You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
108 lines
3.9 KiB
108 lines
3.9 KiB
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) |
|
#pragma warning disable |
|
using System; |
|
using System.IO; |
|
|
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl |
|
{ |
|
/// <summary>The NULL cipher.</summary> |
|
public class TlsNullCipher |
|
: TlsCipher |
|
{ |
|
protected readonly TlsCryptoParameters m_cryptoParams; |
|
protected readonly TlsSuiteHmac m_readMac, m_writeMac; |
|
|
|
/// <exception cref="IOException"/> |
|
public TlsNullCipher(TlsCryptoParameters cryptoParams, TlsHmac clientMac, TlsHmac serverMac) |
|
{ |
|
if (TlsImplUtilities.IsTlsV13(cryptoParams)) |
|
throw new TlsFatalAlert(AlertDescription.internal_error); |
|
|
|
this.m_cryptoParams = cryptoParams; |
|
|
|
int key_block_size = clientMac.MacLength + serverMac.MacLength; |
|
byte[] key_block = TlsImplUtilities.CalculateKeyBlock(cryptoParams, key_block_size); |
|
|
|
int offset = 0; |
|
|
|
clientMac.SetKey(key_block, offset, clientMac.MacLength); |
|
offset += clientMac.MacLength; |
|
serverMac.SetKey(key_block, offset, serverMac.MacLength); |
|
offset += serverMac.MacLength; |
|
|
|
if (offset != key_block_size) |
|
throw new TlsFatalAlert(AlertDescription.internal_error); |
|
|
|
if (cryptoParams.IsServer) |
|
{ |
|
this.m_writeMac = new TlsSuiteHmac(cryptoParams, serverMac); |
|
this.m_readMac = new TlsSuiteHmac(cryptoParams, clientMac); |
|
} |
|
else |
|
{ |
|
this.m_writeMac = new TlsSuiteHmac(cryptoParams, clientMac); |
|
this.m_readMac = new TlsSuiteHmac(cryptoParams, serverMac); |
|
} |
|
} |
|
|
|
public virtual int GetCiphertextDecodeLimit(int plaintextLimit) |
|
{ |
|
return plaintextLimit + m_writeMac.Size; |
|
} |
|
|
|
public virtual int GetCiphertextEncodeLimit(int plaintextLength, int plaintextLimit) |
|
{ |
|
return plaintextLength + m_writeMac.Size; |
|
} |
|
|
|
public virtual int GetPlaintextLimit(int ciphertextLimit) |
|
{ |
|
return ciphertextLimit - m_writeMac.Size; |
|
} |
|
|
|
public virtual TlsEncodeResult EncodePlaintext(long seqNo, short contentType, ProtocolVersion recordVersion, |
|
int headerAllocation, byte[] plaintext, int offset, int len) |
|
{ |
|
byte[] mac = m_writeMac.CalculateMac(seqNo, contentType, plaintext, offset, len); |
|
byte[] ciphertext = new byte[headerAllocation + len + mac.Length]; |
|
Array.Copy(plaintext, offset, ciphertext, headerAllocation, len); |
|
Array.Copy(mac, 0, ciphertext, headerAllocation + len, mac.Length); |
|
return new TlsEncodeResult(ciphertext, 0, ciphertext.Length, contentType); |
|
} |
|
|
|
public virtual TlsDecodeResult DecodeCiphertext(long seqNo, short recordType, ProtocolVersion recordVersion, |
|
byte[] ciphertext, int offset, int len) |
|
{ |
|
int macSize = m_readMac.Size; |
|
if (len < macSize) |
|
throw new TlsFatalAlert(AlertDescription.decode_error); |
|
|
|
int macInputLen = len - macSize; |
|
|
|
byte[] expectedMac = m_readMac.CalculateMac(seqNo, recordType, ciphertext, offset, macInputLen); |
|
|
|
bool badMac = !TlsUtilities.ConstantTimeAreEqual(macSize, expectedMac, 0, ciphertext, offset + macInputLen); |
|
if (badMac) |
|
throw new TlsFatalAlert(AlertDescription.bad_record_mac); |
|
|
|
return new TlsDecodeResult(ciphertext, offset, macInputLen, recordType); |
|
} |
|
|
|
public virtual void RekeyDecoder() |
|
{ |
|
throw new TlsFatalAlert(AlertDescription.internal_error); |
|
} |
|
|
|
public virtual void RekeyEncoder() |
|
{ |
|
throw new TlsFatalAlert(AlertDescription.internal_error); |
|
} |
|
|
|
public virtual bool UsesOpaqueRecordType |
|
{ |
|
get { return false; } |
|
} |
|
} |
|
} |
|
#pragma warning restore |
|
#endif
|
|
|