#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) #pragma warning disable using System; using System.IO; using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities; namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls { /// RFC 6066 5. public sealed class UrlAndHash { private readonly string m_url; private readonly byte[] m_sha1Hash; public UrlAndHash(string url, byte[] sha1Hash) { if (TlsUtilities.IsNullOrEmpty(url) || url.Length >= (1 << 16)) throw new ArgumentException("must have length from 1 to (2^16 - 1)", "url"); if (sha1Hash != null && sha1Hash.Length != 20) throw new ArgumentException("must have length == 20, if present", "sha1Hash"); this.m_url = url; this.m_sha1Hash = sha1Hash; } public string Url { get { return m_url; } } public byte[] Sha1Hash { get { return m_sha1Hash; } } /// Encode this to a . /// the to encode to. /// public void Encode(Stream output) { byte[] urlEncoding = Strings.ToByteArray(m_url); TlsUtilities.WriteOpaque16(urlEncoding, output); if (m_sha1Hash == null) { TlsUtilities.WriteUint8(0, output); } else { TlsUtilities.WriteUint8(1, output); output.Write(m_sha1Hash, 0, m_sha1Hash.Length); } } /// Parse a from a . /// the of the current connection. /// the to parse from. /// a object. /// public static UrlAndHash Parse(TlsContext context, Stream input) { byte[] urlEncoding = TlsUtilities.ReadOpaque16(input, 1); string url = Strings.FromByteArray(urlEncoding); byte[] sha1Hash = null; short padding = TlsUtilities.ReadUint8(input); switch (padding) { case 0: if (TlsUtilities.IsTlsV12(context)) throw new TlsFatalAlert(AlertDescription.illegal_parameter); break; case 1: sha1Hash = TlsUtilities.ReadFully(20, input); break; default: throw new TlsFatalAlert(AlertDescription.illegal_parameter); } return new UrlAndHash(url, sha1Hash); } } } #pragma warning restore #endif