#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
#pragma warning disable
using System;
using System.IO;
using System.Threading;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls
{
internal abstract class AbstractTlsContext
: TlsContext
{
private static long counter = Times.NanoTime();
#if NETCF_1_0
private static object counterLock = new object();
private static long NextCounterValue()
{
lock (counterLock)
{
return ++counter;
}
}
#else
private static long NextCounterValue()
{
return Interlocked.Increment(ref counter);
}
#endif
private static TlsNonceGenerator CreateNonceGenerator(TlsCrypto crypto, int connectionEnd)
{
byte[] additionalSeedMaterial = new byte[16];
Pack.UInt64_To_BE((ulong)NextCounterValue(), additionalSeedMaterial, 0);
Pack.UInt64_To_BE((ulong)Times.NanoTime(), additionalSeedMaterial, 8);
additionalSeedMaterial[0] &= 0x7F;
additionalSeedMaterial[0] |= (byte)(connectionEnd << 7);
return crypto.CreateNonceGenerator(additionalSeedMaterial);
}
private readonly TlsCrypto m_crypto;
private readonly int m_connectionEnd;
private readonly TlsNonceGenerator m_nonceGenerator;
private SecurityParameters m_securityParameters = null;
private ProtocolVersion[] m_clientSupportedVersions = null;
private ProtocolVersion m_clientVersion = null;
private ProtocolVersion m_rsaPreMasterSecretVersion = null;
private TlsSession m_session = null;
private object m_userObject = null;
private bool m_connected = false;
internal AbstractTlsContext(TlsCrypto crypto, int connectionEnd)
{
this.m_crypto = crypto;
this.m_connectionEnd = connectionEnd;
this.m_nonceGenerator = CreateNonceGenerator(crypto, connectionEnd);
}
///
internal void HandshakeBeginning(TlsPeer peer)
{
lock (this)
{
//if (null != m_securityParameters)
// throw new TlsFatalAlert(AlertDescription.internal_error, "Handshake already started");
var tmp = this.m_securityParameters;
m_securityParameters = new SecurityParameters();
m_securityParameters.m_entity = m_connectionEnd;
if (tmp != null)
{
this.m_securityParameters.IsRenegotiating = true;
this.m_securityParameters.m_secureRenegotiation = tmp.m_secureRenegotiation;
this.m_securityParameters.m_negotiatedVersion = tmp.m_negotiatedVersion;
this.m_securityParameters.m_localVerifyData = tmp.m_localVerifyData;
this.m_securityParameters.m_peerVerifyData = tmp.m_peerVerifyData;
this.m_securityParameters.PreRenegotiatingServerCert = tmp.m_peerCertificate;
}
}
peer.NotifyHandshakeBeginning();
}
///
internal void HandshakeComplete(TlsPeer peer, TlsSession session)
{
lock (this)
{
if (null == m_securityParameters)
throw new TlsFatalAlert(AlertDescription.internal_error);
this.m_session = session;
this.m_connected = true;
}
peer.NotifyHandshakeComplete();
}
internal bool IsConnected
{
get { lock (this) return m_connected; }
}
internal bool IsHandshaking
{
get { lock (this) return !m_connected && null != m_securityParameters; }
}
public TlsCrypto Crypto
{
get { return m_crypto; }
}
public virtual TlsNonceGenerator NonceGenerator
{
get { return m_nonceGenerator; }
}
public SecurityParameters SecurityParameters
{
get { lock (this) return m_securityParameters; }
}
public abstract bool IsServer { get; }
public virtual ProtocolVersion[] ClientSupportedVersions
{
get { return m_clientSupportedVersions; }
}
internal void SetClientSupportedVersions(ProtocolVersion[] clientSupportedVersions)
{
this.m_clientSupportedVersions = clientSupportedVersions;
}
public virtual ProtocolVersion ClientVersion
{
get { return m_clientVersion; }
}
internal void SetClientVersion(ProtocolVersion clientVersion)
{
this.m_clientVersion = clientVersion;
}
public virtual ProtocolVersion RsaPreMasterSecretVersion
{
get { return m_rsaPreMasterSecretVersion; }
}
internal void SetRsaPreMasterSecretVersion(ProtocolVersion rsaPreMasterSecretVersion)
{
this.m_rsaPreMasterSecretVersion = rsaPreMasterSecretVersion;
}
public virtual ProtocolVersion ServerVersion
{
get { return SecurityParameters.NegotiatedVersion; }
}
public virtual TlsSession ResumableSession
{
get
{
TlsSession session = Session;
if (session == null || !session.IsResumable)
return null;
return session;
}
}
public virtual TlsSession Session
{
get { return m_session; }
}
public virtual object UserObject
{
get { return m_userObject; }
set { this.m_userObject = value; }
}
public virtual byte[] ExportChannelBinding(int channelBinding)
{
if (!IsConnected)
throw new InvalidOperationException("Export of channel bindings unavailable before handshake completion");
SecurityParameters securityParameters = SecurityParameters;
if (TlsUtilities.IsTlsV13(securityParameters.NegotiatedVersion))
return null;
switch (channelBinding)
{
case ChannelBinding.tls_server_end_point:
{
byte[] tlsServerEndPoint = securityParameters.TlsServerEndPoint;
return TlsUtilities.IsNullOrEmpty(tlsServerEndPoint) ? null : Arrays.Clone(tlsServerEndPoint);
}
case ChannelBinding.tls_unique:
{
return Arrays.Clone(securityParameters.TlsUnique);
}
case ChannelBinding.tls_unique_for_telnet:
default:
throw new NotSupportedException();
}
}
public virtual byte[] ExportEarlyKeyingMaterial(string asciiLabel, byte[] context, int length)
{
// TODO[tls13] Ensure early_exporter_master_secret is available suitably early!
if (!IsConnected)
throw new InvalidOperationException("Export of early key material only available during handshake");
SecurityParameters sp = SecurityParameters;
return ExportKeyingMaterial13(CheckEarlyExportSecret(sp.EarlyExporterMasterSecret),
sp.PrfCryptoHashAlgorithm, asciiLabel, context, length);
}
public virtual byte[] ExportKeyingMaterial(string asciiLabel, byte[] context, int length)
{
if (!IsConnected)
throw new InvalidOperationException("Export of key material unavailable before handshake completion");
/*
* TODO[tls13] Introduce a TlsExporter interface? Avoid calculating (early) exporter
* secret(s) unless the peer actually uses it.
*/
SecurityParameters sp = SecurityParameters;
if (!sp.IsExtendedMasterSecret)
{
/*
* RFC 7627 5.4. If a client or server chooses to continue with a full handshake without
* the extended master secret extension, [..] the client or server MUST NOT export any
* key material based on the new master secret for any subsequent application-level
* authentication. In particular, it MUST disable [RFC5705] [..].
*/
throw new InvalidOperationException("Export of key material requires extended_master_secret");
}
if (TlsUtilities.IsTlsV13(sp.NegotiatedVersion))
{
return ExportKeyingMaterial13(CheckExportSecret(sp.ExporterMasterSecret), sp.PrfCryptoHashAlgorithm,
asciiLabel, context, length);
}
byte[] seed = TlsUtilities.CalculateExporterSeed(sp, context);
return TlsUtilities.Prf(sp, CheckExportSecret(sp.MasterSecret), asciiLabel, seed, length).Extract();
}
protected virtual byte[] ExportKeyingMaterial13(TlsSecret secret, int cryptoHashAlgorithm, string asciiLabel,
byte[] context, int length)
{
if (null == context)
{
context = TlsUtilities.EmptyBytes;
}
else if (!TlsUtilities.IsValidUint16(context.Length))
{
throw new ArgumentException("must have length less than 2^16 (or be null)", "context");
}
return TlsCryptoUtilities.HkdfExpandLabel(secret, cryptoHashAlgorithm, asciiLabel, context, length)
.Extract();
}
protected virtual TlsSecret CheckEarlyExportSecret(TlsSecret secret)
{
if (null == secret)
{
// TODO[tls13] For symmetry with normal export, ideally available for NotifyHandshakeBeginning() only
//throw new InvalidOperationException("Export of early key material only available from NotifyHandshakeBeginning()");
throw new InvalidOperationException("Export of early key material not available for this handshake");
}
return secret;
}
protected virtual TlsSecret CheckExportSecret(TlsSecret secret)
{
if (null == secret)
throw new InvalidOperationException(
"Export of key material only available from NotifyHandshakeComplete()");
return secret;
}
}
}
#pragma warning restore
#endif