123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC
- {
- /// <summary>BC light-weight support class for handling TLS secrets and deriving key material and other secrets
- /// from them.</summary>
- public class BcTlsSecret
- : AbstractTlsSecret
- {
- public static BcTlsSecret Convert(BcTlsCrypto crypto, TlsSecret secret)
- {
- if (secret is BcTlsSecret)
- return (BcTlsSecret)secret;
- if (secret is AbstractTlsSecret)
- {
- AbstractTlsSecret abstractTlsSecret = (AbstractTlsSecret)secret;
- return crypto.AdoptLocalSecret(CopyData(abstractTlsSecret));
- }
- throw new ArgumentException("unrecognized TlsSecret - cannot copy data: " + Org.BouncyCastle.Utilities.Platform.GetTypeName(secret));
- }
- // SSL3 magic mix constants ("A", "BB", "CCC", ...)
- private static readonly byte[] Ssl3Const = GenerateSsl3Constants();
- private static byte[] GenerateSsl3Constants()
- {
- int n = 15;
- byte[] result = new byte[n * (n + 1) / 2];
- int pos = 0;
- for (int i = 0; i < n; ++i)
- {
- byte b = (byte)('A' + i);
- for (int j = 0; j <= i; ++j)
- {
- result[pos++] = b;
- }
- }
- return result;
- }
- protected readonly BcTlsCrypto m_crypto;
- public BcTlsSecret(BcTlsCrypto crypto, byte[] data)
- : base(data)
- {
- this.m_crypto = crypto;
- }
- public override TlsSecret DeriveUsingPrf(int prfAlgorithm, string label, byte[] seed, int length)
- {
- lock (this)
- {
- CheckAlive();
- switch (prfAlgorithm)
- {
- case PrfAlgorithm.tls13_hkdf_sha256:
- return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha256, label, seed, length);
- case PrfAlgorithm.tls13_hkdf_sha384:
- return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha384, label, seed, length);
- case PrfAlgorithm.tls13_hkdf_sm3:
- return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sm3, label, seed, length);
- default:
- return m_crypto.AdoptLocalSecret(Prf(prfAlgorithm, label, seed, length));
- }
- }
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public override TlsSecret DeriveUsingPrf(int prfAlgorithm, ReadOnlySpan<char> label, ReadOnlySpan<byte> seed,
- int length)
- {
- lock (this)
- {
- CheckAlive();
- switch (prfAlgorithm)
- {
- case PrfAlgorithm.tls13_hkdf_sha256:
- return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha256, label, seed, length);
- case PrfAlgorithm.tls13_hkdf_sha384:
- return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sha384, label, seed, length);
- case PrfAlgorithm.tls13_hkdf_sm3:
- return TlsCryptoUtilities.HkdfExpandLabel(this, CryptoHashAlgorithm.sm3, label, seed, length);
- default:
- return m_crypto.AdoptLocalSecret(Prf(prfAlgorithm, label, seed, length));
- }
- }
- }
- #endif
- public override TlsSecret HkdfExpand(int cryptoHashAlgorithm, byte[] info, int length)
- {
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- return HkdfExpand(cryptoHashAlgorithm, info.AsSpan(), length);
- #else
- lock (this)
- {
- if (length < 1)
- return m_crypto.AdoptLocalSecret(TlsUtilities.EmptyBytes);
- int hashLen = TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm);
- if (length > (255 * hashLen))
- throw new ArgumentException("must be <= 255 * (output size of 'hashAlgorithm')", "length");
- CheckAlive();
- byte[] prk = m_data;
- HMac hmac = new HMac(m_crypto.CreateDigest(cryptoHashAlgorithm));
- hmac.Init(new KeyParameter(prk));
- byte[] okm = new byte[length];
- byte[] t = new byte[hashLen];
- byte counter = 0x00;
- int pos = 0;
- for (;;)
- {
- hmac.BlockUpdate(info, 0, info.Length);
- hmac.Update(++counter);
- hmac.DoFinal(t, 0);
- int remaining = length - pos;
- if (remaining <= hashLen)
- {
- Array.Copy(t, 0, okm, pos, remaining);
- break;
- }
- Array.Copy(t, 0, okm, pos, hashLen);
- pos += hashLen;
- hmac.BlockUpdate(t, 0, t.Length);
- }
- return m_crypto.AdoptLocalSecret(okm);
- }
- #endif
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public override TlsSecret HkdfExpand(int cryptoHashAlgorithm, ReadOnlySpan<byte> info, int length)
- {
- lock (this)
- {
- if (length < 1)
- return m_crypto.AdoptLocalSecret(TlsUtilities.EmptyBytes);
- int hashLen = TlsCryptoUtilities.GetHashOutputSize(cryptoHashAlgorithm);
- if (length > (255 * hashLen))
- throw new ArgumentException("must be <= 255 * (output size of 'hashAlgorithm')", "length");
- CheckAlive();
- ReadOnlySpan<byte> prk = m_data;
- HMac hmac = new HMac(m_crypto.CreateDigest(cryptoHashAlgorithm));
- hmac.Init(new KeyParameter(prk));
- byte[] okm = new byte[length];
- Span<byte> t = hashLen <= 128
- ? stackalloc byte[hashLen]
- : new byte[hashLen];
- byte counter = 0x00;
- int pos = 0;
- for (;;)
- {
- hmac.BlockUpdate(info);
- hmac.Update(++counter);
- hmac.DoFinal(t);
- int remaining = length - pos;
- if (remaining <= hashLen)
- {
- t[..remaining].CopyTo(okm.AsSpan(pos));
- break;
- }
- t.CopyTo(okm.AsSpan(pos));
- pos += hashLen;
- hmac.BlockUpdate(t);
- }
- return m_crypto.AdoptLocalSecret(okm);
- }
- }
- #endif
- public override TlsSecret HkdfExtract(int cryptoHashAlgorithm, TlsSecret ikm)
- {
- lock (this)
- {
- CheckAlive();
- byte[] salt = m_data;
- this.m_data = null;
- HMac hmac = new HMac(m_crypto.CreateDigest(cryptoHashAlgorithm));
- hmac.Init(new KeyParameter(salt));
- Convert(m_crypto, ikm).UpdateMac(hmac);
- byte[] prk = new byte[hmac.GetMacSize()];
- hmac.DoFinal(prk, 0);
- return m_crypto.AdoptLocalSecret(prk);
- }
- }
- protected override AbstractTlsCrypto Crypto
- {
- get { return m_crypto; }
- }
- protected virtual void HmacHash(int cryptoHashAlgorithm, byte[] secret, int secretOff, int secretLen,
- byte[] seed, byte[] output)
- {
- IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
- HMac hmac = new HMac(digest);
- hmac.Init(new KeyParameter(secret, secretOff, secretLen));
- byte[] a = seed;
- int macSize = hmac.GetMacSize();
- byte[] b1 = new byte[macSize];
- byte[] b2 = new byte[macSize];
- int pos = 0;
- while (pos < output.Length)
- {
- hmac.BlockUpdate(a, 0, a.Length);
- hmac.DoFinal(b1, 0);
- a = b1;
- hmac.BlockUpdate(a, 0, a.Length);
- hmac.BlockUpdate(seed, 0, seed.Length);
- hmac.DoFinal(b2, 0);
- Array.Copy(b2, 0, output, pos, System.Math.Min(macSize, output.Length - pos));
- pos += macSize;
- }
- }
- protected virtual byte[] Prf(int prfAlgorithm, string label, byte[] seed, int length)
- {
- if (PrfAlgorithm.ssl_prf_legacy == prfAlgorithm)
- return Prf_Ssl(seed, length);
- byte[] labelSeed = Arrays.Concatenate(Strings.ToByteArray(label), seed);
- if (PrfAlgorithm.tls_prf_legacy == prfAlgorithm)
- return Prf_1_0(labelSeed, length);
- return Prf_1_2(prfAlgorithm, labelSeed, length);
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- protected virtual byte[] Prf(int prfAlgorithm, ReadOnlySpan<char> label, ReadOnlySpan<byte> seed, int length)
- {
- if (PrfAlgorithm.ssl_prf_legacy == prfAlgorithm)
- return Prf_Ssl(seed, length);
- byte[] labelSeed = new byte[label.Length + seed.Length];
- for (int i = 0; i < label.Length; ++i)
- {
- labelSeed[i] = (byte)label[i];
- }
- seed.CopyTo(labelSeed.AsSpan(label.Length));
- if (PrfAlgorithm.tls_prf_legacy == prfAlgorithm)
- return Prf_1_0(labelSeed, length);
- return Prf_1_2(prfAlgorithm, labelSeed, length);
- }
- #endif
- protected virtual byte[] Prf_Ssl(byte[] seed, int length)
- {
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- return Prf_Ssl(seed.AsSpan(), length);
- #else
- IDigest md5 = m_crypto.CreateDigest(CryptoHashAlgorithm.md5);
- IDigest sha1 = m_crypto.CreateDigest(CryptoHashAlgorithm.sha1);
- int md5Size = md5.GetDigestSize();
- int sha1Size = sha1.GetDigestSize();
- byte[] tmp = new byte[System.Math.Max(md5Size, sha1Size)];
- byte[] result = new byte[length];
- int constLen = 1, constPos = 0, resultPos = 0;
- while (resultPos < length)
- {
- sha1.BlockUpdate(Ssl3Const, constPos, constLen);
- constPos += constLen++;
- sha1.BlockUpdate(m_data, 0, m_data.Length);
- sha1.BlockUpdate(seed, 0, seed.Length);
- sha1.DoFinal(tmp, 0);
- md5.BlockUpdate(m_data, 0, m_data.Length);
- md5.BlockUpdate(tmp, 0, sha1Size);
- int remaining = length - resultPos;
- if (remaining < md5Size)
- {
- md5.DoFinal(tmp, 0);
- Array.Copy(tmp, 0, result, resultPos, remaining);
- resultPos += remaining;
- }
- else
- {
- md5.DoFinal(result, resultPos);
- resultPos += md5Size;
- }
- }
- return result;
- #endif
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- protected virtual byte[] Prf_Ssl(ReadOnlySpan<byte> seed, int length)
- {
- IDigest md5 = m_crypto.CreateDigest(CryptoHashAlgorithm.md5);
- IDigest sha1 = m_crypto.CreateDigest(CryptoHashAlgorithm.sha1);
- int md5Size = md5.GetDigestSize();
- int sha1Size = sha1.GetDigestSize();
- Span<byte> tmp = stackalloc byte[System.Math.Max(md5Size, sha1Size)];
- byte[] result = new byte[length];
- int constLen = 1, constPos = 0, resultPos = 0;
- while (resultPos < length)
- {
- sha1.BlockUpdate(Ssl3Const.AsSpan(constPos, constLen));
- constPos += constLen++;
- sha1.BlockUpdate(m_data);
- sha1.BlockUpdate(seed);
- sha1.DoFinal(tmp);
- md5.BlockUpdate(m_data);
- md5.BlockUpdate(tmp[..sha1Size]);
- int remaining = length - resultPos;
- if (remaining < md5Size)
- {
- md5.DoFinal(tmp);
- tmp[..remaining].CopyTo(result.AsSpan(resultPos));
- resultPos += remaining;
- }
- else
- {
- md5.DoFinal(result.AsSpan(resultPos));
- resultPos += md5Size;
- }
- }
- return result;
- }
- #endif
- protected virtual byte[] Prf_1_0(byte[] labelSeed, int length)
- {
- int s_half = (m_data.Length + 1) / 2;
- byte[] b1 = new byte[length];
- HmacHash(CryptoHashAlgorithm.md5, m_data, 0, s_half, labelSeed, b1);
- byte[] b2 = new byte[length];
- HmacHash(CryptoHashAlgorithm.sha1, m_data, m_data.Length - s_half, s_half, labelSeed, b2);
- for (int i = 0; i < length; i++)
- {
- b1[i] ^= b2[i];
- }
- return b1;
- }
- protected virtual byte[] Prf_1_2(int prfAlgorithm, byte[] labelSeed, int length)
- {
- int cryptoHashAlgorithm = TlsCryptoUtilities.GetHashForPrf(prfAlgorithm);
- byte[] result = new byte[length];
- HmacHash(cryptoHashAlgorithm, m_data, 0, m_data.Length, labelSeed, result);
- return result;
- }
- protected virtual void UpdateMac(IMac mac)
- {
- lock (this)
- {
- CheckAlive();
- mac.BlockUpdate(m_data, 0, m_data.Length);
- }
- }
- }
- }
- #pragma warning restore
- #endif
|