/* * Mentalis.org Security Library * * Copyright © 2002-2005, The KPD-Team * All rights reserved. * http://www.mentalis.org/ * * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * - Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * - Neither the name of the KPD-Team, nor the names of its contributors * may be used to endorse or promote products derived from this * software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL * THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. */ using System; using System.IO; using System.Text; using System.Collections; using System.Security.Cryptography; using System.Runtime.InteropServices; using Org.Mentalis.Security.Cryptography; using Org.Mentalis.Security.Certificates; using Org.Mentalis.Security.Ssl; using Org.Mentalis.Security.Ssl.Shared; namespace Org.Mentalis.Security.Ssl.Tls1 { /* Client Server ClientHello --------> ServerHello Certificate* ServerKeyExchange* CertificateRequest* <-------- ServerHelloDone Certificate* ClientKeyExchange CertificateVerify* [ChangeCipherSpec] Finished --------> [ChangeCipherSpec] <-------- Finished Application Data <-------> Application Data */ internal class Tls1ClientHandshakeLayer : ClientHandshakeLayer { public Tls1ClientHandshakeLayer(RecordLayer recordLayer, SecurityOptions options) : base(recordLayer, options) {} public Tls1ClientHandshakeLayer(HandshakeLayer handshakeLayer) : base(handshakeLayer) {} public override SecureProtocol GetProtocol() { return SecureProtocol.Tls1; } protected override byte[] GenerateMasterSecret(byte[] premaster, byte[] clientRandom, byte[] serverRandom) { return Tls1CipherSuites.GenerateMasterSecret(premaster, clientRandom, serverRandom); } protected override byte[] GetFinishedMessage() { HandshakeMessage hm = new HandshakeMessage(HandshakeType.Finished, null); byte[] hash = new byte[36]; m_LocalMD5Hash.TransformFinalBlock(new byte[0], 0, 0); m_LocalSHA1Hash.TransformFinalBlock(new byte[0], 0, 0); Array.Copy(m_LocalMD5Hash.Hash, 0, hash, 0, 16); Array.Copy(m_LocalSHA1Hash.Hash, 0, hash, 16, 20); PseudoRandomDeriveBytes prf = new PseudoRandomDeriveBytes(m_MasterSecret, "client finished", hash); hm.fragment = prf.GetBytes(12); prf.Dispose(); return hm.ToBytes(); } protected override void VerifyFinishedMessage(byte[] peerFinished) { if (peerFinished.Length != 12) throw new SslException(AlertDescription.IllegalParameter, "The ServerHelloDone message is invalid."); byte[] hash = new byte[36]; m_RemoteMD5Hash.TransformFinalBlock(new byte[0], 0, 0); m_RemoteSHA1Hash.TransformFinalBlock(new byte[0], 0, 0); Array.Copy(m_RemoteMD5Hash.Hash, 0, hash, 0, 16); Array.Copy(m_RemoteSHA1Hash.Hash, 0, hash, 16, 20); PseudoRandomDeriveBytes prf = new PseudoRandomDeriveBytes(m_MasterSecret, "server finished", hash); byte[] prfBytes = prf.GetBytes(12); prf.Dispose(); for(int i = 0; i < prfBytes.Length; i++) { if (prfBytes[i] != peerFinished[i]) throw new SslException(AlertDescription.HandshakeFailure, "The computed hash verification does not correspond with the one of the client."); } } public override ProtocolVersion GetVersion() { return new ProtocolVersion(3, 1); } } }