培训考核三期,新版培训,网页版培训登录器
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

125 lines
4.4 KiB

#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
#pragma warning disable
using System;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl
{
/// <summary>A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest.</summary>
public class TlsSuiteHmac
: TlsSuiteMac
{
protected static int GetMacSize(TlsCryptoParameters cryptoParams, TlsMac mac)
{
int macSize = mac.MacLength;
if (cryptoParams.SecurityParameters.IsTruncatedHmac)
{
macSize = System.Math.Min(macSize, 10);
}
return macSize;
}
protected readonly TlsCryptoParameters m_cryptoParams;
protected readonly TlsHmac m_mac;
protected readonly int m_digestBlockSize;
protected readonly int m_digestOverhead;
protected readonly int m_macSize;
/// <summary>Generate a new instance of a TlsMac.</summary>
/// <param name="cryptoParams">the TLS client context specific crypto parameters.</param>
/// <param name="mac">The MAC to use.</param>
public TlsSuiteHmac(TlsCryptoParameters cryptoParams, TlsHmac mac)
{
this.m_cryptoParams = cryptoParams;
this.m_mac = mac;
this.m_macSize = GetMacSize(cryptoParams, mac);
this.m_digestBlockSize = mac.InternalBlockSize;
// TODO This should check the actual algorithm, not assume based on the digest size
if (TlsImplUtilities.IsSsl(cryptoParams) && mac.MacLength == 20)
{
/*
* NOTE: For the SSL 3.0 MAC with SHA-1, the secret + input pad is not block-aligned.
*/
this.m_digestOverhead = 4;
}
else
{
this.m_digestOverhead = m_digestBlockSize / 8;
}
}
public virtual int Size
{
get { return m_macSize; }
}
public virtual byte[] CalculateMac(long seqNo, short type, byte[] msg, int msgOff, int msgLen)
{
ProtocolVersion serverVersion = m_cryptoParams.ServerVersion;
bool isSsl = serverVersion.IsSsl;
byte[] macHeader = new byte[isSsl ? 11 : 13];
TlsUtilities.WriteUint64(seqNo, macHeader, 0);
TlsUtilities.WriteUint8(type, macHeader, 8);
if (!isSsl)
{
TlsUtilities.WriteVersion(serverVersion, macHeader, 9);
}
TlsUtilities.WriteUint16(msgLen, macHeader, macHeader.Length - 2);
m_mac.Update(macHeader, 0, macHeader.Length);
m_mac.Update(msg, msgOff, msgLen);
return Truncate(m_mac.CalculateMac());
}
public virtual byte[] CalculateMacConstantTime(long seqNo, short type, byte[] msg, int msgOff, int msgLen,
int fullLength, byte[] dummyData)
{
/*
* Actual MAC only calculated on 'length' bytes...
*/
byte[] result = CalculateMac(seqNo, type, msg, msgOff, msgLen);
/*
* ...but ensure a constant number of complete digest blocks are processed (as many as would
* be needed for 'fullLength' bytes of input).
*/
int headerLength = TlsImplUtilities.IsSsl(m_cryptoParams) ? 11 : 13;
// How many extra full blocks do we need to calculate?
int extra = GetDigestBlockCount(headerLength + fullLength) - GetDigestBlockCount(headerLength + msgLen);
while (--extra >= 0)
{
m_mac.Update(dummyData, 0, m_digestBlockSize);
}
// One more byte in case the implementation is "lazy" about processing blocks
m_mac.Update(dummyData, 0, 1);
m_mac.Reset();
return result;
}
protected virtual int GetDigestBlockCount(int inputLength)
{
// NOTE: The input pad for HMAC is always a full digest block
// NOTE: This calculation assumes a minimum of 1 pad byte
return (inputLength + m_digestOverhead) / m_digestBlockSize;
}
protected virtual byte[] Truncate(byte[] bs)
{
if (bs.Length <= m_macSize)
return bs;
return Arrays.CopyOf(bs, m_macSize);
}
}
}
#pragma warning restore
#endif