123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl
- {
- /// <summary>A generic TLS MAC implementation, acting as an HMAC based on some underlying Digest.</summary>
- public class TlsSuiteHmac
- : TlsSuiteMac
- {
- protected static int GetMacSize(TlsCryptoParameters cryptoParams, TlsMac mac)
- {
- int macSize = mac.MacLength;
- if (cryptoParams.SecurityParameters.IsTruncatedHmac)
- {
- macSize = System.Math.Min(macSize, 10);
- }
- return macSize;
- }
- protected readonly TlsCryptoParameters m_cryptoParams;
- protected readonly TlsHmac m_mac;
- protected readonly int m_digestBlockSize;
- protected readonly int m_digestOverhead;
- protected readonly int m_macSize;
- /// <summary>Generate a new instance of a TlsMac.</summary>
- /// <param name="cryptoParams">the TLS client context specific crypto parameters.</param>
- /// <param name="mac">The MAC to use.</param>
- public TlsSuiteHmac(TlsCryptoParameters cryptoParams, TlsHmac mac)
- {
- this.m_cryptoParams = cryptoParams;
- this.m_mac = mac;
- this.m_macSize = GetMacSize(cryptoParams, mac);
- this.m_digestBlockSize = mac.InternalBlockSize;
- // TODO This should check the actual algorithm, not assume based on the digest size
- if (TlsImplUtilities.IsSsl(cryptoParams) && mac.MacLength == 20)
- {
- /*
- * NOTE: For the SSL 3.0 MAC with SHA-1, the secret + input pad is not block-aligned.
- */
- this.m_digestOverhead = 4;
- }
- else
- {
- this.m_digestOverhead = m_digestBlockSize / 8;
- }
- }
- public virtual int Size
- {
- get { return m_macSize; }
- }
- public virtual byte[] CalculateMac(long seqNo, short type, byte[] msg, int msgOff, int msgLen)
- {
- ProtocolVersion serverVersion = m_cryptoParams.ServerVersion;
- bool isSsl = serverVersion.IsSsl;
- byte[] macHeader = new byte[isSsl ? 11 : 13];
- TlsUtilities.WriteUint64(seqNo, macHeader, 0);
- TlsUtilities.WriteUint8(type, macHeader, 8);
- if (!isSsl)
- {
- TlsUtilities.WriteVersion(serverVersion, macHeader, 9);
- }
- TlsUtilities.WriteUint16(msgLen, macHeader, macHeader.Length - 2);
- m_mac.Update(macHeader, 0, macHeader.Length);
- m_mac.Update(msg, msgOff, msgLen);
- return Truncate(m_mac.CalculateMac());
- }
- public virtual byte[] CalculateMacConstantTime(long seqNo, short type, byte[] msg, int msgOff, int msgLen,
- int fullLength, byte[] dummyData)
- {
- /*
- * Actual MAC only calculated on 'length' bytes...
- */
- byte[] result = CalculateMac(seqNo, type, msg, msgOff, msgLen);
- /*
- * ...but ensure a constant number of complete digest blocks are processed (as many as would
- * be needed for 'fullLength' bytes of input).
- */
- int headerLength = TlsImplUtilities.IsSsl(m_cryptoParams) ? 11 : 13;
- // How many extra full blocks do we need to calculate?
- int extra = GetDigestBlockCount(headerLength + fullLength) - GetDigestBlockCount(headerLength + msgLen);
- while (--extra >= 0)
- {
- m_mac.Update(dummyData, 0, m_digestBlockSize);
- }
- // One more byte in case the implementation is "lazy" about processing blocks
- m_mac.Update(dummyData, 0, 1);
- m_mac.Reset();
- return result;
- }
- protected virtual int GetDigestBlockCount(int inputLength)
- {
- // NOTE: The input pad for HMAC is always a full digest block
- // NOTE: This calculation assumes a minimum of 1 pad byte
- return (inputLength + m_digestOverhead) / m_digestBlockSize;
- }
- protected virtual byte[] Truncate(byte[] bs)
- {
- if (bs.Length <= m_macSize)
- return bs;
- return Arrays.CopyOf(bs, m_macSize);
- }
- }
- }
- #pragma warning restore
- #endif
|