| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313 |
- // Transport Security Layer (TLS)
- // Copyright (c) 2003-2004 Carlos Guzman Alvarez
- //
- // Permission is hereby granted, free of charge, to any person obtaining
- // a copy of this software and associated documentation files (the
- // "Software"), to deal in the Software without restriction, including
- // without limitation the rights to use, copy, modify, merge, publish,
- // distribute, sublicense, and/or sell copies of the Software, and to
- // permit persons to whom the Software is furnished to do so, subject to
- // the following conditions:
- //
- // The above copyright notice and this permission notice shall be
- // included in all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
- // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
- // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
- // NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
- // LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
- // OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
- // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
- //
- using System;
- using System.Collections;
- using System.IO;
- using System.Net;
- using System.Net.Sockets;
- using System.Security.Cryptography;
- using System.Security.Cryptography.X509Certificates;
- using Mono.Security.Protocol.Tls.Handshake;
- namespace Mono.Security.Protocol.Tls
- {
- public class SslServerStream : SslStreamBase
- {
- #region Internal Events
-
- internal event CertificateValidationCallback ClientCertValidation;
- internal event PrivateKeySelectionCallback PrivateKeySelection;
-
- #endregion
- #region Properties
- public X509Certificate ClientCertificate
- {
- get
- {
- if (this.context.HandshakeState == HandshakeState.Finished)
- {
- return this.context.ClientSettings.ClientCertificate;
- }
- return null;
- }
- }
- #endregion
- #region Callback Properties
- public CertificateValidationCallback ClientCertValidationDelegate
- {
- get { return this.ClientCertValidation; }
- set { this.ClientCertValidation = value; }
- }
- public PrivateKeySelectionCallback PrivateKeyCertSelectionDelegate
- {
- get { return this.PrivateKeySelection; }
- set { this.PrivateKeySelection = value; }
- }
- #endregion
- #region Constructors
- public SslServerStream(
- Stream stream,
- X509Certificate serverCertificate) : this(
- stream,
- serverCertificate,
- false,
- false,
- SecurityProtocolType.Default)
- {
- }
- public SslServerStream(
- Stream stream,
- X509Certificate serverCertificate,
- bool clientCertificateRequired,
- bool ownsStream): this(
- stream,
- serverCertificate,
- clientCertificateRequired,
- ownsStream,
- SecurityProtocolType.Default)
- {
- }
- public SslServerStream(
- Stream stream,
- X509Certificate serverCertificate,
- bool clientCertificateRequired,
- bool ownsStream,
- SecurityProtocolType securityProtocolType)
- : base(stream, ownsStream)
- {
- this.context = new ServerContext(
- this,
- securityProtocolType,
- serverCertificate,
- clientCertificateRequired);
- this.protocol = new ServerRecordProtocol(innerStream, (ServerContext)this.context);
- }
- #endregion
- #region Finalizer
- ~SslServerStream()
- {
- this.Dispose(false);
- }
- #endregion
- #region IDisposable Methods
- protected override void Dispose(bool disposing)
- {
- base.Dispose(disposing);
- if (disposing)
- {
- this.ClientCertValidation = null;
- this.PrivateKeySelection = null;
- }
- }
- #endregion
- #region Handsake Methods
- /*
- Client Server
- ClientHello -------->
- ServerHello
- Certificate*
- ServerKeyExchange*
- CertificateRequest*
- <-------- ServerHelloDone
- Certificate*
- ClientKeyExchange
- CertificateVerify*
- [ChangeCipherSpec]
- Finished -------->
- [ChangeCipherSpec]
- <-------- Finished
- Application Data <-------> Application Data
- Fig. 1 - Message flow for a full handshake
- */
- internal override IAsyncResult OnBeginNegotiateHandshake(AsyncCallback callback, object state)
- {
- // Reset the context if needed
- if (this.context.HandshakeState != HandshakeState.None)
- {
- this.context.Clear();
- }
- // Obtain supported cipher suites
- this.context.SupportedCiphers = CipherSuiteFactory.GetSupportedCiphers(this.context.SecurityProtocol);
- // Set handshake state
- this.context.HandshakeState = HandshakeState.Started;
- // Receive Client Hello message
- return this.protocol.BeginReceiveRecord(this.innerStream, callback, state);
- }
- internal override void OnNegotiateHandshakeCallback(IAsyncResult asyncResult)
- {
- // Receive Client Hello message and ignore it
- this.protocol.EndReceiveRecord(asyncResult);
- // If received message is not an ClientHello send a
- // Fatal Alert
- if (this.context.LastHandshakeMsg != HandshakeType.ClientHello)
- {
- this.protocol.SendAlert(AlertDescription.UnexpectedMessage);
- }
- // Send ServerHello message
- this.protocol.SendRecord(HandshakeType.ServerHello);
- // Send ServerCertificate message
- this.protocol.SendRecord(HandshakeType.Certificate);
- // If the negotiated cipher is a KeyEx cipher send ServerKeyExchange
- if (this.context.Negotiating.Cipher.IsExportable)
- {
- this.protocol.SendRecord(HandshakeType.ServerKeyExchange);
- }
- bool certRequested = false;
- // If the negotiated cipher is a KeyEx cipher or
- // the client certificate is required send the CertificateRequest message
- if (this.context.Negotiating.Cipher.IsExportable ||
- ((ServerContext)this.context).ClientCertificateRequired)
- {
- this.protocol.SendRecord(HandshakeType.CertificateRequest);
- certRequested = true;
- }
- // Send ServerHelloDone message
- this.protocol.SendRecord(HandshakeType.ServerHelloDone);
- // Receive client response, until the Client Finished message
- // is received. IE can be interrupted at this stage and never
- // complete the handshake
- while (this.context.LastHandshakeMsg != HandshakeType.Finished)
- {
- byte[] record = this.protocol.ReceiveRecord(this.innerStream);
- if ((record == null) || (record.Length == 0))
- {
- throw new TlsException(
- AlertDescription.HandshakeFailiure,
- "The client stopped the handshake.");
- }
- }
- if (certRequested && (this.context.ClientSettings.ClientCertificate == null))
- {
- // we asked for a certificate but didn't receive one
- // e.g. wget for SSL3
- if (!RaiseClientCertificateValidation(null, new int[0]))
- {
- throw new TlsException(
- AlertDescription.BadCertificate,
- "No certificate received from client.");
- }
- }
- // Send ChangeCipherSpec and ServerFinished messages
- this.protocol.SendChangeCipherSpec();
- this.protocol.SendRecord (HandshakeType.Finished);
- // The handshake is finished
- this.context.HandshakeState = HandshakeState.Finished;
- // Reset Handshake messages information
- this.context.HandshakeMessages.Reset ();
- // Clear Key Info
- this.context.ClearKeyInfo();
- }
- #endregion
- #region Event Methods
- internal override X509Certificate OnLocalCertificateSelection(X509CertificateCollection clientCertificates, X509Certificate serverCertificate, string targetHost, X509CertificateCollection serverRequestedCertificates)
- {
- throw new NotSupportedException();
- }
- internal override bool OnRemoteCertificateValidation(X509Certificate certificate, int[] errors)
- {
- if (this.ClientCertValidation != null)
- {
- return this.ClientCertValidation(certificate, errors);
- }
- return (errors != null && errors.Length == 0);
- }
- internal bool RaiseClientCertificateValidation(
- X509Certificate certificate,
- int[] certificateErrors)
- {
- return base.RaiseRemoteCertificateValidation(certificate, certificateErrors);
- }
- internal override AsymmetricAlgorithm OnLocalPrivateKeySelection(X509Certificate certificate, string targetHost)
- {
- if (this.PrivateKeySelection != null)
- {
- return this.PrivateKeySelection(certificate, targetHost);
- }
- return null;
- }
- internal AsymmetricAlgorithm RaisePrivateKeySelection(
- X509Certificate certificate,
- string targetHost)
- {
- return base.RaiseLocalPrivateKeySelection(certificate, targetHost);
- }
- #endregion
- }
- }
|