培训考核三期,新版培训,网页版培训登录器
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

145 lines
4.7 KiB

#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
#pragma warning disable
using System;
using System.IO;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO;
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls
{
/// <summary>(D)TLS ECDHE key exchange (see RFC 4492).</summary>
public class TlsECDheKeyExchange
: AbstractTlsKeyExchange
{
private static int CheckKeyExchange(int keyExchange)
{
switch (keyExchange)
{
case KeyExchangeAlgorithm.ECDHE_ECDSA:
case KeyExchangeAlgorithm.ECDHE_RSA:
return keyExchange;
default:
throw new ArgumentException("unsupported key exchange algorithm", "keyExchange");
}
}
protected TlsECConfig m_ecConfig;
protected TlsCredentialedSigner m_serverCredentials = null;
protected TlsCertificate m_serverCertificate = null;
protected TlsAgreement m_agreement;
public TlsECDheKeyExchange(int keyExchange)
: this(keyExchange, null)
{
}
public TlsECDheKeyExchange(int keyExchange, TlsECConfig ecConfig)
: base(CheckKeyExchange(keyExchange))
{
this.m_ecConfig = ecConfig;
}
public override void SkipServerCredentials()
{
throw new TlsFatalAlert(AlertDescription.internal_error);
}
public override void ProcessServerCredentials(TlsCredentials serverCredentials)
{
this.m_serverCredentials = TlsUtilities.RequireSignerCredentials(serverCredentials);
}
public override void ProcessServerCertificate(Certificate serverCertificate)
{
this.m_serverCertificate = serverCertificate.GetCertificateAt(0);
}
public override bool RequiresServerKeyExchange
{
get { return true; }
}
public override byte[] GenerateServerKeyExchange()
{
DigestInputBuffer digestBuffer = new DigestInputBuffer();
TlsEccUtilities.WriteECConfig(m_ecConfig, digestBuffer);
this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH();
GenerateEphemeral(digestBuffer);
TlsUtilities.GenerateServerKeyExchangeSignature(m_context, m_serverCredentials, null, digestBuffer);
return digestBuffer.ToArray();
}
public override void ProcessServerKeyExchange(Stream input)
{
DigestInputBuffer digestBuffer = new DigestInputBuffer();
Stream teeIn = new TeeInputStream(input, digestBuffer);
this.m_ecConfig = TlsEccUtilities.ReceiveECDHConfig(m_context, teeIn);
byte[] point = TlsUtilities.ReadOpaque8(teeIn, 1);
TlsUtilities.VerifyServerKeyExchangeSignature(m_context, input, m_serverCertificate, null, digestBuffer);
this.m_agreement = m_context.Crypto.CreateECDomain(m_ecConfig).CreateECDH();
ProcessEphemeral(point);
}
public override short[] GetClientCertificateTypes()
{
/*
* RFC 4492 3. [...] The ECDSA_fixed_ECDH and RSA_fixed_ECDH mechanisms are usable with
* ECDH_ECDSA and ECDH_RSA. Their use with ECDHE_ECDSA and ECDHE_RSA is prohibited because
* the use of a long-term ECDH client key would jeopardize the forward secrecy property of
* these algorithms.
*/
return new short[]{ ClientCertificateType.dss_sign, ClientCertificateType.ecdsa_sign,
ClientCertificateType.rsa_sign };
}
public override void ProcessClientCredentials(TlsCredentials clientCredentials)
{
TlsUtilities.RequireSignerCredentials(clientCredentials);
}
public override void GenerateClientKeyExchange(Stream output)
{
GenerateEphemeral(output);
}
public override void ProcessClientKeyExchange(Stream input)
{
byte[] point = TlsUtilities.ReadOpaque8(input, 1);
ProcessEphemeral(point);
}
public override TlsSecret GeneratePreMasterSecret()
{
return m_agreement.CalculateSecret();
}
protected virtual void GenerateEphemeral(Stream output)
{
byte[] point = m_agreement.GenerateEphemeral();
TlsUtilities.WriteOpaque8(point, output);
}
protected virtual void ProcessEphemeral(byte[] point)
{
TlsEccUtilities.CheckPointEncoding(m_ecConfig.NamedGroup, point);
this.m_agreement.ReceivePeerValue(point);
}
}
}
#pragma warning restore
#endif