters), }, - { 0 } -}; - -SECOidTag -SECOID_GetAlgorithmTag(const SECAlgorithmID *id) -{ - if (id == NULL || id->algorithm.Data == NULL) - return SEC_OID_UNKNOWN; - - return SECOID_FindOIDTag (&(id->algorithm)); -} - -SECStatus -SECOID_SetAlgorithmID(PRArenaPool *arena, SECAlgorithmID *id, SECOidTag which, - SECItem *params) -{ - SECOidData *oiddata; - Boolean add_null_param; - - oiddata = SECOID_FindOIDByTag(which); - if ( !oiddata ) - { - PORT_SetError(SEC_ERROR_INVALID_ALGORITHM); - return SECFailure; - } - - if (SECITEM_CopyItem(arena, &id->algorithm, &oiddata->oid)) - return SECFailure; - - switch (which) - { - case SEC_OID_MD2: - case SEC_OID_MD4: - case SEC_OID_MD5: - case SEC_OID_SHA1: - case SEC_OID_SHA256: - case SEC_OID_SHA384: - case SEC_OID_SHA512: - case SEC_OID_PKCS1_RSA_ENCRYPTION: - case SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION: - case SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION: - case SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION: - case SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION: - case SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION: - case SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION: - case SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION: - add_null_param = PR_TRUE; - break; - default: - add_null_param = PR_FALSE; - break; - } - - if (params) { - /* - * I am specifically *not* enforcing the following assertion - * (by following it up with an error and a return of failure) - * because I do not want to introduce any change in the current - * behavior. But I do want for us to notice if the following is - * ever true, because I do not think it should be so and probably - * signifies an error/bug somewhere. - * This assertion removed Sep 9 2008 by dmitch, we really do need - * to be able to do this for an odd SEC_OID_EC_PUBLIC_KEY case. - * - PORT_Assert(!add_null_param || (params->Length == 2 - && params->Data[0] == SEC_ASN1_NULL - && params->Data[1] == 0)); - */ - if (SECITEM_CopyItem(arena, &id->parameters, params)) { - return SECFailure; - } - } else { - /* - * Again, this is not considered an error. But if we assume - * that nobody tries to set the parameters field themselves - * (but always uses this routine to do that), then we should - * not hit the following assertion. Unless they forgot to zero - * the structure, which could also be a bad (and wrong) thing. - */ - PORT_Assert(id->parameters.Data == NULL); - - if (add_null_param) { - (void) SECITEM_AllocItem(arena, &id->parameters, 2); - if (id->parameters.Data == NULL) { - return SECFailure; - } - id->parameters.Data[0] = SEC_ASN1_NULL; - id->parameters.Data[1] = 0; - } - } - - return SECSuccess; -} - -SECStatus -SECOID_CopyAlgorithmID(PRArenaPool *arena, SECAlgorithmID *to, const SECAlgorithmID *from) -{ - SECStatus rv; - - rv = SECITEM_CopyItem(arena, &to->algorithm, &from->algorithm); - if (rv) return rv; - rv = SECITEM_CopyItem(arena, &to->parameters, &from->parameters); - return rv; -} - -void SECOID_DestroyAlgorithmID(SECAlgorithmID *algid, Boolean freeit) -{ - SECITEM_FreeItem(&algid->parameters, PR_FALSE); - SECITEM_FreeItem(&algid->algorithm, PR_FALSE); - if(freeit == PR_TRUE) - PORT_Free(algid); -} - -SECComparison -SECOID_CompareAlgorithmID(const SECAlgorithmID *a, const SECAlgorithmID *b) -{ - SECComparison rv; - - rv = SECITEM_CompareItem(&a->algorithm, &b->algorithm); - if (rv) return rv; - rv = SECITEM_CompareItem(&a->parameters, &b->parameters); - return rv; -} - -/* This functions simply returns the address of the above-declared template. */ -SEC_ASN1_CHOOSER_IMPLEMENT(SECOID_AlgorithmIDTemplate) -