123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- using System;
- using System.IO;
- using Org.BouncyCastle.Crypto.Engines;
- using Org.BouncyCastle.Crypto.Generators;
- using Org.BouncyCastle.Crypto.Macs;
- using Org.BouncyCastle.Crypto.Parameters;
- using Org.BouncyCastle.Crypto.Utilities;
- using Org.BouncyCastle.Security;
- using Org.BouncyCastle.Utilities;
- namespace Org.BouncyCastle.Crypto.Tls
- {
- /**
- * draft-ietf-tls-chacha20-poly1305-04
- */
- public class Chacha20Poly1305
- : TlsCipher
- {
- private static readonly byte[] Zeroes = new byte[15];
- protected readonly TlsContext context;
- protected readonly ChaCha7539Engine encryptCipher, decryptCipher;
- protected readonly byte[] encryptIV, decryptIV;
- /// <exception cref="IOException"></exception>
- public Chacha20Poly1305(TlsContext context)
- {
- if (!TlsUtilities.IsTlsV12(context))
- throw new TlsFatalAlert(AlertDescription.internal_error);
- this.context = context;
- int cipherKeySize = 32;
- // TODO SecurityParameters.fixed_iv_length
- int fixed_iv_length = 12;
- // TODO SecurityParameters.record_iv_length = 0
- int key_block_size = (2 * cipherKeySize) + (2 * fixed_iv_length);
- byte[] key_block = TlsUtilities.CalculateKeyBlock(context, key_block_size);
- int offset = 0;
- KeyParameter client_write_key = new KeyParameter(key_block, offset, cipherKeySize);
- offset += cipherKeySize;
- KeyParameter server_write_key = new KeyParameter(key_block, offset, cipherKeySize);
- offset += cipherKeySize;
- byte[] client_write_IV = Arrays.CopyOfRange(key_block, offset, offset + fixed_iv_length);
- offset += fixed_iv_length;
- byte[] server_write_IV = Arrays.CopyOfRange(key_block, offset, offset + fixed_iv_length);
- offset += fixed_iv_length;
- if (offset != key_block_size)
- throw new TlsFatalAlert(AlertDescription.internal_error);
- this.encryptCipher = new ChaCha7539Engine();
- this.decryptCipher = new ChaCha7539Engine();
- KeyParameter encryptKey, decryptKey;
- if (context.IsServer)
- {
- encryptKey = server_write_key;
- decryptKey = client_write_key;
- this.encryptIV = server_write_IV;
- this.decryptIV = client_write_IV;
- }
- else
- {
- encryptKey = client_write_key;
- decryptKey = server_write_key;
- this.encryptIV = client_write_IV;
- this.decryptIV = server_write_IV;
- }
- this.encryptCipher.Init(true, new ParametersWithIV(encryptKey, encryptIV));
- this.decryptCipher.Init(false, new ParametersWithIV(decryptKey, decryptIV));
- }
- public virtual int GetPlaintextLimit(int ciphertextLimit)
- {
- return ciphertextLimit - 16;
- }
- /// <exception cref="IOException"></exception>
- public virtual byte[] EncodePlaintext(long seqNo, byte type, byte[] plaintext, int offset, int len)
- {
- KeyParameter macKey = InitRecord(encryptCipher, true, seqNo, encryptIV);
- byte[] output = new byte[len + 16];
- encryptCipher.ProcessBytes(plaintext, offset, len, output, 0);
- byte[] additionalData = GetAdditionalData(seqNo, type, len);
- byte[] mac = CalculateRecordMac(macKey, additionalData, output, 0, len);
- Array.Copy(mac, 0, output, len, mac.Length);
- return output;
- }
- /// <exception cref="IOException"></exception>
- public virtual byte[] DecodeCiphertext(long seqNo, byte type, byte[] ciphertext, int offset, int len)
- {
- if (GetPlaintextLimit(len) < 0)
- throw new TlsFatalAlert(AlertDescription.decode_error);
- KeyParameter macKey = InitRecord(decryptCipher, false, seqNo, decryptIV);
- int plaintextLength = len - 16;
- byte[] additionalData = GetAdditionalData(seqNo, type, plaintextLength);
- byte[] calculatedMac = CalculateRecordMac(macKey, additionalData, ciphertext, offset, plaintextLength);
- byte[] receivedMac = Arrays.CopyOfRange(ciphertext, offset + plaintextLength, offset + len);
- if (!Arrays.ConstantTimeAreEqual(calculatedMac, receivedMac))
- throw new TlsFatalAlert(AlertDescription.bad_record_mac);
- byte[] output = new byte[plaintextLength];
- decryptCipher.ProcessBytes(ciphertext, offset, plaintextLength, output, 0);
- return output;
- }
- protected virtual KeyParameter InitRecord(IStreamCipher cipher, bool forEncryption, long seqNo, byte[] iv)
- {
- byte[] nonce = CalculateNonce(seqNo, iv);
- cipher.Init(forEncryption, new ParametersWithIV(null, nonce));
- return GenerateRecordMacKey(cipher);
- }
- protected virtual byte[] CalculateNonce(long seqNo, byte[] iv)
- {
- byte[] nonce = new byte[12];
- TlsUtilities.WriteUint64(seqNo, nonce, 4);
- for (int i = 0; i < 12; ++i)
- {
- nonce[i] ^= iv[i];
- }
- return nonce;
- }
- protected virtual KeyParameter GenerateRecordMacKey(IStreamCipher cipher)
- {
- byte[] firstBlock = new byte[64];
- cipher.ProcessBytes(firstBlock, 0, firstBlock.Length, firstBlock, 0);
- KeyParameter macKey = new KeyParameter(firstBlock, 0, 32);
- Arrays.Fill(firstBlock, (byte)0);
- return macKey;
- }
- protected virtual byte[] CalculateRecordMac(KeyParameter macKey, byte[] additionalData, byte[] buf, int off, int len)
- {
- IMac mac = new Poly1305();
- mac.Init(macKey);
- UpdateRecordMacText(mac, additionalData, 0, additionalData.Length);
- UpdateRecordMacText(mac, buf, off, len);
- UpdateRecordMacLength(mac, additionalData.Length);
- UpdateRecordMacLength(mac, len);
- return MacUtilities.DoFinal(mac);
- }
- protected virtual void UpdateRecordMacLength(IMac mac, int len)
- {
- byte[] longLen = Pack.UInt64_To_LE((ulong)len);
- mac.BlockUpdate(longLen, 0, longLen.Length);
- }
- protected virtual void UpdateRecordMacText(IMac mac, byte[] buf, int off, int len)
- {
- mac.BlockUpdate(buf, off, len);
- int partial = len % 16;
- if (partial != 0)
- {
- mac.BlockUpdate(Zeroes, 0, 16 - partial);
- }
- }
- /// <exception cref="IOException"></exception>
- protected virtual byte[] GetAdditionalData(long seqNo, byte type, int len)
- {
- /*
- * additional_data = seq_num + TLSCompressed.type + TLSCompressed.version +
- * TLSCompressed.length
- */
- byte[] additional_data = new byte[13];
- TlsUtilities.WriteUint64(seqNo, additional_data, 0);
- TlsUtilities.WriteUint8(type, additional_data, 8);
- TlsUtilities.WriteVersion(context.ServerVersion, additional_data, 9);
- TlsUtilities.WriteUint16(len, additional_data, 11);
- return additional_data;
- }
- }
- }
- #endif
|