You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
125 lines
4.4 KiB
125 lines
4.4 KiB
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) |
|
#pragma warning disable |
|
using System; |
|
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities; |
|
|
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl |
|
{ |
|
/// <summary>A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest.</summary> |
|
public class TlsSuiteHmac |
|
: TlsSuiteMac |
|
{ |
|
protected static int GetMacSize(TlsCryptoParameters cryptoParams, TlsMac mac) |
|
{ |
|
int macSize = mac.MacLength; |
|
if (cryptoParams.SecurityParameters.IsTruncatedHmac) |
|
{ |
|
macSize = System.Math.Min(macSize, 10); |
|
} |
|
return macSize; |
|
} |
|
|
|
protected readonly TlsCryptoParameters m_cryptoParams; |
|
protected readonly TlsHmac m_mac; |
|
protected readonly int m_digestBlockSize; |
|
protected readonly int m_digestOverhead; |
|
protected readonly int m_macSize; |
|
|
|
/// <summary>Generate a new instance of a TlsMac.</summary> |
|
/// <param name="cryptoParams">the TLS client context specific crypto parameters.</param> |
|
/// <param name="mac">The MAC to use.</param> |
|
public TlsSuiteHmac(TlsCryptoParameters cryptoParams, TlsHmac mac) |
|
{ |
|
this.m_cryptoParams = cryptoParams; |
|
this.m_mac = mac; |
|
this.m_macSize = GetMacSize(cryptoParams, mac); |
|
this.m_digestBlockSize = mac.InternalBlockSize; |
|
|
|
// TODO This should check the actual algorithm, not assume based on the digest size |
|
if (TlsImplUtilities.IsSsl(cryptoParams) && mac.MacLength == 20) |
|
{ |
|
/* |
|
* NOTE: For the SSL 3.0 MAC with SHA-1, the secret + input pad is not block-aligned. |
|
*/ |
|
this.m_digestOverhead = 4; |
|
} |
|
else |
|
{ |
|
this.m_digestOverhead = m_digestBlockSize / 8; |
|
} |
|
} |
|
|
|
public virtual int Size |
|
{ |
|
get { return m_macSize; } |
|
} |
|
|
|
public virtual byte[] CalculateMac(long seqNo, short type, byte[] msg, int msgOff, int msgLen) |
|
{ |
|
ProtocolVersion serverVersion = m_cryptoParams.ServerVersion; |
|
bool isSsl = serverVersion.IsSsl; |
|
|
|
byte[] macHeader = new byte[isSsl ? 11 : 13]; |
|
TlsUtilities.WriteUint64(seqNo, macHeader, 0); |
|
TlsUtilities.WriteUint8(type, macHeader, 8); |
|
if (!isSsl) |
|
{ |
|
TlsUtilities.WriteVersion(serverVersion, macHeader, 9); |
|
} |
|
TlsUtilities.WriteUint16(msgLen, macHeader, macHeader.Length - 2); |
|
|
|
m_mac.Update(macHeader, 0, macHeader.Length); |
|
m_mac.Update(msg, msgOff, msgLen); |
|
|
|
return Truncate(m_mac.CalculateMac()); |
|
} |
|
|
|
public virtual byte[] CalculateMacConstantTime(long seqNo, short type, byte[] msg, int msgOff, int msgLen, |
|
int fullLength, byte[] dummyData) |
|
{ |
|
/* |
|
* Actual MAC only calculated on 'length' bytes... |
|
*/ |
|
byte[] result = CalculateMac(seqNo, type, msg, msgOff, msgLen); |
|
|
|
/* |
|
* ...but ensure a constant number of complete digest blocks are processed (as many as would |
|
* be needed for 'fullLength' bytes of input). |
|
*/ |
|
int headerLength = TlsImplUtilities.IsSsl(m_cryptoParams) ? 11 : 13; |
|
|
|
// How many extra full blocks do we need to calculate? |
|
int extra = GetDigestBlockCount(headerLength + fullLength) - GetDigestBlockCount(headerLength + msgLen); |
|
|
|
while (--extra >= 0) |
|
{ |
|
m_mac.Update(dummyData, 0, m_digestBlockSize); |
|
} |
|
|
|
// One more byte in case the implementation is "lazy" about processing blocks |
|
m_mac.Update(dummyData, 0, 1); |
|
m_mac.Reset(); |
|
|
|
return result; |
|
} |
|
|
|
protected virtual int GetDigestBlockCount(int inputLength) |
|
{ |
|
// NOTE: The input pad for HMAC is always a full digest block |
|
|
|
// NOTE: This calculation assumes a minimum of 1 pad byte |
|
return (inputLength + m_digestOverhead) / m_digestBlockSize; |
|
} |
|
|
|
protected virtual byte[] Truncate(byte[] bs) |
|
{ |
|
if (bs.Length <= m_macSize) |
|
return bs; |
|
|
|
return Arrays.CopyOf(bs, m_macSize); |
|
} |
|
} |
|
} |
|
#pragma warning restore |
|
#endif
|
|
|