12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using System.Collections.Generic;
- using System.IO;
- using System.Net.Sockets;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Eac;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.EdEC;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Oiw;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Rosstandart;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Date;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO;
- namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls
- {
- public abstract class TlsUtilities
- {
- private static readonly byte[] DowngradeTlsV11 = Hex.DecodeStrict("444F574E47524400");
- private static readonly byte[] DowngradeTlsV12 = Hex.DecodeStrict("444F574E47524401");
- private static readonly IDictionary<string, SignatureAndHashAlgorithm> CertSigAlgOids = CreateCertSigAlgOids();
- private static readonly IList<SignatureAndHashAlgorithm> DefaultSupportedSigAlgs = CreateDefaultSupportedSigAlgs();
- private static void AddCertSigAlgOid(IDictionary<string, SignatureAndHashAlgorithm> d, DerObjectIdentifier oid,
- SignatureAndHashAlgorithm sigAndHash)
- {
- d[oid.Id] = sigAndHash;
- }
- private static void AddCertSigAlgOid(IDictionary<string, SignatureAndHashAlgorithm> d, DerObjectIdentifier oid,
- short hashAlgorithm, short signatureAlgorithm)
- {
- AddCertSigAlgOid(d, oid, SignatureAndHashAlgorithm.GetInstance(hashAlgorithm, signatureAlgorithm));
- }
- private static IDictionary<string, SignatureAndHashAlgorithm> CreateCertSigAlgOids()
- {
- var d = new Dictionary<string, SignatureAndHashAlgorithm>();
- AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha224, HashAlgorithm.sha224, SignatureAlgorithm.dsa);
- AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha256, HashAlgorithm.sha256, SignatureAlgorithm.dsa);
- AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha384, HashAlgorithm.sha384, SignatureAlgorithm.dsa);
- AddCertSigAlgOid(d, NistObjectIdentifiers.DsaWithSha512, HashAlgorithm.sha512, SignatureAlgorithm.dsa);
- AddCertSigAlgOid(d, OiwObjectIdentifiers.DsaWithSha1, HashAlgorithm.sha1, SignatureAlgorithm.dsa);
- AddCertSigAlgOid(d, OiwObjectIdentifiers.Sha1WithRsa, HashAlgorithm.sha1, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha1WithRsaEncryption, HashAlgorithm.sha1, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha224WithRsaEncryption, HashAlgorithm.sha224, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha256WithRsaEncryption, HashAlgorithm.sha256, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha384WithRsaEncryption, HashAlgorithm.sha384, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, PkcsObjectIdentifiers.Sha512WithRsaEncryption, HashAlgorithm.sha512, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha1, HashAlgorithm.sha1, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha224, HashAlgorithm.sha224, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha256, HashAlgorithm.sha256, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha384, HashAlgorithm.sha384, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, X9ObjectIdentifiers.ECDsaWithSha512, HashAlgorithm.sha512, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, X9ObjectIdentifiers.IdDsaWithSha1, HashAlgorithm.sha1, SignatureAlgorithm.dsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_1, HashAlgorithm.sha1, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_224, HashAlgorithm.sha224, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_256, HashAlgorithm.sha256, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_384, HashAlgorithm.sha384, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_ECDSA_SHA_512, HashAlgorithm.sha512, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_RSA_v1_5_SHA_1, HashAlgorithm.sha1, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, EacObjectIdentifiers.id_TA_RSA_v1_5_SHA_256, HashAlgorithm.sha256, SignatureAlgorithm.rsa);
- AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA1, HashAlgorithm.sha1, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA224, HashAlgorithm.sha224, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA256, HashAlgorithm.sha256, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA384, HashAlgorithm.sha384, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, BsiObjectIdentifiers.ecdsa_plain_SHA512, HashAlgorithm.sha512, SignatureAlgorithm.ecdsa);
- AddCertSigAlgOid(d, EdECObjectIdentifiers.id_Ed25519, SignatureAndHashAlgorithm.ed25519);
- AddCertSigAlgOid(d, EdECObjectIdentifiers.id_Ed448, SignatureAndHashAlgorithm.ed448);
- AddCertSigAlgOid(d, RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_256,
- SignatureAndHashAlgorithm.gostr34102012_256);
- AddCertSigAlgOid(d, RosstandartObjectIdentifiers.id_tc26_signwithdigest_gost_3410_12_512,
- SignatureAndHashAlgorithm.gostr34102012_512);
- // TODO[RFC 8998]
- //AddCertSigAlgOid(d, GMObjectIdentifiers.sm2sign_with_sm3, HashAlgorithm.sm3, SignatureAlgorithm.sm2);
- return d;
- }
- private static IList<SignatureAndHashAlgorithm> CreateDefaultSupportedSigAlgs()
- {
- var result = new List<SignatureAndHashAlgorithm>();
- result.Add(SignatureAndHashAlgorithm.ed25519);
- result.Add(SignatureAndHashAlgorithm.ed448);
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha256, SignatureAlgorithm.ecdsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha384, SignatureAlgorithm.ecdsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha512, SignatureAlgorithm.ecdsa));
- result.Add(SignatureAndHashAlgorithm.rsa_pss_rsae_sha256);
- result.Add(SignatureAndHashAlgorithm.rsa_pss_rsae_sha384);
- result.Add(SignatureAndHashAlgorithm.rsa_pss_rsae_sha512);
- result.Add(SignatureAndHashAlgorithm.rsa_pss_pss_sha256);
- result.Add(SignatureAndHashAlgorithm.rsa_pss_pss_sha384);
- result.Add(SignatureAndHashAlgorithm.rsa_pss_pss_sha512);
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha256, SignatureAlgorithm.rsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha384, SignatureAlgorithm.rsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha512, SignatureAlgorithm.rsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha256, SignatureAlgorithm.dsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha384, SignatureAlgorithm.dsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha512, SignatureAlgorithm.dsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha224, SignatureAlgorithm.ecdsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha224, SignatureAlgorithm.rsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha224, SignatureAlgorithm.dsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.ecdsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.rsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.dsa));
- return result;
- }
- public static readonly byte[] EmptyBytes = new byte[0];
- public static readonly short[] EmptyShorts = new short[0];
- public static readonly int[] EmptyInts = new int[0];
- public static readonly long[] EmptyLongs = new long[0];
- public static readonly string[] EmptyStrings = new string[0];
- internal static short MinimumHashStrict = HashAlgorithm.sha1;
- internal static short MinimumHashPreferred = HashAlgorithm.sha256;
- public static void CheckUint8(short i)
- {
- if (!IsValidUint8(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint8(int i)
- {
- if (!IsValidUint8(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint8(long i)
- {
- if (!IsValidUint8(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint16(int i)
- {
- if (!IsValidUint16(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint16(long i)
- {
- if (!IsValidUint16(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint24(int i)
- {
- if (!IsValidUint24(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint24(long i)
- {
- if (!IsValidUint24(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint32(long i)
- {
- if (!IsValidUint32(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint48(long i)
- {
- if (!IsValidUint48(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static void CheckUint64(long i)
- {
- if (!IsValidUint64(i))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- public static bool IsValidUint8(short i)
- {
- return (i & 0xFF) == i;
- }
- public static bool IsValidUint8(int i)
- {
- return (i & 0xFF) == i;
- }
- public static bool IsValidUint8(long i)
- {
- return (i & 0xFFL) == i;
- }
- public static bool IsValidUint16(int i)
- {
- return (i & 0xFFFF) == i;
- }
- public static bool IsValidUint16(long i)
- {
- return (i & 0xFFFFL) == i;
- }
- public static bool IsValidUint24(int i)
- {
- return (i & 0xFFFFFF) == i;
- }
- public static bool IsValidUint24(long i)
- {
- return (i & 0xFFFFFFL) == i;
- }
- public static bool IsValidUint32(long i)
- {
- return (i & 0xFFFFFFFFL) == i;
- }
- public static bool IsValidUint48(long i)
- {
- return (i & 0xFFFFFFFFFFFFL) == i;
- }
- public static bool IsValidUint64(long i)
- {
- return true;
- }
- public static bool IsSsl(TlsContext context)
- {
- return context.ServerVersion.IsSsl;
- }
- public static bool IsTlsV10(ProtocolVersion version)
- {
- return ProtocolVersion.TLSv10.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion());
- }
- public static bool IsTlsV10(TlsContext context)
- {
- return IsTlsV10(context.ServerVersion);
- }
- public static bool IsTlsV11(ProtocolVersion version)
- {
- return ProtocolVersion.TLSv11.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion());
- }
- public static bool IsTlsV11(TlsContext context)
- {
- return IsTlsV11(context.ServerVersion);
- }
- public static bool IsTlsV12(ProtocolVersion version)
- {
- return ProtocolVersion.TLSv12.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion());
- }
- public static bool IsTlsV12(TlsContext context)
- {
- return IsTlsV12(context.ServerVersion);
- }
- public static bool IsTlsV13(ProtocolVersion version)
- {
- return ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion());
- }
- public static bool IsTlsV13(TlsContext context)
- {
- return IsTlsV13(context.ServerVersion);
- }
- public static void WriteUint8(short i, Stream output)
- {
- output.WriteByte((byte)i);
- }
- public static void WriteUint8(int i, Stream output)
- {
- output.WriteByte((byte)i);
- }
- public static void WriteUint8(short i, byte[] buf, int offset)
- {
- buf[offset] = (byte)i;
- }
- public static void WriteUint8(int i, byte[] buf, int offset)
- {
- buf[offset] = (byte)i;
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static void WriteUint8(int i, Span<byte> buf)
- {
- buf[0] = (byte)i;
- }
- #endif
- public static void WriteUint16(int i, Stream output)
- {
- output.WriteByte((byte)(i >> 8));
- output.WriteByte((byte)i);
- }
- public static void WriteUint16(int i, byte[] buf, int offset)
- {
- buf[offset ] = (byte)(i >> 8);
- buf[offset + 1] = (byte)i;
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static void WriteUint16(int i, Span<byte> buf)
- {
- buf[0] = (byte)(i >> 8);
- buf[1] = (byte)i;
- }
- #endif
- public static void WriteUint24(int i, Stream output)
- {
- output.WriteByte((byte)(i >> 16));
- output.WriteByte((byte)(i >> 8));
- output.WriteByte((byte)i);
- }
- public static void WriteUint24(int i, byte[] buf, int offset)
- {
- buf[offset ] = (byte)(i >> 16);
- buf[offset + 1] = (byte)(i >> 8);
- buf[offset + 2] = (byte)i;
- }
- public static void WriteUint32(long i, Stream output)
- {
- output.WriteByte((byte)(i >> 24));
- output.WriteByte((byte)(i >> 16));
- output.WriteByte((byte)(i >> 8));
- output.WriteByte((byte)i);
- }
- public static void WriteUint32(long i, byte[] buf, int offset)
- {
- buf[offset ] = (byte)(i >> 24);
- buf[offset + 1] = (byte)(i >> 16);
- buf[offset + 2] = (byte)(i >> 8);
- buf[offset + 3] = (byte)i;
- }
- public static void WriteUint48(long i, Stream output)
- {
- output.WriteByte((byte)(i >> 40));
- output.WriteByte((byte)(i >> 32));
- output.WriteByte((byte)(i >> 24));
- output.WriteByte((byte)(i >> 16));
- output.WriteByte((byte)(i >> 8));
- output.WriteByte((byte)i);
- }
- public static void WriteUint48(long i, byte[] buf, int offset)
- {
- buf[offset ] = (byte)(i >> 40);
- buf[offset + 1] = (byte)(i >> 32);
- buf[offset + 2] = (byte)(i >> 24);
- buf[offset + 3] = (byte)(i >> 16);
- buf[offset + 4] = (byte)(i >> 8);
- buf[offset + 5] = (byte)i;
- }
- public static void WriteUint64(long i, Stream output)
- {
- output.WriteByte((byte)(i >> 56));
- output.WriteByte((byte)(i >> 48));
- output.WriteByte((byte)(i >> 40));
- output.WriteByte((byte)(i >> 32));
- output.WriteByte((byte)(i >> 24));
- output.WriteByte((byte)(i >> 16));
- output.WriteByte((byte)(i >> 8));
- output.WriteByte((byte) i);
- }
- public static void WriteUint64(long i, byte[] buf, int offset)
- {
- buf[offset ] = (byte)(i >> 56);
- buf[offset + 1] = (byte)(i >> 48);
- buf[offset + 2] = (byte)(i >> 40);
- buf[offset + 3] = (byte)(i >> 32);
- buf[offset + 4] = (byte)(i >> 24);
- buf[offset + 5] = (byte)(i >> 16);
- buf[offset + 6] = (byte)(i >> 8);
- buf[offset + 7] = (byte)i;
- }
- public static void WriteOpaque8(byte[] buf, Stream output)
- {
- CheckUint8(buf.Length);
- WriteUint8(buf.Length, output);
- output.Write(buf, 0, buf.Length);
- }
- public static void WriteOpaque8(byte[] data, byte[] buf, int off)
- {
- CheckUint8(data.Length);
- WriteUint8(data.Length, buf, off);
- Array.Copy(data, 0, buf, off + 1, data.Length);
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static void WriteOpaque8(ReadOnlySpan<byte> data, Span<byte> buf)
- {
- CheckUint8(data.Length);
- WriteUint8(data.Length, buf);
- data.CopyTo(buf[1..]);
- }
- #endif
- public static void WriteOpaque16(byte[] buf, Stream output)
- {
- CheckUint16(buf.Length);
- WriteUint16(buf.Length, output);
- output.Write(buf, 0, buf.Length);
- }
- public static void WriteOpaque16(byte[] data, byte[] buf, int off)
- {
- CheckUint16(data.Length);
- WriteUint16(data.Length, buf, off);
- Array.Copy(data, 0, buf, off + 2, data.Length);
- }
- public static void WriteOpaque24(byte[] buf, Stream output)
- {
- CheckUint24(buf.Length);
- WriteUint24(buf.Length, output);
- output.Write(buf, 0, buf.Length);
- }
- public static void WriteOpaque24(byte[] data, byte[] buf, int off)
- {
- CheckUint24(data.Length);
- WriteUint24(data.Length, buf, off);
- Array.Copy(data, 0, buf, off + 3, data.Length);
- }
- public static void WriteUint8Array(short[] u8s, Stream output)
- {
- for (int i = 0; i < u8s.Length; ++i)
- {
- WriteUint8(u8s[i], output);
- }
- }
- public static void WriteUint8Array(short[] u8s, byte[] buf, int offset)
- {
- for (int i = 0; i < u8s.Length; ++i)
- {
- WriteUint8(u8s[i], buf, offset);
- ++offset;
- }
- }
- public static void WriteUint8ArrayWithUint8Length(short[] u8s, Stream output)
- {
- CheckUint8(u8s.Length);
- WriteUint8(u8s.Length, output);
- WriteUint8Array(u8s, output);
- }
- public static void WriteUint8ArrayWithUint8Length(short[] u8s, byte[] buf, int offset)
- {
- CheckUint8(u8s.Length);
- WriteUint8(u8s.Length, buf, offset);
- WriteUint8Array(u8s, buf, offset + 1);
- }
- public static void WriteUint16Array(int[] u16s, Stream output)
- {
- for (int i = 0; i < u16s.Length; ++i)
- {
- WriteUint16(u16s[i], output);
- }
- }
- public static void WriteUint16Array(int[] u16s, byte[] buf, int offset)
- {
- for (int i = 0; i < u16s.Length; ++i)
- {
- WriteUint16(u16s[i], buf, offset);
- offset += 2;
- }
- }
- public static void WriteUint16ArrayWithUint8Length(int[] u16s, byte[] buf, int offset)
- {
- int length = 2 * u16s.Length;
- CheckUint8(length);
- WriteUint8(length, buf, offset);
- WriteUint16Array(u16s, buf, offset + 1);
- }
- public static void WriteUint16ArrayWithUint16Length(int[] u16s, Stream output)
- {
- int length = 2 * u16s.Length;
- CheckUint16(length);
- WriteUint16(length, output);
- WriteUint16Array(u16s, output);
- }
- public static void WriteUint16ArrayWithUint16Length(int[] u16s, byte[] buf, int offset)
- {
- int length = 2 * u16s.Length;
- CheckUint16(length);
- WriteUint16(length, buf, offset);
- WriteUint16Array(u16s, buf, offset + 2);
- }
- public static byte[] DecodeOpaque8(byte[] buf)
- {
- return DecodeOpaque8(buf, 0);
- }
- public static byte[] DecodeOpaque8(byte[] buf, int minLength)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- if (buf.Length < 1)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- short length = ReadUint8(buf, 0);
- if (buf.Length != (length + 1) || length < minLength)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return CopyOfRangeExact(buf, 1, buf.Length);
- }
- public static byte[] DecodeOpaque16(byte[] buf)
- {
- return DecodeOpaque16(buf, 0);
- }
- public static byte[] DecodeOpaque16(byte[] buf, int minLength)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- if (buf.Length < 2)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- int length = ReadUint16(buf, 0);
- if (buf.Length != (length + 2) || length < minLength)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return CopyOfRangeExact(buf, 2, buf.Length);
- }
- public static short DecodeUint8(byte[] buf)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- if (buf.Length != 1)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadUint8(buf, 0);
- }
- public static short[] DecodeUint8ArrayWithUint8Length(byte[] buf)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- int count = ReadUint8(buf, 0);
- if (buf.Length != (count + 1))
- throw new TlsFatalAlert(AlertDescription.decode_error);
- short[] uints = new short[count];
- for (int i = 0; i < count; ++i)
- {
- uints[i] = ReadUint8(buf, i + 1);
- }
- return uints;
- }
- public static int DecodeUint16(byte[] buf)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- if (buf.Length != 2)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadUint16(buf, 0);
- }
- public static int[] DecodeUint16ArrayWithUint8Length(byte[] buf)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- int length = ReadUint8(buf, 0);
- if (buf.Length != (length + 1) || (length & 1) != 0)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- int count = length / 2, pos = 1;
- int[] u16s = new int[count];
- for (int i = 0; i < count; ++i)
- {
- u16s[i] = ReadUint16(buf, pos);
- pos += 2;
- }
- return u16s;
- }
- public static long DecodeUint32(byte[] buf)
- {
- if (buf == null)
- throw new ArgumentNullException("buf");
- if (buf.Length != 4)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadUint32(buf, 0);
- }
- public static byte[] EncodeOpaque8(byte[] buf)
- {
- CheckUint8(buf.Length);
- return Arrays.Prepend(buf, (byte)buf.Length);
- }
- public static byte[] EncodeOpaque16(byte[] buf)
- {
- CheckUint16(buf.Length);
- byte[] r = new byte[2 + buf.Length];
- WriteUint16(buf.Length, r, 0);
- Array.Copy(buf, 0, r, 2, buf.Length);
- return r;
- }
- public static byte[] EncodeOpaque24(byte[] buf)
- {
- CheckUint24(buf.Length);
- byte[] r = new byte[3 + buf.Length];
- WriteUint24(buf.Length, r, 0);
- Array.Copy(buf, 0, r, 3, buf.Length);
- return r;
- }
- public static byte[] EncodeUint8(short u8)
- {
- CheckUint8(u8);
- byte[] encoding = new byte[1];
- WriteUint8(u8, encoding, 0);
- return encoding;
- }
- public static byte[] EncodeUint8ArrayWithUint8Length(short[] u8s)
- {
- byte[] result = new byte[1 + u8s.Length];
- WriteUint8ArrayWithUint8Length(u8s, result, 0);
- return result;
- }
- public static byte[] EncodeUint16(int u16)
- {
- CheckUint16(u16);
- byte[] encoding = new byte[2];
- WriteUint16(u16, encoding, 0);
- return encoding;
- }
- public static byte[] EncodeUint16ArrayWithUint8Length(int[] u16s)
- {
- int length = 2 * u16s.Length;
- byte[] result = new byte[1 + length];
- WriteUint16ArrayWithUint8Length(u16s, result, 0);
- return result;
- }
- public static byte[] EncodeUint16ArrayWithUint16Length(int[] u16s)
- {
- int length = 2 * u16s.Length;
- byte[] result = new byte[2 + length];
- WriteUint16ArrayWithUint16Length(u16s, result, 0);
- return result;
- }
- public static byte[] EncodeUint24(int u24)
- {
- CheckUint24(u24);
- byte[] encoding = new byte[3];
- WriteUint24(u24, encoding, 0);
- return encoding;
- }
- public static byte[] EncodeUint32(long u32)
- {
- CheckUint32(u32);
- byte[] encoding = new byte[4];
- WriteUint32(u32, encoding, 0);
- return encoding;
- }
- public static byte[] EncodeVersion(ProtocolVersion version)
- {
- return new byte[]{
- (byte)version.MajorVersion,
- (byte)version.MinorVersion
- };
- }
- public static int ReadInt32(byte[] buf, int offset)
- {
- int n = buf[offset] << 24;
- n |= (buf[++offset] & 0xff) << 16;
- n |= (buf[++offset] & 0xff) << 8;
- n |= (buf[++offset] & 0xff);
- return n;
- }
- public static short ReadUint8(Stream input)
- {
- int i = input.ReadByte();
- if (i < 0)
- throw new EndOfStreamException();
- return (short)i;
- }
- public static short ReadUint8(byte[] buf, int offset)
- {
- return (short)buf[offset];
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static short ReadUint8(ReadOnlySpan<byte> buffer)
- {
- return (short)buffer[0];
- }
- #endif
- public static int ReadUint16(Stream input)
- {
- int i1 = input.ReadByte();
- int i2 = input.ReadByte();
- if (i2 < 0)
- throw new EndOfStreamException();
- return (i1 << 8) | i2;
- }
- public static int ReadUint16(byte[] buf, int offset)
- {
- int n = (buf[offset] & 0xff) << 8;
- n |= (buf[++offset] & 0xff);
- return n;
- }
- public static int ReadUint24(Stream input)
- {
- int i1 = input.ReadByte();
- int i2 = input.ReadByte();
- int i3 = input.ReadByte();
- if (i3 < 0)
- throw new EndOfStreamException();
- return (i1 << 16) | (i2 << 8) | i3;
- }
- public static int ReadUint24(byte[] buf, int offset)
- {
- int n = (buf[offset] & 0xff) << 16;
- n |= (buf[++offset] & 0xff) << 8;
- n |= (buf[++offset] & 0xff);
- return n;
- }
- public static long ReadUint32(Stream input)
- {
- int i1 = input.ReadByte();
- int i2 = input.ReadByte();
- int i3 = input.ReadByte();
- int i4 = input.ReadByte();
- if (i4 < 0)
- throw new EndOfStreamException();
- return ((i1 << 24) | (i2 << 16) | (i3 << 8) | i4) & 0xFFFFFFFFL;
- }
- public static long ReadUint32(byte[] buf, int offset)
- {
- int n = (buf[offset] & 0xff) << 24;
- n |= (buf[++offset] & 0xff) << 16;
- n |= (buf[++offset] & 0xff) << 8;
- n |= (buf[++offset] & 0xff);
- return n & 0xFFFFFFFFL;
- }
- public static long ReadUint48(Stream input)
- {
- int hi = ReadUint24(input);
- int lo = ReadUint24(input);
- return ((long)(hi & 0xffffffffL) << 24) | (long)(lo & 0xffffffffL);
- }
- public static long ReadUint48(byte[] buf, int offset)
- {
- int hi = ReadUint24(buf, offset);
- int lo = ReadUint24(buf, offset + 3);
- return ((long)(hi & 0xffffffffL) << 24) | (long)(lo & 0xffffffffL);
- }
- public static byte[] ReadAllOrNothing(int length, Stream input)
- {
- if (length < 1)
- return EmptyBytes;
- byte[] buf = new byte[length];
- int read = Streams.ReadFully(input, buf);
- if (read == 0)
- return null;
- if (read != length)
- throw new EndOfStreamException();
- return buf;
- }
- public static byte[] ReadFully(int length, Stream input)
- {
- if (length < 1)
- return EmptyBytes;
- byte[] buf = new byte[length];
- if (length != Streams.ReadFully(input, buf))
- throw new EndOfStreamException();
- return buf;
- }
- public static void ReadFully(byte[] buf, Stream input)
- {
- int length = buf.Length;
- if (length > 0 && length != Streams.ReadFully(input, buf))
- throw new EndOfStreamException();
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static void ReadFully(Span<byte> buf, Stream input)
- {
- int length = buf.Length;
- if (length > 0 && length != Streams.ReadFully(input, buf))
- throw new EndOfStreamException();
- }
- #endif
- public static byte[] ReadOpaque8(Stream input)
- {
- short length = ReadUint8(input);
- return ReadFully(length, input);
- }
- public static byte[] ReadOpaque8(Stream input, int minLength)
- {
- short length = ReadUint8(input);
- if (length < minLength)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadFully(length, input);
- }
- public static byte[] ReadOpaque8(Stream input, int minLength, int maxLength)
- {
- short length = ReadUint8(input);
- if (length < minLength || maxLength < length)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadFully(length, input);
- }
- public static byte[] ReadOpaque16(Stream input)
- {
- int length = ReadUint16(input);
- return ReadFully(length, input);
- }
- public static byte[] ReadOpaque16(Stream input, int minLength)
- {
- int length = ReadUint16(input);
- if (length < minLength)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadFully(length, input);
- }
- public static byte[] ReadOpaque24(Stream input)
- {
- int length = ReadUint24(input);
- return ReadFully(length, input);
- }
- public static byte[] ReadOpaque24(Stream input, int minLength)
- {
- int length = ReadUint24(input);
- if (length < minLength)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadFully(length, input);
- }
- public static short[] ReadUint8Array(int count, Stream input)
- {
- short[] uints = new short[count];
- for (int i = 0; i < count; ++i)
- {
- uints[i] = ReadUint8(input);
- }
- return uints;
- }
- public static short[] ReadUint8ArrayWithUint8Length(Stream input, int minLength)
- {
- int length = ReadUint8(input);
- if (length < minLength)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return ReadUint8Array(length, input);
- }
- public static int[] ReadUint16Array(int count, Stream input)
- {
- int[] uints = new int[count];
- for (int i = 0; i < count; ++i)
- {
- uints[i] = ReadUint16(input);
- }
- return uints;
- }
- public static ProtocolVersion ReadVersion(byte[] buf, int offset)
- {
- return ProtocolVersion.Get(buf[offset], buf[offset + 1]);
- }
- public static ProtocolVersion ReadVersion(Stream input)
- {
- int i1 = input.ReadByte();
- int i2 = input.ReadByte();
- if (i2 < 0)
- throw new EndOfStreamException();
- return ProtocolVersion.Get(i1, i2);
- }
- public static Asn1Object ReadAsn1Object(byte[] encoding)
- {
- Asn1InputStream asn1 = new Asn1InputStream(encoding);
- Asn1Object result = asn1.ReadObject();
- if (null == result)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- if (null != asn1.ReadObject())
- throw new TlsFatalAlert(AlertDescription.decode_error);
- return result;
- }
- /// <exception cref="IOException"/>
- public static void RequireDerEncoding(Asn1Encodable asn1, byte[] encoding)
- {
- /*
- * NOTE: The current ASN.1 parsing code can't enforce DER-only parsing, but since DER is
- * canonical, we can check it by re-encoding the result and comparing to the original.
- */
- byte[] check = asn1.GetEncoded(Asn1Encodable.Der);
- if (!Arrays.AreEqual(check, encoding))
- throw new TlsFatalAlert(AlertDescription.decode_error);
- }
- public static void WriteGmtUnixTime(byte[] buf, int offset)
- {
- int t = (int)(DateTimeUtilities.CurrentUnixMs() / 1000L);
- buf[offset ] = (byte)(t >> 24);
- buf[offset + 1] = (byte)(t >> 16);
- buf[offset + 2] = (byte)(t >> 8);
- buf[offset + 3] = (byte)t;
- }
- public static void WriteVersion(ProtocolVersion version, Stream output)
- {
- output.WriteByte((byte)version.MajorVersion);
- output.WriteByte((byte)version.MinorVersion);
- }
- public static void WriteVersion(ProtocolVersion version, byte[] buf, int offset)
- {
- buf[offset] = (byte)version.MajorVersion;
- buf[offset + 1] = (byte)version.MinorVersion;
- }
- public static void AddIfSupported(IList<SignatureAndHashAlgorithm> supportedAlgs, TlsCrypto crypto,
- SignatureAndHashAlgorithm alg)
- {
- if (crypto.HasSignatureAndHashAlgorithm(alg))
- {
- supportedAlgs.Add(alg);
- }
- }
- public static void AddIfSupported(IList<int> supportedGroups, TlsCrypto crypto, int namedGroup)
- {
- if (crypto.HasNamedGroup(namedGroup))
- {
- supportedGroups.Add(namedGroup);
- }
- }
- public static void AddIfSupported(IList<int> supportedGroups, TlsCrypto crypto, int[] namedGroups)
- {
- for (int i = 0; i < namedGroups.Length; ++i)
- {
- AddIfSupported(supportedGroups, crypto, namedGroups[i]);
- }
- }
- public static bool AddToSet<T>(IList<T> s, T i)
- {
- bool result = !s.Contains(i);
- if (result)
- {
- s.Add(i);
- }
- return result;
- }
- public static IList<SignatureAndHashAlgorithm> GetDefaultDssSignatureAlgorithms()
- {
- return GetDefaultSignatureAlgorithms(SignatureAlgorithm.dsa);
- }
- public static IList<SignatureAndHashAlgorithm> GetDefaultECDsaSignatureAlgorithms()
- {
- return GetDefaultSignatureAlgorithms(SignatureAlgorithm.ecdsa);
- }
- public static IList<SignatureAndHashAlgorithm> GetDefaultRsaSignatureAlgorithms()
- {
- return GetDefaultSignatureAlgorithms(SignatureAlgorithm.rsa);
- }
- public static SignatureAndHashAlgorithm GetDefaultSignatureAlgorithm(short signatureAlgorithm)
- {
- /*
- * RFC 5246 7.4.1.4.1. If the client does not send the signature_algorithms extension,
- * the server MUST do the following:
- *
- * - If the negotiated key exchange algorithm is one of (RSA, DHE_RSA, DH_RSA, RSA_PSK,
- * ECDH_RSA, ECDHE_RSA), behave as if client had sent the value {sha1,rsa}.
- *
- * - If the negotiated key exchange algorithm is one of (DHE_DSS, DH_DSS), behave as if
- * the client had sent the value {sha1,dsa}.
- *
- * - If the negotiated key exchange algorithm is one of (ECDH_ECDSA, ECDHE_ECDSA),
- * behave as if the client had sent value {sha1,ecdsa}.
- */
- switch (signatureAlgorithm)
- {
- case SignatureAlgorithm.dsa:
- case SignatureAlgorithm.ecdsa:
- case SignatureAlgorithm.rsa:
- return SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, signatureAlgorithm);
- default:
- return null;
- }
- }
- public static IList<SignatureAndHashAlgorithm> GetDefaultSignatureAlgorithms(short signatureAlgorithm)
- {
- SignatureAndHashAlgorithm sigAndHashAlg = GetDefaultSignatureAlgorithm(signatureAlgorithm);
- return null == sigAndHashAlg ? new List<SignatureAndHashAlgorithm>() : VectorOfOne(sigAndHashAlg);
- }
- public static IList<SignatureAndHashAlgorithm> GetDefaultSupportedSignatureAlgorithms(TlsContext context)
- {
- return GetSupportedSignatureAlgorithms(context, DefaultSupportedSigAlgs);
- }
- public static IList<SignatureAndHashAlgorithm> GetSupportedSignatureAlgorithms(TlsContext context,
- IList<SignatureAndHashAlgorithm> candidates)
- {
- TlsCrypto crypto = context.Crypto;
- var result = new List<SignatureAndHashAlgorithm>(candidates.Count);
- foreach (SignatureAndHashAlgorithm sigAndHashAlg in candidates)
- {
- AddIfSupported(result, crypto, sigAndHashAlg);
- }
- return result;
- }
- internal static SignatureAndHashAlgorithm GetSignatureAndHashAlgorithm(ProtocolVersion negotiatedVersion,
- TlsCredentialedSigner credentialedSigner)
- {
- SignatureAndHashAlgorithm signatureAndHashAlgorithm = null;
- if (IsSignatureAlgorithmsExtensionAllowed(negotiatedVersion))
- {
- signatureAndHashAlgorithm = credentialedSigner.SignatureAndHashAlgorithm;
- if (signatureAndHashAlgorithm == null)
- {
- /*
- * RFC 5246 4.7. digitally-signed element needs SignatureAndHashAlgorithm from TLS 1.2
- */
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- }
- return signatureAndHashAlgorithm;
- }
- public static byte[] GetExtensionData(IDictionary<int, byte[]> extensions, int extensionType)
- {
- if (extensions == null || !extensions.TryGetValue(extensionType, out var extensionData))
- return null;
- return extensionData;
- }
- public static bool HasExpectedEmptyExtensionData(IDictionary<int, byte[]> extensions, int extensionType,
- short alertDescription)
- {
- byte[] extension_data = GetExtensionData(extensions, extensionType);
- if (extension_data == null)
- return false;
- if (extension_data.Length != 0)
- throw new TlsFatalAlert(alertDescription);
- return true;
- }
- public static TlsSession ImportSession(byte[] sessionID, SessionParameters sessionParameters)
- {
- return new TlsSessionImpl(sessionID, sessionParameters);
- }
- internal static bool IsExtendedMasterSecretOptionalDtls(ProtocolVersion[] activeProtocolVersions)
- {
- return ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.DTLSv12)
- || ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.DTLSv10);
- }
- internal static bool IsExtendedMasterSecretOptionalTls(ProtocolVersion[] activeProtocolVersions)
- {
- return ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.TLSv12)
- || ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.TLSv11)
- || ProtocolVersion.Contains(activeProtocolVersions, ProtocolVersion.TLSv10);
- }
- public static bool IsNullOrContainsNull(object[] array)
- {
- if (null == array)
- return true;
- int count = array.Length;
- for (int i = 0; i < count; ++i)
- {
- if (null == array[i])
- return true;
- }
- return false;
- }
- public static bool IsNullOrEmpty<T>(T[] array)
- {
- return null == array || array.Length < 1;
- }
- public static bool IsNullOrEmpty(string s)
- {
- return null == s || s.Length < 1;
- }
- public static bool IsNullOrEmpty<T>(IList<T> v)
- {
- return null == v || v.Count < 1;
- }
- public static bool IsSignatureAlgorithmsExtensionAllowed(ProtocolVersion version)
- {
- return null != version
- && ProtocolVersion.TLSv12.IsEqualOrEarlierVersionOf(version.GetEquivalentTlsVersion());
- }
- public static short GetLegacyClientCertType(short signatureAlgorithm)
- {
- switch (signatureAlgorithm)
- {
- case SignatureAlgorithm.rsa:
- return ClientCertificateType.rsa_sign;
- case SignatureAlgorithm.dsa:
- return ClientCertificateType.dss_sign;
- case SignatureAlgorithm.ecdsa:
- return ClientCertificateType.ecdsa_sign;
- default:
- return -1;
- }
- }
- public static short GetLegacySignatureAlgorithmClient(short clientCertificateType)
- {
- switch (clientCertificateType)
- {
- case ClientCertificateType.dss_sign:
- return SignatureAlgorithm.dsa;
- case ClientCertificateType.ecdsa_sign:
- return SignatureAlgorithm.ecdsa;
- case ClientCertificateType.rsa_sign:
- return SignatureAlgorithm.rsa;
- default:
- return -1;
- }
- }
- public static short GetLegacySignatureAlgorithmClientCert(short clientCertificateType)
- {
- switch (clientCertificateType)
- {
- case ClientCertificateType.dss_sign:
- case ClientCertificateType.dss_fixed_dh:
- return SignatureAlgorithm.dsa;
- case ClientCertificateType.ecdsa_sign:
- case ClientCertificateType.ecdsa_fixed_ecdh:
- return SignatureAlgorithm.ecdsa;
- case ClientCertificateType.rsa_sign:
- case ClientCertificateType.rsa_fixed_dh:
- case ClientCertificateType.rsa_fixed_ecdh:
- return SignatureAlgorithm.rsa;
- default:
- return -1;
- }
- }
- public static short GetLegacySignatureAlgorithmServer(int keyExchangeAlgorithm)
- {
- switch (keyExchangeAlgorithm)
- {
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.SRP_DSS:
- return SignatureAlgorithm.dsa;
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- return SignatureAlgorithm.ecdsa;
- case KeyExchangeAlgorithm.DHE_RSA:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- case KeyExchangeAlgorithm.SRP_RSA:
- return SignatureAlgorithm.rsa;
- default:
- return -1;
- }
- }
- public static short GetLegacySignatureAlgorithmServerCert(int keyExchangeAlgorithm)
- {
- switch (keyExchangeAlgorithm)
- {
- case KeyExchangeAlgorithm.DH_DSS:
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.SRP_DSS:
- return SignatureAlgorithm.dsa;
- case KeyExchangeAlgorithm.ECDH_ECDSA:
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- return SignatureAlgorithm.ecdsa;
- case KeyExchangeAlgorithm.DH_RSA:
- case KeyExchangeAlgorithm.DHE_RSA:
- case KeyExchangeAlgorithm.ECDH_RSA:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- case KeyExchangeAlgorithm.RSA:
- case KeyExchangeAlgorithm.RSA_PSK:
- case KeyExchangeAlgorithm.SRP_RSA:
- return SignatureAlgorithm.rsa;
- default:
- return -1;
- }
- }
- public static IList<SignatureAndHashAlgorithm> GetLegacySupportedSignatureAlgorithms()
- {
- var result = new List<SignatureAndHashAlgorithm>(3);
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.dsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.ecdsa));
- result.Add(SignatureAndHashAlgorithm.GetInstance(HashAlgorithm.sha1, SignatureAlgorithm.rsa));
- return result;
- }
- /// <exception cref="IOException"/>
- public static void EncodeSupportedSignatureAlgorithms(
- IList<SignatureAndHashAlgorithm> supportedSignatureAlgorithms, Stream output)
- {
- if (supportedSignatureAlgorithms == null ||
- supportedSignatureAlgorithms.Count < 1 ||
- supportedSignatureAlgorithms.Count >= (1 << 15))
- {
- throw new ArgumentException("must have length from 1 to (2^15 - 1)", "supportedSignatureAlgorithms");
- }
- // supported_signature_algorithms
- int length = 2 * supportedSignatureAlgorithms.Count;
- CheckUint16(length);
- WriteUint16(length, output);
- foreach (SignatureAndHashAlgorithm entry in supportedSignatureAlgorithms)
- {
- if (entry.Signature == SignatureAlgorithm.anonymous)
- {
- /*
- * RFC 5246 7.4.1.4.1 The "anonymous" value is meaningless in this context but used
- * in Section 7.4.3. It MUST NOT appear in this extension.
- */
- throw new ArgumentException(
- "SignatureAlgorithm.anonymous MUST NOT appear in the signature_algorithms extension");
- }
- entry.Encode(output);
- }
- }
- /// <exception cref="IOException"/>
- public static IList<SignatureAndHashAlgorithm> ParseSupportedSignatureAlgorithms(Stream input)
- {
- // supported_signature_algorithms
- int length = ReadUint16(input);
- if (length < 2 || (length & 1) != 0)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- int count = length / 2;
- var supportedSignatureAlgorithms = new List<SignatureAndHashAlgorithm>(count);
- for (int i = 0; i < count; ++i)
- {
- SignatureAndHashAlgorithm sigAndHashAlg = SignatureAndHashAlgorithm.Parse(input);
- if (SignatureAlgorithm.anonymous != sigAndHashAlg.Signature)
- {
- supportedSignatureAlgorithms.Add(sigAndHashAlg);
- }
- }
- return supportedSignatureAlgorithms;
- }
- /// <exception cref="IOException"/>
- public static void VerifySupportedSignatureAlgorithm(
- IList<SignatureAndHashAlgorithm> supportedSignatureAlgorithms, SignatureAndHashAlgorithm signatureAlgorithm)
- {
- VerifySupportedSignatureAlgorithm(supportedSignatureAlgorithms, signatureAlgorithm,
- AlertDescription.illegal_parameter);
- }
- /// <exception cref="IOException"/>
- internal static void VerifySupportedSignatureAlgorithm(
- IList<SignatureAndHashAlgorithm> supportedSignatureAlgorithms, SignatureAndHashAlgorithm signatureAlgorithm,
- short alertDescription)
- {
- if (supportedSignatureAlgorithms == null || supportedSignatureAlgorithms.Count < 1
- || supportedSignatureAlgorithms.Count >= (1 << 15))
- {
- throw new ArgumentException("must have length from 1 to (2^15 - 1)", "supportedSignatureAlgorithms");
- }
- if (signatureAlgorithm == null)
- throw new ArgumentNullException("signatureAlgorithm");
- if (signatureAlgorithm.Signature == SignatureAlgorithm.anonymous
- || !ContainsSignatureAlgorithm(supportedSignatureAlgorithms, signatureAlgorithm))
- {
- throw new TlsFatalAlert(alertDescription);
- }
- }
- /// <exception cref="IOException"/>
- public static bool ContainsSignatureAlgorithm(IList<SignatureAndHashAlgorithm> supportedSignatureAlgorithms,
- SignatureAndHashAlgorithm signatureAlgorithm)
- {
- foreach (SignatureAndHashAlgorithm entry in supportedSignatureAlgorithms)
- {
- if (entry.Equals(signatureAlgorithm))
- return true;
- }
- return false;
- }
- public static bool ContainsAnySignatureAlgorithm(IList<SignatureAndHashAlgorithm> supportedSignatureAlgorithms,
- short signatureAlgorithm)
- {
- foreach (SignatureAndHashAlgorithm entry in supportedSignatureAlgorithms)
- {
- if (entry.Signature == signatureAlgorithm)
- return true;
- }
- return false;
- }
- public static TlsSecret Prf(SecurityParameters securityParameters, TlsSecret secret, string asciiLabel,
- byte[] seed, int length)
- {
- return secret.DeriveUsingPrf(securityParameters.PrfAlgorithm, asciiLabel, seed, length);
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static TlsSecret Prf(SecurityParameters securityParameters, TlsSecret secret,
- ReadOnlySpan<char> asciiLabel, ReadOnlySpan<byte> seed, int length)
- {
- return secret.DeriveUsingPrf(securityParameters.PrfAlgorithm, asciiLabel, seed, length);
- }
- #endif
- public static byte[] Clone(byte[] data)
- {
- return null == data ? null : data.Length == 0 ? EmptyBytes : (byte[])data.Clone();
- }
- public static string[] Clone(string[] s)
- {
- return null == s ? null : s.Length < 1 ? EmptyStrings : (string[])s.Clone();
- }
- public static bool ConstantTimeAreEqual(int len, byte[] a, int aOff, byte[] b, int bOff)
- {
- int d = 0;
- for (int i = 0; i < len; ++i)
- {
- d |= a[aOff + i] ^ b[bOff + i];
- }
- return 0 == d;
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public static bool ConstantTimeAreEqual(int len, Span<byte> a, int aOff, byte[] b, int bOff)
- {
- int d = 0;
- for (int i = 0; i < len; ++i)
- {
- d |= a[aOff + i] ^ b[bOff + i];
- }
- return 0 == d;
- }
- #endif
- public static byte[] CopyOfRangeExact(byte[] original, int from, int to)
- {
- int newLength = to - from;
- byte[] copy = new byte[newLength];
- Array.Copy(original, from, copy, 0, newLength);
- return copy;
- }
- internal static byte[] Concat(byte[] a, byte[] b)
- {
- byte[] c = new byte[a.Length + b.Length];
- Array.Copy(a, 0, c, 0, a.Length);
- Array.Copy(b, 0, c, a.Length, b.Length);
- return c;
- }
- /// <exception cref="IOException"/>
- internal static byte[] CalculateEndPointHash(TlsContext context, TlsCertificate certificate, byte[] enc)
- {
- return CalculateEndPointHash(context, certificate, enc, 0, enc.Length);
- }
- /// <exception cref="IOException"/>
- internal static byte[] CalculateEndPointHash(TlsContext context, TlsCertificate certificate, byte[] enc,
- int encOff, int encLen)
- {
- short hashAlgorithm = HashAlgorithm.none;
- string sigAlgOid = certificate.SigAlgOid;
- if (sigAlgOid != null)
- {
- if (PkcsObjectIdentifiers.IdRsassaPss.Id.Equals(sigAlgOid))
- {
- RsassaPssParameters pssParams = RsassaPssParameters.GetInstance(certificate.GetSigAlgParams());
- if (null != pssParams)
- {
- DerObjectIdentifier hashOid = pssParams.HashAlgorithm.Algorithm;
- if (NistObjectIdentifiers.IdSha256.Equals(hashOid))
- {
- hashAlgorithm = HashAlgorithm.sha256;
- }
- else if (NistObjectIdentifiers.IdSha384.Equals(hashOid))
- {
- hashAlgorithm = HashAlgorithm.sha384;
- }
- else if (NistObjectIdentifiers.IdSha512.Equals(hashOid))
- {
- hashAlgorithm = HashAlgorithm.sha512;
- }
- }
- }
- else
- {
- if (CertSigAlgOids.TryGetValue(sigAlgOid, out var algorithm))
- {
- hashAlgorithm = algorithm.Hash;
- }
- }
- }
- switch (hashAlgorithm)
- {
- case HashAlgorithm.Intrinsic:
- hashAlgorithm = HashAlgorithm.none;
- break;
- case HashAlgorithm.md5:
- case HashAlgorithm.sha1:
- hashAlgorithm = HashAlgorithm.sha256;
- break;
- }
- if (HashAlgorithm.none != hashAlgorithm)
- {
- TlsHash hash = CreateHash(context.Crypto, hashAlgorithm);
- if (hash != null)
- {
- hash.Update(enc, encOff, encLen);
- return hash.CalculateHash();
- }
- }
- return EmptyBytes;
- }
- public static byte[] CalculateExporterSeed(SecurityParameters securityParameters, byte[] context)
- {
- byte[] cr = securityParameters.ClientRandom, sr = securityParameters.ServerRandom;
- if (null == context)
- return Arrays.Concatenate(cr, sr);
- if (!IsValidUint16(context.Length))
- throw new ArgumentException("must have length less than 2^16 (or be null)", "context");
- byte[] contextLength = new byte[2];
- WriteUint16(context.Length, contextLength, 0);
- return Arrays.ConcatenateAll(cr, sr, contextLength, context);
- }
- private static byte[] CalculateFinishedHmac(SecurityParameters securityParameters, TlsSecret baseKey,
- byte[] transcriptHash)
- {
- int prfCryptoHashAlgorithm = securityParameters.PrfCryptoHashAlgorithm;
- int prfHashLength = securityParameters.PrfHashLength;
- return CalculateFinishedHmac(prfCryptoHashAlgorithm, prfHashLength, baseKey, transcriptHash);
- }
- private static byte[] CalculateFinishedHmac(int prfCryptoHashAlgorithm, int prfHashLength, TlsSecret baseKey,
- byte[] transcriptHash)
- {
- TlsSecret finishedKey = TlsCryptoUtilities.HkdfExpandLabel(baseKey, prfCryptoHashAlgorithm, "finished",
- EmptyBytes, prfHashLength);
- try
- {
- return finishedKey.CalculateHmac(prfCryptoHashAlgorithm, transcriptHash, 0, transcriptHash.Length);
- }
- finally
- {
- finishedKey.Destroy();
- }
- }
- internal static TlsSecret CalculateMasterSecret(TlsContext context, TlsSecret preMasterSecret)
- {
- SecurityParameters sp = context.SecurityParameters;
- string asciiLabel;
- byte[] seed;
- if (sp.IsExtendedMasterSecret)
- {
- asciiLabel = ExporterLabel.extended_master_secret;
- seed = sp.SessionHash;
- }
- else
- {
- asciiLabel = ExporterLabel.master_secret;
- seed = Concat(sp.ClientRandom, sp.ServerRandom);
- }
- return Prf(sp, preMasterSecret, asciiLabel, seed, 48);
- }
- internal static byte[] CalculatePskBinder(TlsCrypto crypto, bool isExternalPsk, int pskCryptoHashAlgorithm,
- TlsSecret earlySecret, byte[] transcriptHash)
- {
- int prfHashLength = TlsCryptoUtilities.GetHashOutputSize(pskCryptoHashAlgorithm);
- string label = isExternalPsk ? "ext binder" : "res binder";
- byte[] emptyTranscriptHash = crypto.CreateHash(pskCryptoHashAlgorithm).CalculateHash();
- TlsSecret binderKey = DeriveSecret(pskCryptoHashAlgorithm, prfHashLength, earlySecret, label,
- emptyTranscriptHash);
- try
- {
- return CalculateFinishedHmac(pskCryptoHashAlgorithm, prfHashLength, binderKey, transcriptHash);
- }
- finally
- {
- binderKey.Destroy();
- }
- }
- internal static byte[] CalculateVerifyData(TlsContext context, TlsHandshakeHash handshakeHash, bool isServer)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- if (IsTlsV13(negotiatedVersion))
- {
- TlsSecret baseKey = isServer
- ? securityParameters.BaseKeyServer
- : securityParameters.BaseKeyClient;
- byte[] transcriptHash = GetCurrentPrfHash(handshakeHash);
- return CalculateFinishedHmac(securityParameters, baseKey, transcriptHash);
- }
- if (negotiatedVersion.IsSsl)
- {
- return Ssl3Utilities.CalculateVerifyData(handshakeHash, isServer);
- }
- string asciiLabel = isServer ? ExporterLabel.server_finished : ExporterLabel.client_finished;
- byte[] prfHash = GetCurrentPrfHash(handshakeHash);
- TlsSecret master_secret = securityParameters.MasterSecret;
- int verify_data_length = securityParameters.VerifyDataLength;
- return Prf(securityParameters, master_secret, asciiLabel, prfHash, verify_data_length).Extract();
- }
- internal static void Establish13PhaseSecrets(TlsContext context, TlsSecret pskEarlySecret,
- TlsSecret sharedSecret)
- {
- TlsCrypto crypto = context.Crypto;
- SecurityParameters securityParameters = context.SecurityParameters;
- int cryptoHashAlgorithm = securityParameters.PrfCryptoHashAlgorithm;
- TlsSecret zeros = crypto.HkdfInit(cryptoHashAlgorithm);
- byte[] emptyTranscriptHash = crypto.CreateHash(cryptoHashAlgorithm).CalculateHash();
- TlsSecret earlySecret = pskEarlySecret;
- if (null == earlySecret)
- {
- earlySecret = crypto
- .HkdfInit(cryptoHashAlgorithm)
- .HkdfExtract(cryptoHashAlgorithm, zeros);
- }
- if (null == sharedSecret)
- {
- sharedSecret = zeros;
- }
- TlsSecret handshakeSecret = DeriveSecret(securityParameters, earlySecret, "derived", emptyTranscriptHash)
- .HkdfExtract(cryptoHashAlgorithm, sharedSecret);
- if (sharedSecret != zeros)
- {
- sharedSecret.Destroy();
- }
- TlsSecret masterSecret = DeriveSecret(securityParameters, handshakeSecret, "derived", emptyTranscriptHash)
- .HkdfExtract(cryptoHashAlgorithm, zeros);
- securityParameters.m_earlySecret = earlySecret;
- securityParameters.m_handshakeSecret = handshakeSecret;
- securityParameters.m_masterSecret = masterSecret;
- }
- private static void Establish13TrafficSecrets(TlsContext context, byte[] transcriptHash, TlsSecret phaseSecret,
- string clientLabel, string serverLabel, RecordStream recordStream)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- securityParameters.m_trafficSecretClient = DeriveSecret(securityParameters, phaseSecret, clientLabel,
- transcriptHash);
- if (null != serverLabel)
- {
- securityParameters.m_trafficSecretServer = DeriveSecret(securityParameters, phaseSecret, serverLabel,
- transcriptHash);
- }
- // TODO[tls13] Early data (client->server only)
- recordStream.SetPendingCipher(InitCipher(context));
- }
- internal static void Establish13PhaseApplication(TlsContext context, byte[] serverFinishedTranscriptHash,
- RecordStream recordStream)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- TlsSecret phaseSecret = securityParameters.MasterSecret;
- Establish13TrafficSecrets(context, serverFinishedTranscriptHash, phaseSecret, "c ap traffic",
- "s ap traffic", recordStream);
- securityParameters.m_exporterMasterSecret = DeriveSecret(securityParameters, phaseSecret, "exp master",
- serverFinishedTranscriptHash);
- Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.CLIENT_TRAFFIC_SECRET_0, securityParameters);
- Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.SERVER_TRAFFIC_SECRET_0, securityParameters);
- Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.EXPORTER_SECRET, securityParameters);
- }
- internal static void Establish13PhaseEarly(TlsContext context, byte[] clientHelloTranscriptHash,
- RecordStream recordStream)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- TlsSecret phaseSecret = securityParameters.EarlySecret;
- // TODO[tls13] binder_key
- // TODO[tls13] Early data (client->server only)
- if (null != recordStream)
- {
- Establish13TrafficSecrets(context, clientHelloTranscriptHash, phaseSecret, "c e traffic", null,
- recordStream);
- }
- securityParameters.m_earlyExporterMasterSecret = DeriveSecret(securityParameters, phaseSecret,
- "e exp master", clientHelloTranscriptHash);
- }
- internal static void Establish13PhaseHandshake(TlsContext context, byte[] serverHelloTranscriptHash,
- RecordStream recordStream)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- TlsSecret phaseSecret = securityParameters.HandshakeSecret;
- Establish13TrafficSecrets(context, serverHelloTranscriptHash, phaseSecret, "c hs traffic", "s hs traffic",
- recordStream);
- Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.CLIENT_HANDSHAKE_TRAFFIC_SECRET, securityParameters);
- Shared.TLS.KeyLogFileWriter.WriteLabel(Shared.TLS.Labels.SERVER_HANDSHAKE_TRAFFIC_SECRET, securityParameters);
-
- securityParameters.m_baseKeyClient = securityParameters.TrafficSecretClient;
- securityParameters.m_baseKeyServer = securityParameters.TrafficSecretServer;
- }
- internal static void Update13TrafficSecretLocal(TlsContext context)
- {
- Update13TrafficSecret(context, context.IsServer);
- }
- internal static void Update13TrafficSecretPeer(TlsContext context)
- {
- Update13TrafficSecret(context, !context.IsServer);
- }
- private static void Update13TrafficSecret(TlsContext context, bool forServer)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- TlsSecret current;
- if (forServer)
- {
- current = securityParameters.TrafficSecretServer;
- securityParameters.m_trafficSecretServer = Update13TrafficSecret(securityParameters, current);
- }
- else
- {
- current = securityParameters.TrafficSecretClient;
- securityParameters.m_trafficSecretClient = Update13TrafficSecret(securityParameters, current);
- }
- if (null != current)
- {
- current.Destroy();
- }
- }
- private static TlsSecret Update13TrafficSecret(SecurityParameters securityParameters, TlsSecret secret)
- {
- return TlsCryptoUtilities.HkdfExpandLabel(secret, securityParameters.PrfCryptoHashAlgorithm, "traffic upd",
- EmptyBytes, securityParameters.PrfHashLength);
- }
- public static DerObjectIdentifier GetOidForHashAlgorithm(short hashAlgorithm)
- {
- switch (hashAlgorithm)
- {
- case HashAlgorithm.md5:
- return PkcsObjectIdentifiers.MD5;
- case HashAlgorithm.sha1:
- return X509ObjectIdentifiers.IdSha1;
- case HashAlgorithm.sha224:
- return NistObjectIdentifiers.IdSha224;
- case HashAlgorithm.sha256:
- return NistObjectIdentifiers.IdSha256;
- case HashAlgorithm.sha384:
- return NistObjectIdentifiers.IdSha384;
- case HashAlgorithm.sha512:
- return NistObjectIdentifiers.IdSha512;
- // TODO[RFC 8998]
- //case HashAlgorithm.sm3:
- // return GMObjectIdentifiers.sm3;
- default:
- throw new ArgumentException("invalid HashAlgorithm: " + HashAlgorithm.GetText(hashAlgorithm));
- }
- }
- internal static int GetPrfAlgorithm(SecurityParameters securityParameters, int cipherSuite)
- {
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- bool isTlsV13 = IsTlsV13(negotiatedVersion);
- bool isTlsV12Exactly = !isTlsV13 && IsTlsV12(negotiatedVersion);
- bool isSsl = negotiatedVersion.IsSsl;
- switch (cipherSuite)
- {
- case CipherSuite.TLS_AES_128_CCM_SHA256:
- case CipherSuite.TLS_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_AES_128_GCM_SHA256:
- case CipherSuite.TLS_CHACHA20_POLY1305_SHA256:
- {
- if (isTlsV13)
- return PrfAlgorithm.tls13_hkdf_sha256;
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- }
- case CipherSuite.TLS_AES_256_GCM_SHA384:
- {
- if (isTlsV13)
- return PrfAlgorithm.tls13_hkdf_sha384;
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- }
- case CipherSuite.TLS_SM4_CCM_SM3:
- case CipherSuite.TLS_SM4_GCM_SM3:
- {
- if (isTlsV13)
- return PrfAlgorithm.tls13_hkdf_sm3;
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- }
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA256:
- {
- if (isTlsV12Exactly)
- return PrfAlgorithm.tls_prf_sha256;
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- }
- case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- {
- if (isTlsV12Exactly)
- return PrfAlgorithm.tls_prf_sha384;
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- }
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384:
- {
- if (isTlsV13)
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- if (isTlsV12Exactly)
- return PrfAlgorithm.tls_prf_sha384;
- if (isSsl)
- return PrfAlgorithm.ssl_prf_legacy;
- return PrfAlgorithm.tls_prf_legacy;
- }
- default:
- {
- if (isTlsV13)
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- if (isTlsV12Exactly)
- return PrfAlgorithm.tls_prf_sha256;
- if (isSsl)
- return PrfAlgorithm.ssl_prf_legacy;
- return PrfAlgorithm.tls_prf_legacy;
- }
- }
- }
- internal static int GetPrfAlgorithm13(int cipherSuite)
- {
- // NOTE: GetPrfAlgorithms13 relies on the number of distinct return values
- switch (cipherSuite)
- {
- case CipherSuite.TLS_AES_128_CCM_SHA256:
- case CipherSuite.TLS_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_AES_128_GCM_SHA256:
- case CipherSuite.TLS_CHACHA20_POLY1305_SHA256:
- return PrfAlgorithm.tls13_hkdf_sha256;
- case CipherSuite.TLS_AES_256_GCM_SHA384:
- return PrfAlgorithm.tls13_hkdf_sha384;
- case CipherSuite.TLS_SM4_CCM_SM3:
- case CipherSuite.TLS_SM4_GCM_SM3:
- return PrfAlgorithm.tls13_hkdf_sm3;
- default:
- return -1;
- }
- }
- internal static int[] GetPrfAlgorithms13(int[] cipherSuites)
- {
- int[] result = new int[System.Math.Min(3, cipherSuites.Length)];
- int count = 0;
- for (int i = 0; i < cipherSuites.Length; ++i)
- {
- int prfAlgorithm = GetPrfAlgorithm13(cipherSuites[i]);
- if (prfAlgorithm >= 0 && !Arrays.Contains(result, prfAlgorithm))
- {
- result[count++] = prfAlgorithm;
- }
- }
- return Truncate(result, count);
- }
- internal static byte[] CalculateSignatureHash(TlsContext context, SignatureAndHashAlgorithm algorithm,
- byte[] extraSignatureInput, DigestInputBuffer buf)
- {
- TlsCrypto crypto = context.Crypto;
- TlsHash h = algorithm == null
- ? new CombinedHash(crypto)
- : CreateHash(crypto, algorithm);
- SecurityParameters sp = context.SecurityParameters;
- // NOTE: The implicit copy here is intended (and important)
- byte[] randoms = Arrays.Concatenate(sp.ClientRandom, sp.ServerRandom);
- h.Update(randoms, 0, randoms.Length);
- if (null != extraSignatureInput)
- {
- h.Update(extraSignatureInput, 0, extraSignatureInput.Length);
- }
- buf.UpdateDigest(h);
- return h.CalculateHash();
- }
- internal static void SendSignatureInput(TlsContext context, byte[] extraSignatureInput, DigestInputBuffer buf,
- Stream output)
- {
- SecurityParameters sp = context.SecurityParameters;
- // NOTE: The implicit copy here is intended (and important)
- byte[] randoms = Arrays.Concatenate(sp.ClientRandom, sp.ServerRandom);
- output.Write(randoms, 0, randoms.Length);
- if (null != extraSignatureInput)
- {
- output.Write(extraSignatureInput, 0, extraSignatureInput.Length);
- }
- buf.CopyInputTo(output);
- output.Dispose();
- }
- internal static DigitallySigned GenerateCertificateVerifyClient(TlsClientContext clientContext,
- TlsCredentialedSigner clientAuthSigner, SignatureAndHashAlgorithm clientAuthAlgorithm,
- TlsStreamSigner clientAuthStreamSigner, TlsHandshakeHash handshakeHash)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- if (IsTlsV13(securityParameters.NegotiatedVersion))
- {
- // Should be using Generate13CertificateVerify instead
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- byte[] signature;
- if (clientAuthStreamSigner != null)
- {
- handshakeHash.CopyBufferTo(clientAuthStreamSigner.Stream);
- signature = clientAuthStreamSigner.GetSignature();
- }
- else
- {
- byte[] hash;
- if (clientAuthAlgorithm == null)
- {
- hash = securityParameters.SessionHash;
- }
- else
- {
- hash = handshakeHash.GetFinalHash(SignatureScheme.GetCryptoHashAlgorithm(clientAuthAlgorithm));
- }
- signature = clientAuthSigner.GenerateRawSignature(hash);
- }
- return new DigitallySigned(clientAuthAlgorithm, signature);
- }
- internal static DigitallySigned Generate13CertificateVerify(TlsContext context,
- TlsCredentialedSigner credentialedSigner, TlsHandshakeHash handshakeHash)
- {
- SignatureAndHashAlgorithm signatureAndHashAlgorithm = credentialedSigner.SignatureAndHashAlgorithm;
- if (null == signatureAndHashAlgorithm)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- string contextString = context.IsServer
- ? "TLS 1.3, server CertificateVerify"
- : "TLS 1.3, client CertificateVerify";
- byte[] signature = Generate13CertificateVerify(context.Crypto, credentialedSigner, contextString,
- handshakeHash, signatureAndHashAlgorithm);
- return new DigitallySigned(signatureAndHashAlgorithm, signature);
- }
- private static byte[] Generate13CertificateVerify(TlsCrypto crypto, TlsCredentialedSigner credentialedSigner,
- string contextString, TlsHandshakeHash handshakeHash, SignatureAndHashAlgorithm signatureAndHashAlgorithm)
- {
- TlsStreamSigner streamSigner = credentialedSigner.GetStreamSigner();
- byte[] header = GetCertificateVerifyHeader(contextString);
- byte[] prfHash = GetCurrentPrfHash(handshakeHash);
- if (null != streamSigner)
- {
- Stream output = streamSigner.Stream;
- output.Write(header, 0, header.Length);
- output.Write(prfHash, 0, prfHash.Length);
- return streamSigner.GetSignature();
- }
- TlsHash tlsHash = CreateHash(crypto, signatureAndHashAlgorithm);
- tlsHash.Update(header, 0, header.Length);
- tlsHash.Update(prfHash, 0, prfHash.Length);
- byte[] hash = tlsHash.CalculateHash();
- return credentialedSigner.GenerateRawSignature(hash);
- }
- internal static void VerifyCertificateVerifyClient(TlsServerContext serverContext,
- CertificateRequest certificateRequest, DigitallySigned certificateVerify, TlsHandshakeHash handshakeHash)
- {
- SecurityParameters securityParameters = serverContext.SecurityParameters;
- Certificate clientCertificate = securityParameters.PeerCertificate;
- TlsCertificate verifyingCert = clientCertificate.GetCertificateAt(0);
- SignatureAndHashAlgorithm sigAndHashAlg = certificateVerify.Algorithm;
- short signatureAlgorithm;
- if (null == sigAndHashAlg)
- {
- signatureAlgorithm = verifyingCert.GetLegacySignatureAlgorithm();
- CheckClientCertificateType(certificateRequest, GetLegacyClientCertType(signatureAlgorithm),
- AlertDescription.unsupported_certificate);
- }
- else
- {
- VerifySupportedSignatureAlgorithm(securityParameters.ServerSigAlgs, sigAndHashAlg);
- signatureAlgorithm = sigAndHashAlg.Signature;
- CheckClientCertificateType(certificateRequest,
- SignatureAlgorithm.GetClientCertificateType(signatureAlgorithm), AlertDescription.illegal_parameter);
- }
- // Verify the CertificateVerify message contains a correct signature.
- bool verified;
- try
- {
- TlsVerifier verifier = verifyingCert.CreateVerifier(signatureAlgorithm);
- TlsStreamVerifier streamVerifier = verifier.GetStreamVerifier(certificateVerify);
- if (streamVerifier != null)
- {
- handshakeHash.CopyBufferTo(streamVerifier.Stream);
- verified = streamVerifier.IsVerified();
- }
- else
- {
- byte[] hash;
- if (IsTlsV12(serverContext))
- {
- hash = handshakeHash.GetFinalHash(SignatureScheme.GetCryptoHashAlgorithm(sigAndHashAlg));
- }
- else
- {
- hash = securityParameters.SessionHash;
- }
- verified = verifier.VerifyRawSignature(certificateVerify, hash);
- }
- }
- catch (TlsFatalAlert e)
- {
- throw e;
- }
- catch (Exception e)
- {
- throw new TlsFatalAlert(AlertDescription.decrypt_error, e);
- }
- if (!verified)
- {
- throw new TlsFatalAlert(AlertDescription.decrypt_error);
- }
- }
- /// <exception cref="IOException"/>
- internal static void Verify13CertificateVerifyClient(TlsServerContext serverContext,
- TlsHandshakeHash handshakeHash, CertificateVerify certificateVerify)
- {
- SecurityParameters securityParameters = serverContext.SecurityParameters;
- var supportedAlgorithms = securityParameters.ServerSigAlgs;
- TlsCertificate certificate = securityParameters.PeerCertificate.GetCertificateAt(0);
- Verify13CertificateVerify(supportedAlgorithms, "TLS 1.3, client CertificateVerify", handshakeHash,
- certificate, certificateVerify);
- }
- /// <exception cref="IOException"/>
- internal static void Verify13CertificateVerifyServer(TlsClientContext clientContext,
- TlsHandshakeHash handshakeHash, CertificateVerify certificateVerify)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- var supportedAlgorithms = securityParameters.ClientSigAlgs;
- TlsCertificate certificate = securityParameters.PeerCertificate.GetCertificateAt(0);
- Verify13CertificateVerify(supportedAlgorithms, "TLS 1.3, server CertificateVerify", handshakeHash,
- certificate, certificateVerify);
- }
- /// <exception cref="IOException"/>
- private static void Verify13CertificateVerify(IList<SignatureAndHashAlgorithm> supportedAlgorithms,
- string contextString, TlsHandshakeHash handshakeHash, TlsCertificate certificate,
- CertificateVerify certificateVerify)
- {
- // Verify the CertificateVerify message contains a correct signature.
- bool verified;
- try
- {
- int signatureScheme = certificateVerify.Algorithm;
- SignatureAndHashAlgorithm algorithm = SignatureScheme.GetSignatureAndHashAlgorithm(signatureScheme);
- VerifySupportedSignatureAlgorithm(supportedAlgorithms, algorithm);
- Tls13Verifier verifier = certificate.CreateVerifier(signatureScheme);
- byte[] header = GetCertificateVerifyHeader(contextString);
- byte[] prfHash = GetCurrentPrfHash(handshakeHash);
- Stream output = verifier.Stream;
- output.Write(header, 0, header.Length);
- output.Write(prfHash, 0, prfHash.Length);
- verified = verifier.VerifySignature(certificateVerify.Signature);
- }
- catch (TlsFatalAlert e)
- {
- throw e;
- }
- catch (Exception e)
- {
- throw new TlsFatalAlert(AlertDescription.decrypt_error, e);
- }
- if (!verified)
- {
- throw new TlsFatalAlert(AlertDescription.decrypt_error);
- }
- }
- private static byte[] GetCertificateVerifyHeader(string contextString)
- {
- int count = contextString.Length;
- byte[] header = new byte[64 + count + 1];
- for (int i = 0; i < 64; ++i)
- {
- header[i] = 0x20;
- }
- for (int i = 0; i < count; ++i)
- {
- char c = contextString[i];
- header[64 + i] = (byte)c;
- }
- header[64 + count] = 0x00;
- return header;
- }
- /// <exception cref="IOException"/>
- internal static void GenerateServerKeyExchangeSignature(TlsContext context, TlsCredentialedSigner credentials,
- byte[] extraSignatureInput, DigestInputBuffer digestBuffer)
- {
- /*
- * RFC 5246 4.7. digitally-signed element needs SignatureAndHashAlgorithm from TLS 1.2
- */
- SignatureAndHashAlgorithm algorithm = GetSignatureAndHashAlgorithm(context.ServerVersion, credentials);
- TlsStreamSigner streamSigner = credentials.GetStreamSigner();
- byte[] signature;
- if (streamSigner != null)
- {
- SendSignatureInput(context, extraSignatureInput, digestBuffer, streamSigner.Stream);
- signature = streamSigner.GetSignature();
- }
- else
- {
- byte[] hash = CalculateSignatureHash(context, algorithm, extraSignatureInput, digestBuffer);
- signature = credentials.GenerateRawSignature(hash);
- }
- DigitallySigned digitallySigned = new DigitallySigned(algorithm, signature);
- digitallySigned.Encode(digestBuffer);
- }
- /// <exception cref="IOException"/>
- internal static void VerifyServerKeyExchangeSignature(TlsContext context, Stream signatureInput,
- TlsCertificate serverCertificate, byte[] extraSignatureInput, DigestInputBuffer digestBuffer)
- {
- DigitallySigned digitallySigned = DigitallySigned.Parse(context, signatureInput);
- SecurityParameters securityParameters = context.SecurityParameters;
- int keyExchangeAlgorithm = securityParameters.KeyExchangeAlgorithm;
- SignatureAndHashAlgorithm sigAndHashAlg = digitallySigned.Algorithm;
- short signatureAlgorithm;
- if (sigAndHashAlg == null)
- {
- signatureAlgorithm = GetLegacySignatureAlgorithmServer(keyExchangeAlgorithm);
- }
- else
- {
- signatureAlgorithm = sigAndHashAlg.Signature;
- if (!IsValidSignatureAlgorithmForServerKeyExchange(signatureAlgorithm, keyExchangeAlgorithm))
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- VerifySupportedSignatureAlgorithm(securityParameters.ClientSigAlgs, sigAndHashAlg);
- }
- TlsVerifier verifier = serverCertificate.CreateVerifier(signatureAlgorithm);
- TlsStreamVerifier streamVerifier = verifier.GetStreamVerifier(digitallySigned);
- bool verified;
- if (streamVerifier != null)
- {
- SendSignatureInput(context, null, digestBuffer, streamVerifier.Stream);
- verified = streamVerifier.IsVerified();
- }
- else
- {
- byte[] hash = CalculateSignatureHash(context, sigAndHashAlg, null, digestBuffer);
- verified = verifier.VerifyRawSignature(digitallySigned, hash);
- }
- if (!verified)
- {
- throw new TlsFatalAlert(AlertDescription.decrypt_error);
- }
- }
- internal static void TrackHashAlgorithmClient(TlsHandshakeHash handshakeHash,
- SignatureAndHashAlgorithm signatureAndHashAlgorithm)
- {
- int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureAndHashAlgorithm);
- if (cryptoHashAlgorithm >= 0)
- {
- handshakeHash.TrackHashAlgorithm(cryptoHashAlgorithm);
- }
- }
- internal static void TrackHashAlgorithms(TlsHandshakeHash handshakeHash,
- IList<SignatureAndHashAlgorithm> supportedSignatureAlgorithms)
- {
- foreach (SignatureAndHashAlgorithm signatureAndHashAlgorithm in supportedSignatureAlgorithms)
- {
- int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureAndHashAlgorithm);
- if (cryptoHashAlgorithm >= 0)
- {
- handshakeHash.TrackHashAlgorithm(cryptoHashAlgorithm);
- }
- else if (HashAlgorithm.Intrinsic == signatureAndHashAlgorithm.Hash)
- {
- handshakeHash.ForceBuffering();
- }
- }
- }
- public static bool HasSigningCapability(short clientCertificateType)
- {
- switch (clientCertificateType)
- {
- case ClientCertificateType.dss_sign:
- case ClientCertificateType.ecdsa_sign:
- case ClientCertificateType.rsa_sign:
- return true;
- default:
- return false;
- }
- }
- public static IList<T> VectorOfOne<T>(T obj)
- {
- var v = new List<T>(1);
- v.Add(obj);
- return v;
- }
- public static int GetCipherType(int cipherSuite)
- {
- int encryptionAlgorithm = GetEncryptionAlgorithm(cipherSuite);
- return GetEncryptionAlgorithmType(encryptionAlgorithm);
- }
- public static int GetEncryptionAlgorithm(int cipherSuite)
- {
- switch (cipherSuite)
- {
- case CipherSuite.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA:
- return EncryptionAlgorithm.cls_3DES_EDE_CBC;
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_anon_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA:
- return EncryptionAlgorithm.AES_128_CBC;
- case CipherSuite.TLS_AES_128_CCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM:
- return EncryptionAlgorithm.AES_128_CCM;
- case CipherSuite.TLS_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8:
- return EncryptionAlgorithm.AES_128_CCM_8;
- case CipherSuite.TLS_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256:
- return EncryptionAlgorithm.AES_128_GCM;
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_ECDH_anon_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA:
- return EncryptionAlgorithm.AES_256_CBC;
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM:
- return EncryptionAlgorithm.AES_256_CCM;
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8:
- return EncryptionAlgorithm.AES_256_CCM_8;
- case CipherSuite.TLS_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384:
- return EncryptionAlgorithm.AES_256_GCM;
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256:
- return EncryptionAlgorithm.ARIA_128_CBC;
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256:
- return EncryptionAlgorithm.ARIA_128_GCM;
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384:
- return EncryptionAlgorithm.ARIA_256_CBC;
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384:
- return EncryptionAlgorithm.ARIA_256_GCM;
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- return EncryptionAlgorithm.CAMELLIA_128_CBC;
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- return EncryptionAlgorithm.CAMELLIA_128_GCM;
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- return EncryptionAlgorithm.CAMELLIA_256_CBC;
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- return EncryptionAlgorithm.CAMELLIA_256_GCM;
- case CipherSuite.TLS_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256:
- return EncryptionAlgorithm.CHACHA20_POLY1305;
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_NULL_SHA:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA:
- return EncryptionAlgorithm.NULL;
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA256:
- return EncryptionAlgorithm.NULL;
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384:
- return EncryptionAlgorithm.NULL;
- case CipherSuite.TLS_DH_anon_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_SEED_CBC_SHA:
- return EncryptionAlgorithm.SEED_CBC;
- case CipherSuite.TLS_SM4_CCM_SM3:
- return EncryptionAlgorithm.SM4_CCM;
- case CipherSuite.TLS_SM4_GCM_SM3:
- return EncryptionAlgorithm.SM4_GCM;
- default:
- return -1;
- }
- }
- public static int GetEncryptionAlgorithmType(int encryptionAlgorithm)
- {
- switch (encryptionAlgorithm)
- {
- case EncryptionAlgorithm.AES_128_CCM:
- case EncryptionAlgorithm.AES_128_CCM_8:
- case EncryptionAlgorithm.AES_128_GCM:
- case EncryptionAlgorithm.AES_256_CCM:
- case EncryptionAlgorithm.AES_256_CCM_8:
- case EncryptionAlgorithm.AES_256_GCM:
- case EncryptionAlgorithm.ARIA_128_GCM:
- case EncryptionAlgorithm.ARIA_256_GCM:
- case EncryptionAlgorithm.CAMELLIA_128_GCM:
- case EncryptionAlgorithm.CAMELLIA_256_GCM:
- case EncryptionAlgorithm.CHACHA20_POLY1305:
- case EncryptionAlgorithm.SM4_CCM:
- case EncryptionAlgorithm.SM4_GCM:
- return CipherType.aead;
- case EncryptionAlgorithm.RC2_CBC_40:
- case EncryptionAlgorithm.IDEA_CBC:
- case EncryptionAlgorithm.DES40_CBC:
- case EncryptionAlgorithm.DES_CBC:
- case EncryptionAlgorithm.cls_3DES_EDE_CBC:
- case EncryptionAlgorithm.AES_128_CBC:
- case EncryptionAlgorithm.AES_256_CBC:
- case EncryptionAlgorithm.ARIA_128_CBC:
- case EncryptionAlgorithm.ARIA_256_CBC:
- case EncryptionAlgorithm.CAMELLIA_128_CBC:
- case EncryptionAlgorithm.CAMELLIA_256_CBC:
- case EncryptionAlgorithm.SEED_CBC:
- case EncryptionAlgorithm.SM4_CBC:
- return CipherType.block;
- case EncryptionAlgorithm.NULL:
- case EncryptionAlgorithm.RC4_40:
- case EncryptionAlgorithm.RC4_128:
- return CipherType.stream;
- default:
- return -1;
- }
- }
- public static int GetKeyExchangeAlgorithm(int cipherSuite)
- {
- switch (cipherSuite)
- {
- case CipherSuite.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_SEED_CBC_SHA:
- return KeyExchangeAlgorithm.DH_anon;
- case CipherSuite.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_SEED_CBC_SHA:
- return KeyExchangeAlgorithm.DH_DSS;
- case CipherSuite.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_SEED_CBC_SHA:
- return KeyExchangeAlgorithm.DH_RSA;
- case CipherSuite.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_SEED_CBC_SHA:
- return KeyExchangeAlgorithm.DHE_DSS;
- case CipherSuite.TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8:
- return KeyExchangeAlgorithm.DHE_PSK;
- case CipherSuite.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_SEED_CBC_SHA:
- return KeyExchangeAlgorithm.DHE_RSA;
- case CipherSuite.TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_NULL_SHA:
- return KeyExchangeAlgorithm.ECDH_anon;
- case CipherSuite.TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_NULL_SHA:
- return KeyExchangeAlgorithm.ECDH_ECDSA;
- case CipherSuite.TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_NULL_SHA:
- return KeyExchangeAlgorithm.ECDH_RSA;
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_NULL_SHA:
- return KeyExchangeAlgorithm.ECDHE_ECDSA;
- case CipherSuite.TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384:
- return KeyExchangeAlgorithm.ECDHE_PSK;
- case CipherSuite.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_NULL_SHA:
- return KeyExchangeAlgorithm.ECDHE_RSA;
- case CipherSuite.TLS_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_AES_128_CCM_SHA256:
- case CipherSuite.TLS_AES_128_GCM_SHA256:
- case CipherSuite.TLS_AES_256_GCM_SHA384:
- case CipherSuite.TLS_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_SM4_CCM_SM3:
- case CipherSuite.TLS_SM4_GCM_SM3:
- return KeyExchangeAlgorithm.NULL;
- case CipherSuite.TLS_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA384:
- return KeyExchangeAlgorithm.PSK;
- case CipherSuite.TLS_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA256:
- case CipherSuite.TLS_RSA_WITH_SEED_CBC_SHA:
- return KeyExchangeAlgorithm.RSA;
- case CipherSuite.TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384:
- return KeyExchangeAlgorithm.RSA_PSK;
- case CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA:
- return KeyExchangeAlgorithm.SRP;
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA:
- return KeyExchangeAlgorithm.SRP_DSS;
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA:
- return KeyExchangeAlgorithm.SRP_RSA;
- default:
- return -1;
- }
- }
- public static IList<int> GetKeyExchangeAlgorithms(int[] cipherSuites)
- {
- var result = new List<int>();
- if (null != cipherSuites)
- {
- for (int i = 0; i < cipherSuites.Length; ++i)
- {
- AddToSet(result, GetKeyExchangeAlgorithm(cipherSuites[i]));
- }
- result.Remove(-1);
- }
- return result;
- }
- public static int GetMacAlgorithm(int cipherSuite)
- {
- switch (cipherSuite)
- {
- case CipherSuite.TLS_AES_128_CCM_SHA256:
- case CipherSuite.TLS_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_AES_128_GCM_SHA256:
- case CipherSuite.TLS_AES_256_GCM_SHA384:
- case CipherSuite.TLS_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_SM4_CCM_SM3:
- case CipherSuite.TLS_SM4_GCM_SM3:
- return MacAlgorithm.cls_null;
- case CipherSuite.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_anon_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_DSS_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DH_RSA_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DHE_DSS_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_DHE_RSA_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_anon_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDH_RSA_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_ECDHE_RSA_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA:
- case CipherSuite.TLS_RSA_WITH_SEED_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_AES_128_CBC_SHA:
- case CipherSuite.TLS_SRP_SHA_WITH_AES_256_CBC_SHA:
- return MacAlgorithm.hmac_sha1;
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA256:
- return MacAlgorithm.hmac_sha256;
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_NULL_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384:
- return MacAlgorithm.hmac_sha384;
- default:
- return -1;
- }
- }
- public static ProtocolVersion GetMinimumVersion(int cipherSuite)
- {
- switch (cipherSuite)
- {
- case CipherSuite.TLS_AES_128_CCM_SHA256:
- case CipherSuite.TLS_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_AES_128_GCM_SHA256:
- case CipherSuite.TLS_AES_256_GCM_SHA384:
- case CipherSuite.TLS_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_SM4_CCM_SM3:
- case CipherSuite.TLS_SM4_GCM_SM3:
- return ProtocolVersion.TLSv13;
- case CipherSuite.TLS_DH_anon_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_DHE_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM:
- case CipherSuite.TLS_PSK_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_128_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM:
- case CipherSuite.TLS_RSA_WITH_AES_256_CCM_8:
- case CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_CBC_SHA384:
- case CipherSuite.TLS_RSA_WITH_ARIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256:
- case CipherSuite.TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384:
- case CipherSuite.TLS_RSA_WITH_NULL_SHA256:
- return ProtocolVersion.TLSv12;
- default:
- return ProtocolVersion.SSLv3;
- }
- }
- public static IList<int> GetNamedGroupRoles(int[] cipherSuites)
- {
- return GetNamedGroupRoles(GetKeyExchangeAlgorithms(cipherSuites));
- }
- public static IList<int> GetNamedGroupRoles(IList<int> keyExchangeAlgorithms)
- {
- var result = new List<int>();
- foreach (int keyExchangeAlgorithm in keyExchangeAlgorithms)
- {
- switch (keyExchangeAlgorithm)
- {
- case KeyExchangeAlgorithm.DH_anon:
- case KeyExchangeAlgorithm.DH_DSS:
- case KeyExchangeAlgorithm.DH_RSA:
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.DHE_PSK:
- case KeyExchangeAlgorithm.DHE_RSA:
- {
- AddToSet(result, NamedGroupRole.dh);
- break;
- }
- case KeyExchangeAlgorithm.ECDH_anon:
- case KeyExchangeAlgorithm.ECDH_RSA:
- case KeyExchangeAlgorithm.ECDHE_PSK:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- {
- AddToSet(result, NamedGroupRole.ecdh);
- break;
- }
- case KeyExchangeAlgorithm.ECDH_ECDSA:
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- {
- AddToSet(result, NamedGroupRole.ecdh);
- AddToSet(result, NamedGroupRole.ecdsa);
- break;
- }
- case KeyExchangeAlgorithm.NULL:
- {
- // TODO[tls13] We're conservatively adding both here, though maybe only one is needed
- AddToSet(result, NamedGroupRole.dh);
- AddToSet(result, NamedGroupRole.ecdh);
- break;
- }
- }
- }
- return result;
- }
- /// <exception cref="IOException"/>
- public static bool IsAeadCipherSuite(int cipherSuite)
- {
- return CipherType.aead == GetCipherType(cipherSuite);
- }
- /// <exception cref="IOException"/>
- public static bool IsBlockCipherSuite(int cipherSuite)
- {
- return CipherType.block == GetCipherType(cipherSuite);
- }
- /// <exception cref="IOException"/>
- public static bool IsStreamCipherSuite(int cipherSuite)
- {
- return CipherType.stream == GetCipherType(cipherSuite);
- }
- /// <returns>Whether a server can select the specified cipher suite given the available signature algorithms
- /// for ServerKeyExchange.</returns>
- public static bool IsValidCipherSuiteForSignatureAlgorithms(int cipherSuite, IList<short> sigAlgs)
- {
- int keyExchangeAlgorithm = GetKeyExchangeAlgorithm(cipherSuite);
- switch (keyExchangeAlgorithm)
- {
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.DHE_RSA:
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- case KeyExchangeAlgorithm.NULL:
- case KeyExchangeAlgorithm.SRP_RSA:
- case KeyExchangeAlgorithm.SRP_DSS:
- break;
- default:
- return true;
- }
- foreach (short signatureAlgorithm in sigAlgs)
- {
- if (IsValidSignatureAlgorithmForServerKeyExchange(signatureAlgorithm, keyExchangeAlgorithm))
- return true;
- }
- return false;
- }
- internal static bool IsValidCipherSuiteSelection(int[] offeredCipherSuites, int cipherSuite)
- {
- return null != offeredCipherSuites
- && Arrays.Contains(offeredCipherSuites, cipherSuite)
- && CipherSuite.TLS_NULL_WITH_NULL_NULL != cipherSuite
- && !CipherSuite.IsScsv(cipherSuite);
- }
- internal static bool IsValidKeyShareSelection(ProtocolVersion negotiatedVersion, int[] clientSupportedGroups,
- IDictionary<int, TlsAgreement> clientAgreements, int keyShareGroup)
- {
- return null != clientSupportedGroups
- && Arrays.Contains(clientSupportedGroups, keyShareGroup)
- && !clientAgreements.ContainsKey(keyShareGroup)
- && NamedGroup.CanBeNegotiated(keyShareGroup, negotiatedVersion);
- }
- internal static bool IsValidSignatureAlgorithmForServerKeyExchange(short signatureAlgorithm,
- int keyExchangeAlgorithm)
- {
- // TODO[tls13]
- switch (keyExchangeAlgorithm)
- {
- case KeyExchangeAlgorithm.DHE_RSA:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- case KeyExchangeAlgorithm.SRP_RSA:
- switch (signatureAlgorithm)
- {
- case SignatureAlgorithm.rsa:
- case SignatureAlgorithm.rsa_pss_rsae_sha256:
- case SignatureAlgorithm.rsa_pss_rsae_sha384:
- case SignatureAlgorithm.rsa_pss_rsae_sha512:
- case SignatureAlgorithm.rsa_pss_pss_sha256:
- case SignatureAlgorithm.rsa_pss_pss_sha384:
- case SignatureAlgorithm.rsa_pss_pss_sha512:
- return true;
- default:
- return false;
- }
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.SRP_DSS:
- return SignatureAlgorithm.dsa == signatureAlgorithm;
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- switch (signatureAlgorithm)
- {
- case SignatureAlgorithm.ecdsa:
- case SignatureAlgorithm.ed25519:
- case SignatureAlgorithm.ed448:
- return true;
- default:
- return false;
- }
- case KeyExchangeAlgorithm.NULL:
- return SignatureAlgorithm.anonymous != signatureAlgorithm;
- default:
- return false;
- }
- }
- public static bool IsValidSignatureSchemeForServerKeyExchange(int signatureScheme, int keyExchangeAlgorithm)
- {
- short signatureAlgorithm = SignatureScheme.GetSignatureAlgorithm(signatureScheme);
- return IsValidSignatureAlgorithmForServerKeyExchange(signatureAlgorithm, keyExchangeAlgorithm);
- }
- public static bool IsValidVersionForCipherSuite(int cipherSuite, ProtocolVersion version)
- {
- version = version.GetEquivalentTlsVersion();
- ProtocolVersion minimumVersion = GetMinimumVersion(cipherSuite);
- if (minimumVersion == version)
- return true;
- if (!minimumVersion.IsEarlierVersionOf(version))
- return false;
- return ProtocolVersion.TLSv13.IsEqualOrEarlierVersionOf(minimumVersion)
- || ProtocolVersion.TLSv13.IsLaterVersionOf(version);
- }
- /// <exception cref="IOException"/>
- public static SignatureAndHashAlgorithm ChooseSignatureAndHashAlgorithm(TlsContext context,
- IList<SignatureAndHashAlgorithm> sigHashAlgs, short signatureAlgorithm)
- {
- return ChooseSignatureAndHashAlgorithm(context.ServerVersion, sigHashAlgs, signatureAlgorithm);
- }
- /// <exception cref="IOException"/>
- public static SignatureAndHashAlgorithm ChooseSignatureAndHashAlgorithm(ProtocolVersion negotiatedVersion,
- IList<SignatureAndHashAlgorithm> sigHashAlgs, short signatureAlgorithm)
- {
- if (!IsTlsV12(negotiatedVersion))
- return null;
- if (sigHashAlgs == null)
- {
- /*
- * TODO[tls13] RFC 8446 4.2.3 Clients which desire the server to authenticate itself via
- * a certificate MUST send the "signature_algorithms" extension.
- */
- sigHashAlgs = GetDefaultSignatureAlgorithms(signatureAlgorithm);
- }
- SignatureAndHashAlgorithm result = null;
- foreach (SignatureAndHashAlgorithm sigHashAlg in sigHashAlgs)
- {
- if (sigHashAlg.Signature != signatureAlgorithm)
- continue;
- short hash = sigHashAlg.Hash;
- if (hash < MinimumHashStrict)
- continue;
- if (result == null)
- {
- result = sigHashAlg;
- continue;
- }
- short current = result.Hash;
- if (current < MinimumHashPreferred)
- {
- if (hash > current)
- {
- result = sigHashAlg;
- }
- }
- else if (hash >= MinimumHashPreferred)
- {
- if (hash < current)
- {
- result = sigHashAlg;
- }
- }
- }
- if (result == null)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return result;
- }
- public static IList<short> GetUsableSignatureAlgorithms(IList<SignatureAndHashAlgorithm> sigHashAlgs)
- {
- if (sigHashAlgs == null)
- return new List<short>(){ SignatureAlgorithm.rsa, SignatureAlgorithm.dsa, SignatureAlgorithm.ecdsa };
- var v = new List<short>();
- foreach (SignatureAndHashAlgorithm sigHashAlg in sigHashAlgs)
- {
- if (sigHashAlg.Hash >= MinimumHashStrict)
- {
- short sigAlg = sigHashAlg.Signature;
- if (!v.Contains(sigAlg))
- {
- // TODO Check for crypto support before choosing (or pass in cached list?)
- v.Add(sigAlg);
- }
- }
- }
- return v;
- }
- public static int GetCommonCipherSuite13(ProtocolVersion negotiatedVersion, int[] peerCipherSuites,
- int[] localCipherSuites, bool useLocalOrder)
- {
- int[] ordered = peerCipherSuites, unordered = localCipherSuites;
- if (useLocalOrder)
- {
- ordered = localCipherSuites;
- unordered = peerCipherSuites;
- }
- for (int i = 0; i < ordered.Length; ++i)
- {
- int candidate = ordered[i];
- if (Arrays.Contains(unordered, candidate) &&
- IsValidVersionForCipherSuite(candidate, negotiatedVersion))
- {
- return candidate;
- }
- }
- return -1;
- }
- public static int[] GetCommonCipherSuites(int[] peerCipherSuites, int[] localCipherSuites, bool useLocalOrder)
- {
- int[] ordered = peerCipherSuites, unordered = localCipherSuites;
- if (useLocalOrder)
- {
- ordered = localCipherSuites;
- unordered = peerCipherSuites;
- }
- int count = 0, limit = System.Math.Min(ordered.Length, unordered.Length);
- int[] candidates = new int[limit];
- for (int i = 0; i < ordered.Length; ++i)
- {
- int candidate = ordered[i];
- if (!Contains(candidates, 0, count, candidate)
- && Arrays.Contains(unordered, candidate))
- {
- candidates[count++] = candidate;
- }
- }
- if (count < limit)
- {
- candidates = Arrays.CopyOf(candidates, count);
- }
- return candidates;
- }
- public static int[] GetSupportedCipherSuites(TlsCrypto crypto, int[] suites)
- {
- return GetSupportedCipherSuites(crypto, suites, 0, suites.Length);
- }
- public static int[] GetSupportedCipherSuites(TlsCrypto crypto, int[] suites, int suitesOff, int suitesCount)
- {
- int[] supported = new int[suitesCount];
- int count = 0;
- for (int i = 0; i < suitesCount; ++i)
- {
- int suite = suites[suitesOff + i];
- if (IsSupportedCipherSuite(crypto, suite))
- {
- supported[count++] = suite;
- }
- }
- if (count < suitesCount)
- {
- supported = Arrays.CopyOf(supported, count);
- }
- return supported;
- }
- public static bool IsSupportedCipherSuite(TlsCrypto crypto, int cipherSuite)
- {
- int keyExchangeAlgorithm = GetKeyExchangeAlgorithm(cipherSuite);
- if (!IsSupportedKeyExchange(crypto, keyExchangeAlgorithm))
- return false;
- int encryptionAlgorithm = GetEncryptionAlgorithm(cipherSuite);
- if (encryptionAlgorithm < 0 || !crypto.HasEncryptionAlgorithm(encryptionAlgorithm))
- return false;
- int macAlgorithm = GetMacAlgorithm(cipherSuite);
- if (macAlgorithm != MacAlgorithm.cls_null)
- {
- if (macAlgorithm < 0 || !crypto.HasMacAlgorithm(macAlgorithm))
- return false;
- }
- return true;
- }
- public static bool IsSupportedKeyExchange(TlsCrypto crypto, int keyExchangeAlgorithm)
- {
- switch (keyExchangeAlgorithm)
- {
- case KeyExchangeAlgorithm.DH_anon:
- case KeyExchangeAlgorithm.DH_DSS:
- case KeyExchangeAlgorithm.DH_RSA:
- case KeyExchangeAlgorithm.DHE_PSK:
- return crypto.HasDHAgreement();
- case KeyExchangeAlgorithm.DHE_DSS:
- return crypto.HasDHAgreement()
- && crypto.HasSignatureAlgorithm(SignatureAlgorithm.dsa);
- case KeyExchangeAlgorithm.DHE_RSA:
- return crypto.HasDHAgreement()
- && HasAnyRsaSigAlgs(crypto);
- case KeyExchangeAlgorithm.ECDH_anon:
- case KeyExchangeAlgorithm.ECDH_ECDSA:
- case KeyExchangeAlgorithm.ECDH_RSA:
- case KeyExchangeAlgorithm.ECDHE_PSK:
- return crypto.HasECDHAgreement();
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- return crypto.HasECDHAgreement()
- && (crypto.HasSignatureAlgorithm(SignatureAlgorithm.ecdsa)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.ed25519)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.ed448));
- case KeyExchangeAlgorithm.ECDHE_RSA:
- return crypto.HasECDHAgreement()
- && HasAnyRsaSigAlgs(crypto);
- case KeyExchangeAlgorithm.NULL:
- case KeyExchangeAlgorithm.PSK:
- return true;
- case KeyExchangeAlgorithm.RSA:
- case KeyExchangeAlgorithm.RSA_PSK:
- return crypto.HasRsaEncryption();
- case KeyExchangeAlgorithm.SRP:
- return crypto.HasSrpAuthentication();
- case KeyExchangeAlgorithm.SRP_DSS:
- return crypto.HasSrpAuthentication()
- && crypto.HasSignatureAlgorithm(SignatureAlgorithm.dsa);
- case KeyExchangeAlgorithm.SRP_RSA:
- return crypto.HasSrpAuthentication()
- && HasAnyRsaSigAlgs(crypto);
- default:
- return false;
- }
- }
- internal static bool HasAnyRsaSigAlgs(TlsCrypto crypto)
- {
- return crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_rsae_sha256)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_rsae_sha384)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_rsae_sha512)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_pss_sha256)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_pss_sha384)
- || crypto.HasSignatureAlgorithm(SignatureAlgorithm.rsa_pss_pss_sha512);
- }
- internal static byte[] GetCurrentPrfHash(TlsHandshakeHash handshakeHash)
- {
- return handshakeHash.ForkPrfHash().CalculateHash();
- }
- private static TlsHash CreateHash(TlsCrypto crypto, short hashAlgorithm)
- {
- return crypto.CreateHash(TlsCryptoUtilities.GetHash(hashAlgorithm));
- }
- private static TlsHash CreateHash(TlsCrypto crypto, SignatureAndHashAlgorithm signatureAndHashAlgorithm)
- {
- return crypto.CreateHash(SignatureScheme.GetCryptoHashAlgorithm(signatureAndHashAlgorithm));
- }
- /// <exception cref="IOException"/>
- private static TlsKeyExchange CreateKeyExchangeClient(TlsClient client, int keyExchange)
- {
- TlsKeyExchangeFactory factory = client.GetKeyExchangeFactory();
- switch (keyExchange)
- {
- case KeyExchangeAlgorithm.DH_anon:
- return factory.CreateDHanonKeyExchangeClient(keyExchange, client.GetDHGroupVerifier());
- case KeyExchangeAlgorithm.DH_DSS:
- case KeyExchangeAlgorithm.DH_RSA:
- return factory.CreateDHKeyExchange(keyExchange);
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.DHE_RSA:
- return factory.CreateDheKeyExchangeClient(keyExchange, client.GetDHGroupVerifier());
- case KeyExchangeAlgorithm.ECDH_anon:
- return factory.CreateECDHanonKeyExchangeClient(keyExchange);
- case KeyExchangeAlgorithm.ECDH_ECDSA:
- case KeyExchangeAlgorithm.ECDH_RSA:
- return factory.CreateECDHKeyExchange(keyExchange);
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- return factory.CreateECDheKeyExchangeClient(keyExchange);
- case KeyExchangeAlgorithm.RSA:
- return factory.CreateRsaKeyExchange(keyExchange);
- case KeyExchangeAlgorithm.DHE_PSK:
- return factory.CreatePskKeyExchangeClient(keyExchange, client.GetPskIdentity(),
- client.GetDHGroupVerifier());
- case KeyExchangeAlgorithm.ECDHE_PSK:
- case KeyExchangeAlgorithm.PSK:
- case KeyExchangeAlgorithm.RSA_PSK:
- return factory.CreatePskKeyExchangeClient(keyExchange, client.GetPskIdentity(), null);
- case KeyExchangeAlgorithm.SRP:
- case KeyExchangeAlgorithm.SRP_DSS:
- case KeyExchangeAlgorithm.SRP_RSA:
- return factory.CreateSrpKeyExchangeClient(keyExchange, client.GetSrpIdentity(),
- client.GetSrpConfigVerifier());
- default:
- /*
- * Note: internal error here; the TlsProtocol implementation verifies that the
- * server-selected cipher suite was in the list of client-offered cipher suites, so if
- * we now can't produce an implementation, we shouldn't have offered it!
- */
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- }
- /// <exception cref="IOException"/>
- private static TlsKeyExchange CreateKeyExchangeServer(TlsServer server, int keyExchange)
- {
- TlsKeyExchangeFactory factory = server.GetKeyExchangeFactory();
- switch (keyExchange)
- {
- case KeyExchangeAlgorithm.DH_anon:
- return factory.CreateDHanonKeyExchangeServer(keyExchange, server.GetDHConfig());
- case KeyExchangeAlgorithm.DH_DSS:
- case KeyExchangeAlgorithm.DH_RSA:
- return factory.CreateDHKeyExchange(keyExchange);
- case KeyExchangeAlgorithm.DHE_DSS:
- case KeyExchangeAlgorithm.DHE_RSA:
- return factory.CreateDheKeyExchangeServer(keyExchange, server.GetDHConfig());
- case KeyExchangeAlgorithm.ECDH_anon:
- return factory.CreateECDHanonKeyExchangeServer(keyExchange, server.GetECDHConfig());
- case KeyExchangeAlgorithm.ECDH_ECDSA:
- case KeyExchangeAlgorithm.ECDH_RSA:
- return factory.CreateECDHKeyExchange(keyExchange);
- case KeyExchangeAlgorithm.ECDHE_ECDSA:
- case KeyExchangeAlgorithm.ECDHE_RSA:
- return factory.CreateECDheKeyExchangeServer(keyExchange, server.GetECDHConfig());
- case KeyExchangeAlgorithm.RSA:
- return factory.CreateRsaKeyExchange(keyExchange);
- case KeyExchangeAlgorithm.DHE_PSK:
- return factory.CreatePskKeyExchangeServer(keyExchange, server.GetPskIdentityManager(),
- server.GetDHConfig(), null);
- case KeyExchangeAlgorithm.ECDHE_PSK:
- return factory.CreatePskKeyExchangeServer(keyExchange, server.GetPskIdentityManager(), null,
- server.GetECDHConfig());
- case KeyExchangeAlgorithm.PSK:
- case KeyExchangeAlgorithm.RSA_PSK:
- return factory.CreatePskKeyExchangeServer(keyExchange, server.GetPskIdentityManager(), null, null);
- case KeyExchangeAlgorithm.SRP:
- case KeyExchangeAlgorithm.SRP_DSS:
- case KeyExchangeAlgorithm.SRP_RSA:
- return factory.CreateSrpKeyExchangeServer(keyExchange, server.GetSrpLoginParameters());
- default:
- /*
- * Note: internal error here; the TlsProtocol implementation verifies that the
- * server-selected cipher suite was in the list of client-offered cipher suites, so if
- * we now can't produce an implementation, we shouldn't have offered it!
- */
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- }
- /// <exception cref="IOException"/>
- internal static TlsKeyExchange InitKeyExchangeClient(TlsClientContext clientContext, TlsClient client)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- TlsKeyExchange keyExchange = CreateKeyExchangeClient(client, securityParameters.KeyExchangeAlgorithm);
- keyExchange.Init(clientContext);
- return keyExchange;
- }
- /// <exception cref="IOException"/>
- internal static TlsKeyExchange InitKeyExchangeServer(TlsServerContext serverContext, TlsServer server)
- {
- SecurityParameters securityParameters = serverContext.SecurityParameters;
- TlsKeyExchange keyExchange = CreateKeyExchangeServer(server, securityParameters.KeyExchangeAlgorithm);
- keyExchange.Init(serverContext);
- return keyExchange;
- }
- internal static TlsCipher InitCipher(TlsContext context)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- int cipherSuite = securityParameters.CipherSuite;
- int encryptionAlgorithm = GetEncryptionAlgorithm(cipherSuite);
- int macAlgorithm = GetMacAlgorithm(cipherSuite);
- if (encryptionAlgorithm < 0 || macAlgorithm < 0)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return context.Crypto.CreateCipher(new TlsCryptoParameters(context), encryptionAlgorithm, macAlgorithm);
- }
- /// <summary>Check the signature algorithm for certificates in the peer's CertPath as specified in RFC 5246
- /// 7.4.2, 7.4.4, 7.4.6 and similar rules for earlier TLS versions.</summary>
- /// <remarks>
- /// The supplied CertPath should include the trust anchor (its signature algorithm isn't checked, but in the
- /// general case checking a certificate requires the issuer certificate).
- /// </remarks>
- /// <exception cref="IOException">if any certificate in the CertPath (excepting the trust anchor) has a
- /// signature algorithm that is not one of the locally supported signature algorithms.</exception>
- public static void CheckPeerSigAlgs(TlsContext context, TlsCertificate[] peerCertPath)
- {
- if (context.IsServer)
- {
- CheckSigAlgOfClientCerts(context, peerCertPath);
- }
- else
- {
- CheckSigAlgOfServerCerts(context, peerCertPath);
- }
- }
- private static void CheckSigAlgOfClientCerts(TlsContext context, TlsCertificate[] clientCertPath)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- short[] clientCertTypes = securityParameters.ClientCertTypes;
- var serverSigAlgsCert = securityParameters.ServerSigAlgsCert;
- int trustAnchorPos = clientCertPath.Length - 1;
- for (int i = 0; i < trustAnchorPos; ++i)
- {
- TlsCertificate subjectCert = clientCertPath[i];
- TlsCertificate issuerCert = clientCertPath[i + 1];
- SignatureAndHashAlgorithm sigAndHashAlg = GetCertSigAndHashAlg(subjectCert, issuerCert);
- bool valid = false;
- if (null == sigAndHashAlg)
- {
- // We don't recognize the 'signatureAlgorithm' of the certificate
- }
- else if (null == serverSigAlgsCert)
- {
- // TODO Review this (legacy) logic with RFC 4346 (7.4?.2?)
- if (null != clientCertTypes)
- {
- for (int j = 0; j < clientCertTypes.Length; ++j)
- {
- short signatureAlgorithm = GetLegacySignatureAlgorithmClientCert(clientCertTypes[j]);
- if (sigAndHashAlg.Signature == signatureAlgorithm)
- {
- valid = true;
- break;
- }
- }
- }
- }
- else
- {
- /*
- * RFC 5246 7.4.4 Any certificates provided by the client MUST be signed using a
- * hash/signature algorithm pair found in supported_signature_algorithms.
- */
- valid = ContainsSignatureAlgorithm(serverSigAlgsCert, sigAndHashAlg);
- }
- if (!valid)
- {
- throw new TlsFatalAlert(AlertDescription.bad_certificate);
- }
- }
- }
- private static void CheckSigAlgOfServerCerts(TlsContext context, TlsCertificate[] serverCertPath)
- {
- SecurityParameters securityParameters = context.SecurityParameters;
- var clientSigAlgsCert = securityParameters.ClientSigAlgsCert;
- var clientSigAlgs = securityParameters.ClientSigAlgs;
- /*
- * NOTE: For TLS 1.2, we'll check 'signature_algorithms' too (if it's distinct), since
- * there's no way of knowing whether the server understood 'signature_algorithms_cert'.
- */
- if (clientSigAlgs == clientSigAlgsCert || IsTlsV13(securityParameters.NegotiatedVersion))
- {
- clientSigAlgs = null;
- }
- int trustAnchorPos = serverCertPath.Length - 1;
- for (int i = 0; i < trustAnchorPos; ++i)
- {
- TlsCertificate subjectCert = serverCertPath[i];
- TlsCertificate issuerCert = serverCertPath[i + 1];
- SignatureAndHashAlgorithm sigAndHashAlg = GetCertSigAndHashAlg(subjectCert, issuerCert);
- bool valid = false;
- if (null == sigAndHashAlg)
- {
- // We don't recognize the 'signatureAlgorithm' of the certificate
- }
- else if (null == clientSigAlgsCert)
- {
- /*
- * RFC 4346 7.4.2. Unless otherwise specified, the signing algorithm for the
- * certificate MUST be the same as the algorithm for the certificate key.
- */
- short signatureAlgorithm = GetLegacySignatureAlgorithmServerCert(
- securityParameters.KeyExchangeAlgorithm);
- valid = (signatureAlgorithm == sigAndHashAlg.Signature);
- }
- else
- {
- /*
- * RFC 5246 7.4.2. If the client provided a "signature_algorithms" extension, then
- * all certificates provided by the server MUST be signed by a hash/signature algorithm
- * pair that appears in that extension.
- */
- valid = ContainsSignatureAlgorithm(clientSigAlgsCert, sigAndHashAlg)
- || (null != clientSigAlgs && ContainsSignatureAlgorithm(clientSigAlgs, sigAndHashAlg));
- }
- if (!valid)
- throw new TlsFatalAlert(AlertDescription.bad_certificate);
- }
- }
- internal static void CheckTlsFeatures(Certificate serverCertificate, IDictionary<int, byte[]> clientExtensions,
- IDictionary<int, byte[]> serverExtensions)
- {
- /*
- * RFC 7633 4.3.3. A client MUST treat a certificate with a TLS feature extension as an
- * invalid certificate if the features offered by the server do not contain all features
- * present in both the client's ClientHello message and the TLS feature extension.
- */
- byte[] tlsFeatures = serverCertificate.GetCertificateAt(0).GetExtension(TlsObjectIdentifiers.id_pe_tlsfeature);
- if (tlsFeatures != null)
- {
- // TODO[tls] Proper ASN.1 type class for this extension?
- Asn1Sequence tlsFeaturesSeq = (Asn1Sequence)ReadAsn1Object(tlsFeatures);
- for (int i = 0; i < tlsFeaturesSeq.Count; ++i)
- {
- if (!(tlsFeaturesSeq[i] is DerInteger))
- throw new TlsFatalAlert(AlertDescription.bad_certificate);
- }
- RequireDerEncoding(tlsFeaturesSeq, tlsFeatures);
- foreach (DerInteger tlsExtensionElement in tlsFeaturesSeq)
- {
- BigInteger tlsExtension = tlsExtensionElement.PositiveValue;
- if (tlsExtension.BitLength <= 16)
- {
- int extensionType = tlsExtension.IntValueExact;
- if (clientExtensions.ContainsKey(extensionType) && !serverExtensions.ContainsKey(extensionType))
- throw new TlsFatalAlert(AlertDescription.certificate_unknown);
- }
- }
- }
- }
- internal static void ProcessClientCertificate(TlsServerContext serverContext, Certificate clientCertificate,
- TlsKeyExchange keyExchange, TlsServer server)
- {
- SecurityParameters securityParameters = serverContext.SecurityParameters;
- if (null != securityParameters.PeerCertificate)
- throw new TlsFatalAlert(AlertDescription.unexpected_message);
- bool isTlsV13 = IsTlsV13(securityParameters.NegotiatedVersion);
- if (isTlsV13)
- {
- // 'keyExchange' not used
- }
- else if (clientCertificate.IsEmpty)
- {
- /*
- * NOTE: We tolerate SSLv3 clients sending an empty chain, although "If no suitable
- * certificate is available, the client should send a no_certificate alert instead".
- */
- keyExchange.SkipClientCredentials();
- }
- else
- {
- keyExchange.ProcessClientCertificate(clientCertificate);
- }
- securityParameters.m_peerCertificate = clientCertificate;
- /*
- * RFC 5246 7.4.6. If the client does not send any certificates, the server MAY at its
- * discretion either continue the handshake without client authentication, or respond with a
- * fatal handshake_failure alert. Also, if some aspect of the certificate chain was
- * unacceptable (e.g., it was not signed by a known, trusted CA), the server MAY at its
- * discretion either continue the handshake (considering the client unauthenticated) or send
- * a fatal alert.
- */
- server.NotifyClientCertificate(clientCertificate);
- }
- internal static void ProcessServerCertificate(TlsClientContext clientContext,
- CertificateStatus serverCertificateStatus, TlsKeyExchange keyExchange,
- TlsAuthentication clientAuthentication, IDictionary<int, byte[]> clientExtensions,
- IDictionary<int, byte[]> serverExtensions)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- bool isTlsV13 = IsTlsV13(securityParameters.NegotiatedVersion);
- if (null == clientAuthentication)
- {
- if (isTlsV13)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- if (securityParameters.IsRenegotiating)
- {
- throw new TlsFatalAlert(AlertDescription.handshake_failure);
- }
- // There was no server certificate message; check it's OK
- keyExchange.SkipServerCredentials();
- securityParameters.m_tlsServerEndPoint = EmptyBytes;
- return;
- }
- Certificate serverCertificate = securityParameters.PeerCertificate;
- CheckTlsFeatures(serverCertificate, clientExtensions, serverExtensions);
- if (!isTlsV13)
- {
- keyExchange.ProcessServerCertificate(serverCertificate);
- }
- clientAuthentication.NotifyServerCertificate(
- new TlsServerCertificateImpl(serverCertificate, serverCertificateStatus));
- }
- internal static SignatureAndHashAlgorithm GetCertSigAndHashAlg(TlsCertificate subjectCert, TlsCertificate issuerCert)
- {
- string sigAlgOid = subjectCert.SigAlgOid;
- if (null != sigAlgOid)
- {
- if (!PkcsObjectIdentifiers.IdRsassaPss.Id.Equals(sigAlgOid))
- return CollectionUtilities.GetValueOrNull(CertSigAlgOids, sigAlgOid);
- RsassaPssParameters pssParams = RsassaPssParameters.GetInstance(subjectCert.GetSigAlgParams());
- if (null != pssParams)
- {
- DerObjectIdentifier hashOid = pssParams.HashAlgorithm.Algorithm;
- if (NistObjectIdentifiers.IdSha256.Equals(hashOid))
- {
- if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_pss_sha256))
- return SignatureAndHashAlgorithm.rsa_pss_pss_sha256;
- if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_rsae_sha256))
- return SignatureAndHashAlgorithm.rsa_pss_rsae_sha256;
- }
- else if (NistObjectIdentifiers.IdSha384.Equals(hashOid))
- {
- if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_pss_sha384))
- return SignatureAndHashAlgorithm.rsa_pss_pss_sha384;
- if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_rsae_sha384))
- return SignatureAndHashAlgorithm.rsa_pss_rsae_sha384;
- }
- else if (NistObjectIdentifiers.IdSha512.Equals(hashOid))
- {
- if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_pss_sha512))
- return SignatureAndHashAlgorithm.rsa_pss_pss_sha512;
- if (issuerCert.SupportsSignatureAlgorithmCA(SignatureAlgorithm.rsa_pss_rsae_sha512))
- return SignatureAndHashAlgorithm.rsa_pss_rsae_sha512;
- }
- }
- }
- return null;
- }
- internal static CertificateRequest ValidateCertificateRequest(CertificateRequest certificateRequest,
- TlsKeyExchange keyExchange)
- {
- short[] validClientCertificateTypes = keyExchange.GetClientCertificateTypes();
- if (IsNullOrEmpty(validClientCertificateTypes))
- throw new TlsFatalAlert(AlertDescription.unexpected_message);
- certificateRequest = NormalizeCertificateRequest(certificateRequest, validClientCertificateTypes);
- if (certificateRequest == null)
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- return certificateRequest;
- }
- internal static CertificateRequest NormalizeCertificateRequest(CertificateRequest certificateRequest,
- short[] validClientCertificateTypes)
- {
- if (ContainsAll(validClientCertificateTypes, certificateRequest.CertificateTypes))
- return certificateRequest;
- short[] retained = RetainAll(certificateRequest.CertificateTypes, validClientCertificateTypes);
- if (retained.Length < 1)
- return null;
- // TODO Filter for unique sigAlgs/CAs only
- return new CertificateRequest(retained, certificateRequest.SupportedSignatureAlgorithms,
- certificateRequest.CertificateAuthorities);
- }
- internal static bool Contains(int[] buf, int off, int len, int value)
- {
- for (int i = 0; i < len; ++i)
- {
- if (value == buf[off + i])
- return true;
- }
- return false;
- }
- internal static bool ContainsAll(short[] container, short[] elements)
- {
- for (int i = 0; i < elements.Length; ++i)
- {
- if (!Arrays.Contains(container, elements[i]))
- return false;
- }
- return true;
- }
- internal static short[] RetainAll(short[] retainer, short[] elements)
- {
- short[] retained = new short[System.Math.Min(retainer.Length, elements.Length)];
- int count = 0;
- for (int i = 0; i < elements.Length; ++i)
- {
- if (Arrays.Contains(retainer, elements[i]))
- {
- retained[count++] = elements[i];
- }
- }
- return Truncate(retained, count);
- }
- internal static short[] Truncate(short[] a, int n)
- {
- if (n >= a.Length)
- return a;
- short[] t = new short[n];
- Array.Copy(a, 0, t, 0, n);
- return t;
- }
- internal static int[] Truncate(int[] a, int n)
- {
- if (n >= a.Length)
- return a;
- int[] t = new int[n];
- Array.Copy(a, 0, t, 0, n);
- return t;
- }
- /// <exception cref="IOException"/>
- internal static TlsCredentialedAgreement RequireAgreementCredentials(TlsCredentials credentials)
- {
- if (!(credentials is TlsCredentialedAgreement))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return (TlsCredentialedAgreement)credentials;
- }
- /// <exception cref="IOException"/>
- internal static TlsCredentialedDecryptor RequireDecryptorCredentials(TlsCredentials credentials)
- {
- if (!(credentials is TlsCredentialedDecryptor))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return (TlsCredentialedDecryptor)credentials;
- }
- /// <exception cref="IOException"/>
- internal static TlsCredentialedSigner RequireSignerCredentials(TlsCredentials credentials)
- {
- if (!(credentials is TlsCredentialedSigner))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return (TlsCredentialedSigner)credentials;
- }
- /// <exception cref="IOException"/>
- private static void CheckClientCertificateType(CertificateRequest certificateRequest,
- short clientCertificateType, short alertDescription)
- {
- if (clientCertificateType < 0
- || !Arrays.Contains(certificateRequest.CertificateTypes, clientCertificateType))
- {
- throw new TlsFatalAlert(alertDescription);
- }
- }
- private static void CheckDowngradeMarker(byte[] randomBlock, byte[] downgradeMarker)
- {
- int len = downgradeMarker.Length;
- if (ConstantTimeAreEqual(len, downgradeMarker, 0, randomBlock, randomBlock.Length - len))
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- }
- internal static void CheckDowngradeMarker(ProtocolVersion version, byte[] randomBlock)
- {
- version = version.GetEquivalentTlsVersion();
- if (version.IsEqualOrEarlierVersionOf(ProtocolVersion.TLSv11))
- {
- CheckDowngradeMarker(randomBlock, DowngradeTlsV11);
- }
- if (version.IsEqualOrEarlierVersionOf(ProtocolVersion.TLSv12))
- {
- CheckDowngradeMarker(randomBlock, DowngradeTlsV12);
- }
- }
- internal static void WriteDowngradeMarker(ProtocolVersion version, byte[] randomBlock)
- {
- version = version.GetEquivalentTlsVersion();
- byte[] marker;
- if (ProtocolVersion.TLSv12 == version)
- {
- marker = DowngradeTlsV12;
- }
- else if (version.IsEqualOrEarlierVersionOf(ProtocolVersion.TLSv11))
- {
- marker = DowngradeTlsV11;
- }
- else
- {
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- Array.Copy(marker, 0, randomBlock, randomBlock.Length - marker.Length, marker.Length);
- }
- private static bool areCertificatesEqual(Certificate a, Certificate b)
- {
- int length = a.Length;
- if (b.Length == length)
- {
- try
- {
- for (int i = 0; i < length; ++i)
- {
- TlsCertificate ai = a.GetCertificateAt(i);
- TlsCertificate bi = b.GetCertificateAt(i);
- if (!Arrays.AreEqual(ai.GetEncoded(), bi.GetEncoded()))
- {
- return false;
- }
- }
- return true;
- }
- catch (Exception e)
- {
- }
- }
- return false;
- }
- private static bool isSafeRenegotiationServerCertificate(TlsClientContext clientContext, Certificate serverCertificate)
- {
- SecurityParameters securityParametersConnection = clientContext.SecurityParameters;
- if (securityParametersConnection != null)
- {
- Certificate previousCertificate = securityParametersConnection.PreRenegotiatingServerCert;
- if (null != previousCertificate)
- {
- return areCertificatesEqual(previousCertificate, serverCertificate);
- }
- }
- return false;
- }
- internal static TlsAuthentication ReceiveServerCertificate(TlsClientContext clientContext, TlsClient client,
- MemoryStream buf, IDictionary<int, byte[]> serverExtensions)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- if (KeyExchangeAlgorithm.IsAnonymous(securityParameters.KeyExchangeAlgorithm)
- || null != securityParameters.PeerCertificate)
- {
- throw new TlsFatalAlert(AlertDescription.unexpected_message);
- }
- MemoryStream endPointHash = new MemoryStream();
- Certificate.ParseOptions options = new Certificate.ParseOptions()
- {
- CertificateType = TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(serverExtensions,
- CertificateType.X509),
- MaxChainLength = client.GetMaxCertificateChainLength(),
- };
- Certificate serverCertificate = Certificate.Parse(options, clientContext, buf, endPointHash);
- TlsProtocol.AssertEmpty(buf);
- if (serverCertificate.IsEmpty)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- if (securityParameters.IsRenegotiating && !isSafeRenegotiationServerCertificate(clientContext, serverCertificate))
- {
- throw new TlsFatalAlert(AlertDescription.certificate_unknown, "Server certificate changed unsafely in renegotiation handshake");
- }
- securityParameters.PreRenegotiatingServerCert = null;
- securityParameters.m_peerCertificate = serverCertificate;
- securityParameters.m_tlsServerEndPoint = endPointHash.ToArray();
- TlsAuthentication authentication = client.GetAuthentication();
- if (null == authentication)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return authentication;
- }
- internal static TlsAuthentication Receive13ServerCertificate(TlsClientContext clientContext, TlsClient client,
- MemoryStream buf, IDictionary<int, byte[]> serverExtensions)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- if (null != securityParameters.PeerCertificate)
- throw new TlsFatalAlert(AlertDescription.unexpected_message);
- Certificate.ParseOptions options = new Certificate.ParseOptions()
- {
- CertificateType = TlsExtensionsUtilities.GetServerCertificateTypeExtensionServer(serverExtensions,
- CertificateType.X509),
- MaxChainLength = client.GetMaxCertificateChainLength(),
- };
- Certificate serverCertificate = Certificate.Parse(options, clientContext, buf, null);
- TlsProtocol.AssertEmpty(buf);
- if (serverCertificate.GetCertificateRequestContext().Length > 0)
- throw new TlsFatalAlert(AlertDescription.illegal_parameter);
- if (serverCertificate.IsEmpty)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- securityParameters.m_peerCertificate = serverCertificate;
- securityParameters.m_tlsServerEndPoint = null;
- TlsAuthentication authentication = client.GetAuthentication();
- if (null == authentication)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return authentication;
- }
- internal static TlsAuthentication Skip13ServerCertificate(TlsClientContext clientContext)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- if (null != securityParameters.PeerCertificate)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- securityParameters.m_peerCertificate = null;
- securityParameters.m_tlsServerEndPoint = null;
- return null;
- }
- public static bool ContainsNonAscii(byte[] bs)
- {
- for (int i = 0; i < bs.Length; ++i)
- {
- int c = bs[i];
- if (c >= 0x80)
- return true;
- }
- return false;
- }
- public static bool ContainsNonAscii(string s)
- {
- for (int i = 0; i < s.Length; ++i)
- {
- int c = s[i];
- if (c >= 0x80)
- return true;
- }
- return false;
- }
- internal static IDictionary<int, TlsAgreement> AddKeyShareToClientHello(TlsClientContext clientContext,
- TlsClient client, IDictionary<int, byte[]> clientExtensions)
- {
- /*
- * RFC 8446 9.2. If containing a "supported_groups" extension, it MUST also contain a
- * "key_share" extension, and vice versa. An empty KeyShare.client_shares vector is
- * permitted.
- */
- if (!IsTlsV13(clientContext.ClientVersion)
- || !clientExtensions.ContainsKey(ExtensionType.supported_groups))
- {
- return null;
- }
- var supportedGroups = TlsExtensionsUtilities.GetSupportedGroupsExtension(clientExtensions);
- var keyShareGroups = client.GetEarlyKeyShareGroups();
- var clientAgreements = new Dictionary<int, TlsAgreement>(3);
- var clientShares = new List<KeyShareEntry>(2);
- CollectKeyShares(clientContext.Crypto, supportedGroups, keyShareGroups, clientAgreements, clientShares);
- // TODO[tls13-psk] When clientShares empty, consider not adding extension if pre_shared_key in use
- TlsExtensionsUtilities.AddKeyShareClientHello(clientExtensions, clientShares);
- return clientAgreements;
- }
- internal static IDictionary<int, TlsAgreement> AddKeyShareToClientHelloRetry(TlsClientContext clientContext,
- IDictionary<int, byte[]> clientExtensions, int keyShareGroup)
- {
- int[] supportedGroups = new int[]{ keyShareGroup };
- var keyShareGroups = VectorOfOne(keyShareGroup);
- var clientAgreements = new Dictionary<int, TlsAgreement>(1);
- var clientShares = new List<KeyShareEntry>(1);
- CollectKeyShares(clientContext.Crypto, supportedGroups, keyShareGroups, clientAgreements, clientShares);
- TlsExtensionsUtilities.AddKeyShareClientHello(clientExtensions, clientShares);
- if (clientAgreements.Count < 1 || clientShares.Count < 1)
- {
- // NOTE: Probable cause is declaring an unsupported NamedGroup in supported_groups extension
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- return clientAgreements;
- }
- private static void CollectKeyShares(TlsCrypto crypto, int[] supportedGroups, IList<int> keyShareGroups,
- IDictionary<int, TlsAgreement> clientAgreements, IList<KeyShareEntry> clientShares)
- {
- if (IsNullOrEmpty(supportedGroups))
- return;
- if (null == keyShareGroups || keyShareGroups.Count < 1)
- return;
- for (int i = 0; i < supportedGroups.Length; ++i)
- {
- int supportedGroup = supportedGroups[i];
- if (!keyShareGroups.Contains(supportedGroup)
- || clientAgreements.ContainsKey(supportedGroup)
- || !crypto.HasNamedGroup(supportedGroup))
- {
- continue;
- }
- TlsAgreement agreement = null;
- if (NamedGroup.RefersToASpecificCurve(supportedGroup))
- {
- if (crypto.HasECDHAgreement())
- {
- agreement = crypto.CreateECDomain(new TlsECConfig(supportedGroup)).CreateECDH();
- }
- }
- else if (NamedGroup.RefersToASpecificFiniteField(supportedGroup))
- {
- if (crypto.HasDHAgreement())
- {
- agreement = crypto.CreateDHDomain(new TlsDHConfig(supportedGroup, true)).CreateDH();
- }
- }
- if (null != agreement)
- {
- byte[] key_exchange = agreement.GenerateEphemeral();
- KeyShareEntry clientShare = new KeyShareEntry(supportedGroup, key_exchange);
- clientShares.Add(clientShare);
- clientAgreements[supportedGroup] = agreement;
- }
- }
- }
- internal static KeyShareEntry SelectKeyShare(IList<KeyShareEntry> clientShares, int keyShareGroup)
- {
- if (null != clientShares && 1 == clientShares.Count)
- {
- KeyShareEntry clientShare = (KeyShareEntry)clientShares[0];
- if (null != clientShare && clientShare.NamedGroup == keyShareGroup)
- {
- return clientShare;
- }
- }
- return null;
- }
- internal static KeyShareEntry SelectKeyShare(TlsCrypto crypto, ProtocolVersion negotiatedVersion,
- IList<KeyShareEntry> clientShares, int[] clientSupportedGroups, int[] serverSupportedGroups)
- {
- if (null != clientShares && !IsNullOrEmpty(clientSupportedGroups) && !IsNullOrEmpty(serverSupportedGroups))
- {
- foreach (KeyShareEntry clientShare in clientShares)
- {
- int group = clientShare.NamedGroup;
- if (!NamedGroup.CanBeNegotiated(group, negotiatedVersion))
- continue;
- if (!Arrays.Contains(serverSupportedGroups, group) ||
- !Arrays.Contains(clientSupportedGroups, group))
- {
- continue;
- }
- if (!crypto.HasNamedGroup(group))
- continue;
- if ((NamedGroup.RefersToASpecificCurve(group) && !crypto.HasECDHAgreement()) ||
- (NamedGroup.RefersToASpecificFiniteField(group) && !crypto.HasDHAgreement()))
- {
- continue;
- }
- return clientShare;
- }
- }
- return null;
- }
- internal static int SelectKeyShareGroup(TlsCrypto crypto, ProtocolVersion negotiatedVersion,
- int[] clientSupportedGroups, int[] serverSupportedGroups)
- {
- if (!IsNullOrEmpty(clientSupportedGroups) && !IsNullOrEmpty(serverSupportedGroups))
- {
- foreach (int group in clientSupportedGroups)
- {
- if (!NamedGroup.CanBeNegotiated(group, negotiatedVersion))
- continue;
- if (!Arrays.Contains(serverSupportedGroups, group))
- continue;
- if (!crypto.HasNamedGroup(group))
- continue;
- if ((NamedGroup.RefersToASpecificCurve(group) && !crypto.HasECDHAgreement()) ||
- (NamedGroup.RefersToASpecificFiniteField(group) && !crypto.HasDHAgreement()))
- {
- continue;
- }
- return group;
- }
- }
- return -1;
- }
- internal static byte[] ReadEncryptedPms(TlsContext context, Stream input)
- {
- if (IsSsl(context))
- return Ssl3Utilities.ReadEncryptedPms(input);
- return ReadOpaque16(input);
- }
- internal static void WriteEncryptedPms(TlsContext context, byte[] encryptedPms, Stream output)
- {
- if (IsSsl(context))
- {
- Ssl3Utilities.WriteEncryptedPms(encryptedPms, output);
- }
- else
- {
- WriteOpaque16(encryptedPms, output);
- }
- }
- internal static byte[] GetSessionID(TlsSession tlsSession)
- {
- if (null != tlsSession)
- {
- byte[] sessionID = tlsSession.SessionID;
- if (null != sessionID
- && sessionID.Length > 0
- && sessionID.Length <= 32)
- {
- return sessionID;
- }
- }
- return EmptyBytes;
- }
- internal static void AdjustTranscriptForRetry(TlsHandshakeHash handshakeHash)
- {
- byte[] clientHelloHash = GetCurrentPrfHash(handshakeHash);
- handshakeHash.Reset();
- int length = clientHelloHash.Length;
- CheckUint8(length);
- byte[] synthetic = new byte[4 + length];
- WriteUint8(HandshakeType.message_hash, synthetic, 0);
- WriteUint24(length, synthetic, 1);
- Array.Copy(clientHelloHash, 0, synthetic, 4, length);
- handshakeHash.Update(synthetic, 0, synthetic.Length);
- }
- internal static TlsCredentials EstablishClientCredentials(TlsAuthentication clientAuthentication,
- CertificateRequest certificateRequest)
- {
- return ValidateCredentials(clientAuthentication.GetClientCredentials(certificateRequest));
- }
- internal static TlsCredentialedSigner Establish13ClientCredentials(TlsAuthentication clientAuthentication,
- CertificateRequest certificateRequest)
- {
- return Validate13Credentials(clientAuthentication.GetClientCredentials(certificateRequest));
- }
- internal static void EstablishClientSigAlgs(SecurityParameters securityParameters,
- IDictionary<int, byte[]> clientExtensions)
- {
- securityParameters.m_clientSigAlgs = TlsExtensionsUtilities.GetSignatureAlgorithmsExtension(
- clientExtensions);
- securityParameters.m_clientSigAlgsCert = TlsExtensionsUtilities.GetSignatureAlgorithmsCertExtension(
- clientExtensions);
- }
- internal static TlsCredentials EstablishServerCredentials(TlsServer server)
- {
- return ValidateCredentials(server.GetCredentials());
- }
- internal static TlsCredentialedSigner Establish13ServerCredentials(TlsServer server)
- {
- return Validate13Credentials(server.GetCredentials());
- }
- internal static void EstablishServerSigAlgs(SecurityParameters securityParameters,
- CertificateRequest certificateRequest)
- {
- securityParameters.m_clientCertTypes = certificateRequest.CertificateTypes;
- securityParameters.m_serverSigAlgs = certificateRequest.SupportedSignatureAlgorithms;
- securityParameters.m_serverSigAlgsCert = certificateRequest.SupportedSignatureAlgorithmsCert;
- if (null == securityParameters.ServerSigAlgsCert)
- {
- securityParameters.m_serverSigAlgsCert = securityParameters.ServerSigAlgs;
- }
- }
- internal static TlsCredentials ValidateCredentials(TlsCredentials credentials)
- {
- if (null != credentials)
- {
- int count = 0;
- count += (credentials is TlsCredentialedAgreement) ? 1 : 0;
- count += (credentials is TlsCredentialedDecryptor) ? 1 : 0;
- count += (credentials is TlsCredentialedSigner) ? 1 : 0;
- if (count != 1)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- return credentials;
- }
- internal static TlsCredentialedSigner Validate13Credentials(TlsCredentials credentials)
- {
- if (null == credentials)
- return null;
- if (!(credentials is TlsCredentialedSigner))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return (TlsCredentialedSigner)credentials;
- }
- internal static void NegotiatedCipherSuite(SecurityParameters securityParameters, int cipherSuite)
- {
- securityParameters.m_cipherSuite = cipherSuite;
- securityParameters.m_keyExchangeAlgorithm = GetKeyExchangeAlgorithm(cipherSuite);
- int prfAlgorithm = GetPrfAlgorithm(securityParameters, cipherSuite);
- securityParameters.m_prfAlgorithm = prfAlgorithm;
- switch (prfAlgorithm)
- {
- case PrfAlgorithm.ssl_prf_legacy:
- case PrfAlgorithm.tls_prf_legacy:
- {
- securityParameters.m_prfCryptoHashAlgorithm = -1;
- securityParameters.m_prfHashLength = -1;
- break;
- }
- default:
- {
- int prfCryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(prfAlgorithm);
- securityParameters.m_prfCryptoHashAlgorithm = prfCryptoHashAlgorithm;
- securityParameters.m_prfHashLength = TlsCryptoUtilities.GetHashOutputSize(prfCryptoHashAlgorithm);
- break;
- }
- }
- /*
- * TODO[tls13] We're slowly moving towards negotiating cipherSuite THEN version. We could
- * move this to "after parameter negotiation" i.e. after ServerHello/EncryptedExtensions.
- */
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- if (IsTlsV13(negotiatedVersion))
- {
- securityParameters.m_verifyDataLength = securityParameters.PrfHashLength;
- }
- else
- {
- securityParameters.m_verifyDataLength = negotiatedVersion.IsSsl ? 36 : 12;
- }
- }
- internal static void NegotiatedVersion(SecurityParameters securityParameters)
- {
- if (!IsSignatureAlgorithmsExtensionAllowed(securityParameters.NegotiatedVersion))
- {
- securityParameters.m_clientSigAlgs = null;
- securityParameters.m_clientSigAlgsCert = null;
- return;
- }
- if (null == securityParameters.ClientSigAlgs)
- {
- securityParameters.m_clientSigAlgs = GetLegacySupportedSignatureAlgorithms();
- }
- if (null == securityParameters.ClientSigAlgsCert)
- {
- securityParameters.m_clientSigAlgsCert = securityParameters.ClientSigAlgs;
- }
- }
- internal static void NegotiatedVersionDtlsClient(TlsClientContext clientContext, TlsClient client)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- if (!ProtocolVersion.IsSupportedDtlsVersionClient(negotiatedVersion))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- NegotiatedVersion(securityParameters);
- client.NotifyServerVersion(negotiatedVersion);
- }
- internal static void NegotiatedVersionDtlsServer(TlsServerContext serverContext)
- {
- SecurityParameters securityParameters = serverContext.SecurityParameters;
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- if (!ProtocolVersion.IsSupportedDtlsVersionServer(negotiatedVersion))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- NegotiatedVersion(securityParameters);
- }
- internal static void NegotiatedVersionTlsClient(TlsClientContext clientContext, TlsClient client)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- if (!ProtocolVersion.IsSupportedTlsVersionClient(negotiatedVersion))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- NegotiatedVersion(securityParameters);
- client.NotifyServerVersion(negotiatedVersion);
- }
- internal static void NegotiatedVersionTlsServer(TlsServerContext serverContext)
- {
- SecurityParameters securityParameters = serverContext.SecurityParameters;
- ProtocolVersion negotiatedVersion = securityParameters.NegotiatedVersion;
- if (!ProtocolVersion.IsSupportedTlsVersionServer(negotiatedVersion))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- NegotiatedVersion(securityParameters);
- }
- internal static TlsSecret DeriveSecret(SecurityParameters securityParameters, TlsSecret secret, string label,
- byte[] transcriptHash)
- {
- int prfCryptoHashAlgorithm = securityParameters.PrfCryptoHashAlgorithm;
- int prfHashLength = securityParameters.PrfHashLength;
- return DeriveSecret(prfCryptoHashAlgorithm, prfHashLength, secret, label, transcriptHash);
- }
- internal static TlsSecret DeriveSecret(int prfCryptoHashAlgorithm, int prfHashLength, TlsSecret secret,
- string label, byte[] transcriptHash)
- {
- if (transcriptHash.Length != prfHashLength)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- return TlsCryptoUtilities.HkdfExpandLabel(secret, prfCryptoHashAlgorithm, label, transcriptHash,
- prfHashLength);
- }
- internal static TlsSecret GetSessionMasterSecret(TlsCrypto crypto, TlsSecret masterSecret)
- {
- if (null != masterSecret)
- {
- lock (masterSecret)
- {
- if (masterSecret.IsAlive())
- return crypto.AdoptSecret(masterSecret);
- }
- }
- return null;
- }
- internal static bool IsPermittedExtensionType13(int handshakeType, int extensionType)
- {
- switch (extensionType)
- {
- case ExtensionType.server_name:
- case ExtensionType.max_fragment_length:
- case ExtensionType.supported_groups:
- case ExtensionType.use_srtp:
- case ExtensionType.heartbeat:
- case ExtensionType.application_layer_protocol_negotiation:
- case ExtensionType.client_certificate_type:
- case ExtensionType.server_certificate_type:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.encrypted_extensions:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.status_request:
- case ExtensionType.signed_certificate_timestamp:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.certificate_request:
- case HandshakeType.certificate:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.signature_algorithms:
- case ExtensionType.compress_certificate:
- case ExtensionType.certificate_authorities:
- case ExtensionType.signature_algorithms_cert:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.certificate_request:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.padding:
- case ExtensionType.psk_key_exchange_modes:
- case ExtensionType.post_handshake_auth:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.key_share:
- case ExtensionType.supported_versions:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.server_hello:
- case HandshakeType.hello_retry_request:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.pre_shared_key:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.server_hello:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.early_data:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.encrypted_extensions:
- case HandshakeType.new_session_ticket:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.cookie:
- {
- switch (handshakeType)
- {
- case HandshakeType.client_hello:
- case HandshakeType.hello_retry_request:
- return true;
- default:
- return false;
- }
- }
- case ExtensionType.oid_filters:
- {
- switch (handshakeType)
- {
- case HandshakeType.certificate_request:
- return true;
- default:
- return false;
- }
- }
- default:
- {
- return !ExtensionType.IsRecognized(extensionType);
- }
- }
- }
- /// <exception cref="IOException"/>
- internal static void CheckExtensionData13(IDictionary<int, byte[]> extensions, int handshakeType,
- short alertDescription)
- {
- foreach (int extensionType in extensions.Keys)
- {
- if (!IsPermittedExtensionType13(handshakeType, extensionType))
- throw new TlsFatalAlert(alertDescription, "Invalid extension: "
- + ExtensionType.GetText(extensionType));
- }
- }
- /// <summary>Generate a pre_master_secret and send it encrypted to the server.</summary>
- /// <exception cref="IOException"/>
- public static TlsSecret GenerateEncryptedPreMasterSecret(TlsContext context, TlsEncryptor encryptor,
- Stream output)
- {
- ProtocolVersion version = context.RsaPreMasterSecretVersion;
- TlsSecret preMasterSecret = context.Crypto.GenerateRsaPreMasterSecret(version);
- byte[] encryptedPreMasterSecret = preMasterSecret.Encrypt(encryptor);
- WriteEncryptedPms(context, encryptedPreMasterSecret, output);
- return preMasterSecret;
- }
- public static bool IsTimeout(SocketException e)
- {
- return SocketError.TimedOut == e.SocketErrorCode;
- }
- /// <exception cref="IOException"/>
- internal static void AddPreSharedKeyToClientExtensions(TlsPsk[] psks, IDictionary<int, byte[]> clientExtensions)
- {
- var identities = new List<PskIdentity>(psks.Length);
- for (int i = 0; i < psks.Length; ++i)
- {
- TlsPsk psk = psks[i];
- // TODO[tls13-psk] Handle obfuscated_ticket_age for resumption PSKs
- identities.Add(new PskIdentity(psk.Identity, 0L));
- }
- TlsExtensionsUtilities.AddPreSharedKeyClientHello(clientExtensions, new OfferedPsks(identities));
- }
- /// <exception cref="IOException"/>
- internal static OfferedPsks.BindersConfig AddPreSharedKeyToClientHello(TlsClientContext clientContext,
- TlsClient client, IDictionary<int, byte[]> clientExtensions, int[] offeredCipherSuites)
- {
- if (!IsTlsV13(clientContext.ClientVersion))
- return null;
- TlsPskExternal[] pskExternals = GetPskExternalsClient(client, offeredCipherSuites);
- if (null == pskExternals)
- return null;
- short[] pskKeyExchangeModes = client.GetPskKeyExchangeModes();
- if (IsNullOrEmpty(pskKeyExchangeModes))
- throw new TlsFatalAlert(AlertDescription.internal_error,
- "External PSKs configured but no PskKeyExchangeMode available");
- TlsSecret[] pskEarlySecrets = GetPskEarlySecrets(clientContext.Crypto, pskExternals);
- int bindersSize = OfferedPsks.GetBindersSize(pskExternals);
- AddPreSharedKeyToClientExtensions(pskExternals, clientExtensions);
- TlsExtensionsUtilities.AddPskKeyExchangeModesExtension(clientExtensions, pskKeyExchangeModes);
- return new OfferedPsks.BindersConfig(pskExternals, pskKeyExchangeModes, pskEarlySecrets, bindersSize);
- }
- /// <exception cref="IOException"/>
- internal static OfferedPsks.BindersConfig AddPreSharedKeyToClientHelloRetry(TlsClientContext clientContext,
- OfferedPsks.BindersConfig clientBinders, IDictionary<int, byte[]> clientExtensions)
- {
- SecurityParameters securityParameters = clientContext.SecurityParameters;
- int prfAlgorithm = GetPrfAlgorithm13(securityParameters.CipherSuite);
- var pskIndices = GetPskIndices(clientBinders.m_psks, prfAlgorithm);
- if (pskIndices.Count < 1)
- return null;
- OfferedPsks.BindersConfig result = clientBinders;
- int count = pskIndices.Count;
- if (count < clientBinders.m_psks.Length)
- {
- TlsPsk[] psks = new TlsPsk[count];
- TlsSecret[] earlySecrets = new TlsSecret[count];
- for (int i = 0; i < count; ++i)
- {
- int j = (int)pskIndices[i];
- psks[i] = clientBinders.m_psks[j];
- earlySecrets[i] = clientBinders.m_earlySecrets[j];
- }
- int bindersSize = OfferedPsks.GetBindersSize(psks);
- result = new OfferedPsks.BindersConfig(psks, clientBinders.m_pskKeyExchangeModes, earlySecrets,
- bindersSize);
- }
- AddPreSharedKeyToClientExtensions(result.m_psks, clientExtensions);
- // NOTE: psk_key_exchange_modes should already be in 'clientExtensions' from the ClientHello
- return result;
- }
- internal static OfferedPsks.SelectedConfig SelectPreSharedKey(TlsServerContext serverContext, TlsServer server,
- IDictionary<int, byte[]> clientHelloExtensions, HandshakeMessageInput clientHelloMessage,
- TlsHandshakeHash handshakeHash, bool afterHelloRetryRequest)
- {
- bool handshakeHashUpdated = false;
- OfferedPsks offeredPsks = TlsExtensionsUtilities.GetPreSharedKeyClientHello(clientHelloExtensions);
- if (null != offeredPsks)
- {
- short[] pskKeyExchangeModes = TlsExtensionsUtilities.GetPskKeyExchangeModesExtension(
- clientHelloExtensions);
- if (IsNullOrEmpty(pskKeyExchangeModes))
- throw new TlsFatalAlert(AlertDescription.missing_extension);
- // TODO[tls13] Add support for psk_ke?
- if (Arrays.Contains(pskKeyExchangeModes, PskKeyExchangeMode.psk_dhe_ke))
- {
- // TODO[tls13] Prefer to get the exact index from the server?
- TlsPskExternal psk = server.GetExternalPsk(offeredPsks.Identities);
- if (null != psk)
- {
- int index = offeredPsks.GetIndexOfIdentity(new PskIdentity(psk.Identity, 0L));
- if (index >= 0)
- {
- byte[] binder = (byte[])offeredPsks.Binders[index];
- TlsCrypto crypto = serverContext.Crypto;
- TlsSecret earlySecret = GetPskEarlySecret(crypto, psk);
- // TODO[tls13-psk] Handle resumption PSKs
- bool isExternalPsk = true;
- int pskCryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(psk.PrfAlgorithm);
- byte[] transcriptHash;
- {
- handshakeHashUpdated = true;
- int bindersSize = offeredPsks.BindersSize;
- clientHelloMessage.UpdateHashPrefix(handshakeHash, bindersSize);
- if (afterHelloRetryRequest)
- {
- transcriptHash = handshakeHash.GetFinalHash(pskCryptoHashAlgorithm);
- }
- else
- {
- TlsHash hash = crypto.CreateHash(pskCryptoHashAlgorithm);
- handshakeHash.CopyBufferTo(new TlsHashSink(hash));
- transcriptHash = hash.CalculateHash();
- }
- clientHelloMessage.UpdateHashSuffix(handshakeHash, bindersSize);
- }
- byte[] calculatedBinder = CalculatePskBinder(crypto, isExternalPsk, pskCryptoHashAlgorithm,
- earlySecret, transcriptHash);
- if (Arrays.ConstantTimeAreEqual(calculatedBinder, binder))
- return new OfferedPsks.SelectedConfig(index, psk, pskKeyExchangeModes, earlySecret);
- }
- }
- }
- }
- if (!handshakeHashUpdated)
- {
- clientHelloMessage.UpdateHash(handshakeHash);
- }
- return null;
- }
- internal static TlsSecret GetPskEarlySecret(TlsCrypto crypto, TlsPsk psk)
- {
- int cryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(psk.PrfAlgorithm);
- return crypto
- .HkdfInit(cryptoHashAlgorithm)
- .HkdfExtract(cryptoHashAlgorithm, psk.Key);
- }
- internal static TlsSecret[] GetPskEarlySecrets(TlsCrypto crypto, TlsPsk[] psks)
- {
- int count = psks.Length;
- TlsSecret[] earlySecrets = new TlsSecret[count];
- for (int i = 0; i < count; ++i)
- {
- earlySecrets[i] = GetPskEarlySecret(crypto, psks[i]);
- }
- return earlySecrets;
- }
- /// <exception cref="IOException"/>
- internal static TlsPskExternal[] GetPskExternalsClient(TlsClient client, int[] offeredCipherSuites)
- {
- var externalPsks = client.GetExternalPsks();
- if (IsNullOrEmpty(externalPsks))
- return null;
- int[] prfAlgorithms = GetPrfAlgorithms13(offeredCipherSuites);
- int count = externalPsks.Count;
- TlsPskExternal[] result = new TlsPskExternal[count];
- for (int i = 0; i < count; ++i)
- {
- TlsPskExternal pskExternal = externalPsks[i] as TlsPskExternal;
- if (null == pskExternal)
- throw new TlsFatalAlert(AlertDescription.internal_error,
- "External PSKs element is not a TlsPSKExternal");
- if (!Arrays.Contains(prfAlgorithms, pskExternal.PrfAlgorithm))
- throw new TlsFatalAlert(AlertDescription.internal_error,
- "External PSK incompatible with offered cipher suites");
- result[i] = pskExternal;
- }
- return result;
- }
- internal static IList<int> GetPskIndices(TlsPsk[] psks, int prfAlgorithm)
- {
- var v = new List<int>(psks.Length);
- for (int i = 0; i < psks.Length; ++i)
- {
- if (psks[i].PrfAlgorithm == prfAlgorithm)
- {
- v.Add(i);
- }
- }
- return v;
- }
- }
- }
- #pragma warning restore
- #endif
|