up
This commit is contained in:
228
Assets/BestHTTP/SecureProtocol/crypto/tls/TlsDHKeyExchange.cs
Normal file
228
Assets/BestHTTP/SecureProtocol/crypto/tls/TlsDHKeyExchange.cs
Normal file
@@ -0,0 +1,228 @@
|
||||
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
|
||||
|
||||
using System;
|
||||
using System.Collections;
|
||||
using System.IO;
|
||||
|
||||
using Org.BouncyCastle.Asn1.X509;
|
||||
using Org.BouncyCastle.Crypto.Parameters;
|
||||
using Org.BouncyCastle.Math;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Tls
|
||||
{
|
||||
/// <summary>(D)TLS DH key exchange.</summary>
|
||||
public class TlsDHKeyExchange
|
||||
: AbstractTlsKeyExchange
|
||||
{
|
||||
protected TlsSigner mTlsSigner;
|
||||
protected DHParameters mDHParameters;
|
||||
|
||||
protected AsymmetricKeyParameter mServerPublicKey;
|
||||
protected TlsAgreementCredentials mAgreementCredentials;
|
||||
|
||||
protected DHPrivateKeyParameters mDHAgreePrivateKey;
|
||||
protected DHPublicKeyParameters mDHAgreePublicKey;
|
||||
|
||||
public TlsDHKeyExchange(int keyExchange, IList supportedSignatureAlgorithms, DHParameters dhParameters)
|
||||
: base(keyExchange, supportedSignatureAlgorithms)
|
||||
{
|
||||
switch (keyExchange)
|
||||
{
|
||||
case KeyExchangeAlgorithm.DH_RSA:
|
||||
case KeyExchangeAlgorithm.DH_DSS:
|
||||
this.mTlsSigner = null;
|
||||
break;
|
||||
case KeyExchangeAlgorithm.DHE_RSA:
|
||||
this.mTlsSigner = new TlsRsaSigner();
|
||||
break;
|
||||
case KeyExchangeAlgorithm.DHE_DSS:
|
||||
this.mTlsSigner = new TlsDssSigner();
|
||||
break;
|
||||
default:
|
||||
throw new InvalidOperationException("unsupported key exchange algorithm");
|
||||
}
|
||||
|
||||
this.mDHParameters = dhParameters;
|
||||
}
|
||||
|
||||
public override void Init(TlsContext context)
|
||||
{
|
||||
base.Init(context);
|
||||
|
||||
if (this.mTlsSigner != null)
|
||||
{
|
||||
this.mTlsSigner.Init(context);
|
||||
}
|
||||
}
|
||||
|
||||
public override void SkipServerCredentials()
|
||||
{
|
||||
throw new TlsFatalAlert(AlertDescription.unexpected_message);
|
||||
}
|
||||
|
||||
public override void ProcessServerCertificate(Certificate serverCertificate)
|
||||
{
|
||||
if (serverCertificate.IsEmpty)
|
||||
throw new TlsFatalAlert(AlertDescription.bad_certificate);
|
||||
|
||||
X509CertificateStructure x509Cert = serverCertificate.GetCertificateAt(0);
|
||||
|
||||
SubjectPublicKeyInfo keyInfo = x509Cert.SubjectPublicKeyInfo;
|
||||
try
|
||||
{
|
||||
this.mServerPublicKey = PublicKeyFactory.CreateKey(keyInfo);
|
||||
}
|
||||
catch (Exception e)
|
||||
{
|
||||
throw new TlsFatalAlert(AlertDescription.unsupported_certificate, e);
|
||||
}
|
||||
|
||||
if (mTlsSigner == null)
|
||||
{
|
||||
try
|
||||
{
|
||||
this.mDHAgreePublicKey = TlsDHUtilities.ValidateDHPublicKey((DHPublicKeyParameters)this.mServerPublicKey);
|
||||
this.mDHParameters = ValidateDHParameters(mDHAgreePublicKey.Parameters);
|
||||
}
|
||||
catch (InvalidCastException e)
|
||||
{
|
||||
throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
|
||||
}
|
||||
|
||||
TlsUtilities.ValidateKeyUsage(x509Cert, KeyUsage.KeyAgreement);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (!mTlsSigner.IsValidPublicKey(this.mServerPublicKey))
|
||||
{
|
||||
throw new TlsFatalAlert(AlertDescription.certificate_unknown);
|
||||
}
|
||||
|
||||
TlsUtilities.ValidateKeyUsage(x509Cert, KeyUsage.DigitalSignature);
|
||||
}
|
||||
|
||||
base.ProcessServerCertificate(serverCertificate);
|
||||
}
|
||||
|
||||
public override bool RequiresServerKeyExchange
|
||||
{
|
||||
get
|
||||
{
|
||||
switch (mKeyExchange)
|
||||
{
|
||||
case KeyExchangeAlgorithm.DHE_DSS:
|
||||
case KeyExchangeAlgorithm.DHE_RSA:
|
||||
case KeyExchangeAlgorithm.DH_anon:
|
||||
return true;
|
||||
default:
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public override void ValidateCertificateRequest(CertificateRequest certificateRequest)
|
||||
{
|
||||
byte[] types = certificateRequest.CertificateTypes;
|
||||
for (int i = 0; i < types.Length; ++i)
|
||||
{
|
||||
switch (types[i])
|
||||
{
|
||||
case ClientCertificateType.rsa_sign:
|
||||
case ClientCertificateType.dss_sign:
|
||||
case ClientCertificateType.rsa_fixed_dh:
|
||||
case ClientCertificateType.dss_fixed_dh:
|
||||
case ClientCertificateType.ecdsa_sign:
|
||||
break;
|
||||
default:
|
||||
throw new TlsFatalAlert(AlertDescription.illegal_parameter);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public override void ProcessClientCredentials(TlsCredentials clientCredentials)
|
||||
{
|
||||
if (clientCredentials is TlsAgreementCredentials)
|
||||
{
|
||||
// TODO Validate client cert has matching parameters (see 'areCompatibleParameters')?
|
||||
|
||||
this.mAgreementCredentials = (TlsAgreementCredentials)clientCredentials;
|
||||
}
|
||||
else if (clientCredentials is TlsSignerCredentials)
|
||||
{
|
||||
// OK
|
||||
}
|
||||
else
|
||||
{
|
||||
throw new TlsFatalAlert(AlertDescription.internal_error);
|
||||
}
|
||||
}
|
||||
|
||||
public override void GenerateClientKeyExchange(Stream output)
|
||||
{
|
||||
/*
|
||||
* RFC 2246 7.4.7.2 If the client certificate already contains a suitable Diffie-Hellman
|
||||
* key, then Yc is implicit and does not need to be sent again. In this case, the Client Key
|
||||
* Exchange message will be sent, but will be empty.
|
||||
*/
|
||||
if (mAgreementCredentials == null)
|
||||
{
|
||||
this.mDHAgreePrivateKey = TlsDHUtilities.GenerateEphemeralClientKeyExchange(mContext.SecureRandom,
|
||||
mDHParameters, output);
|
||||
}
|
||||
}
|
||||
|
||||
public override void ProcessClientCertificate(Certificate clientCertificate)
|
||||
{
|
||||
// TODO Extract the public key and validate
|
||||
|
||||
/*
|
||||
* TODO If the certificate is 'fixed', take the public key as dhAgreePublicKey and check
|
||||
* that the parameters match the server's (see 'areCompatibleParameters').
|
||||
*/
|
||||
}
|
||||
|
||||
public override void ProcessClientKeyExchange(Stream input)
|
||||
{
|
||||
if (mDHAgreePublicKey != null)
|
||||
{
|
||||
// For dss_fixed_dh and rsa_fixed_dh, the key arrived in the client certificate
|
||||
return;
|
||||
}
|
||||
|
||||
BigInteger Yc = TlsDHUtilities.ReadDHParameter(input);
|
||||
|
||||
this.mDHAgreePublicKey = TlsDHUtilities.ValidateDHPublicKey(new DHPublicKeyParameters(Yc, mDHParameters));
|
||||
}
|
||||
|
||||
public override byte[] GeneratePremasterSecret()
|
||||
{
|
||||
if (mAgreementCredentials != null)
|
||||
{
|
||||
return mAgreementCredentials.GenerateAgreement(mDHAgreePublicKey);
|
||||
}
|
||||
|
||||
if (mDHAgreePrivateKey != null)
|
||||
{
|
||||
return TlsDHUtilities.CalculateDHBasicAgreement(mDHAgreePublicKey, mDHAgreePrivateKey);
|
||||
}
|
||||
|
||||
throw new TlsFatalAlert(AlertDescription.internal_error);
|
||||
}
|
||||
|
||||
protected virtual int MinimumPrimeBits
|
||||
{
|
||||
get { return 1024; }
|
||||
}
|
||||
|
||||
protected virtual DHParameters ValidateDHParameters(DHParameters parameters)
|
||||
{
|
||||
if (parameters.P.BitLength < MinimumPrimeBits)
|
||||
throw new TlsFatalAlert(AlertDescription.insufficient_security);
|
||||
|
||||
return TlsDHUtilities.ValidateDHParameters(parameters);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#endif
|
||||
Reference in New Issue
Block a user