| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421 |
- // Transport Security Layer (TLS)
- // Copyright (c) 2003-2004 Carlos Guzman Alvarez
- //
- // Permission is hereby granted, free of charge, to any person obtaining
- // a copy of this software and associated documentation files (the
- // "Software"), to deal in the Software without restriction, including
- // without limitation the rights to use, copy, modify, merge, publish,
- // distribute, sublicense, and/or sell copies of the Software, and to
- // permit persons to whom the Software is furnished to do so, subject to
- // the following conditions:
- //
- // The above copyright notice and this permission notice shall be
- // included in all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
- // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
- // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
- // NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
- // LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
- // OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
- // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
- //
- using System;
- using System.Collections;
- using System.IO;
- using System.Net;
- using System.Net.Sockets;
- using System.Security.Cryptography;
- using System.Security.Cryptography.X509Certificates;
- using System.Threading;
- using Mono.Security.Protocol.Tls.Handshake;
- namespace Mono.Security.Protocol.Tls
- {
- #region Delegates
- public delegate bool CertificateValidationCallback(
- X509Certificate certificate,
- int[] certificateErrors);
- public delegate X509Certificate CertificateSelectionCallback(
- X509CertificateCollection clientCertificates,
- X509Certificate serverCertificate,
- string targetHost,
- X509CertificateCollection serverRequestedCertificates);
- public delegate AsymmetricAlgorithm PrivateKeySelectionCallback(
- X509Certificate certificate,
- string targetHost);
- #endregion
- public class SslClientStream : SslStreamBase
- {
- #region Internal Events
-
- internal event CertificateValidationCallback ServerCertValidation;
- internal event CertificateSelectionCallback ClientCertSelection;
- internal event PrivateKeySelectionCallback PrivateKeySelection;
-
- #endregion
- #region Properties
- // required by HttpsClientStream for proxy support
- internal Stream InputBuffer
- {
- get { return base.inputBuffer; }
- }
- public X509CertificateCollection ClientCertificates
- {
- get { return this.context.ClientSettings.Certificates; }
- }
- public X509Certificate SelectedClientCertificate
- {
- get { return this.context.ClientSettings.ClientCertificate; }
- }
- #endregion
- #region Callback Properties
- public CertificateValidationCallback ServerCertValidationDelegate
- {
- get { return this.ServerCertValidation; }
- set { this.ServerCertValidation = value; }
- }
- public CertificateSelectionCallback ClientCertSelectionDelegate
- {
- get { return this.ClientCertSelection; }
- set { this.ClientCertSelection = value; }
- }
- public PrivateKeySelectionCallback PrivateKeyCertSelectionDelegate
- {
- get { return this.PrivateKeySelection; }
- set { this.PrivateKeySelection = value; }
- }
-
- #endregion
- #region Constructors
-
- public SslClientStream(
- Stream stream,
- string targetHost,
- bool ownsStream)
- : this(
- stream, targetHost, ownsStream,
- SecurityProtocolType.Default, null)
- {
- }
-
- public SslClientStream(
- Stream stream,
- string targetHost,
- X509Certificate clientCertificate)
- : this(
- stream, targetHost, false, SecurityProtocolType.Default,
- new X509CertificateCollection(new X509Certificate[]{clientCertificate}))
- {
- }
- public SslClientStream(
- Stream stream,
- string targetHost,
- X509CertificateCollection clientCertificates) :
- this(
- stream, targetHost, false, SecurityProtocolType.Default,
- clientCertificates)
- {
- }
- public SslClientStream(
- Stream stream,
- string targetHost,
- bool ownsStream,
- SecurityProtocolType securityProtocolType)
- : this(
- stream, targetHost, ownsStream, securityProtocolType,
- new X509CertificateCollection())
- {
- }
- public SslClientStream(
- Stream stream,
- string targetHost,
- bool ownsStream,
- SecurityProtocolType securityProtocolType,
- X509CertificateCollection clientCertificates):
- base(stream, ownsStream)
- {
- if (targetHost == null || targetHost.Length == 0)
- {
- throw new ArgumentNullException("targetHost is null or an empty string.");
- }
- this.context = new ClientContext(
- this,
- securityProtocolType,
- targetHost,
- clientCertificates);
- this.protocol = new ClientRecordProtocol(innerStream, (ClientContext)this.context);
- }
- #endregion
- #region Finalizer
- ~SslClientStream()
- {
- base.Dispose(false);
- }
- #endregion
- #region IDisposable Methods
- protected override void Dispose(bool disposing)
- {
- base.Dispose(disposing);
- if (disposing)
- {
- this.ServerCertValidation = null;
- this.ClientCertSelection = null;
- this.PrivateKeySelection = null;
- }
- }
- #endregion
- #region Handshake Methods
- /*
- Client Server
- ClientHello -------->
- ServerHello
- Certificate*
- ServerKeyExchange*
- CertificateRequest*
- <-------- ServerHelloDone
- Certificate*
- ClientKeyExchange
- CertificateVerify*
- [ChangeCipherSpec]
- Finished -------->
- [ChangeCipherSpec]
- <-------- Finished
- Application Data <-------> Application Data
- Fig. 1 - Message flow for a full handshake
- */
- internal override IAsyncResult OnBeginNegotiateHandshake(AsyncCallback callback, object state)
- {
- try
- {
- if (this.context.HandshakeState != HandshakeState.None)
- {
- this.context.Clear();
- }
- // Obtain supported cipher suites
- this.context.SupportedCiphers = CipherSuiteFactory.GetSupportedCiphers(this.context.SecurityProtocol);
- // Set handshake state
- this.context.HandshakeState = HandshakeState.Started;
- // Send client hello
- return this.protocol.BeginSendRecord(HandshakeType.ClientHello, callback, state);
- }
- catch (TlsException ex)
- {
- this.protocol.SendAlert(ex.Alert);
- throw new IOException("The authentication or decryption has failed.", ex);
- }
- catch (Exception ex)
- {
- this.protocol.SendAlert(AlertDescription.InternalError);
- throw new IOException("The authentication or decryption has failed.", ex);
- }
- }
- private void SafeReceiveRecord (Stream s)
- {
- byte[] record = this.protocol.ReceiveRecord (s);
- if ((record == null) || (record.Length == 0)) {
- throw new TlsException (
- AlertDescription.HandshakeFailiure,
- "The server stopped the handshake.");
- }
- }
- internal override void OnNegotiateHandshakeCallback(IAsyncResult asyncResult)
- {
- this.protocol.EndSendRecord(asyncResult);
- // Read server response
- while (this.context.LastHandshakeMsg != HandshakeType.ServerHelloDone)
- {
- // Read next record
- SafeReceiveRecord (this.innerStream);
- // special case for abbreviated handshake where no ServerHelloDone is sent from the server
- if (this.context.AbbreviatedHandshake && (this.context.LastHandshakeMsg == HandshakeType.ServerHello))
- break;
- }
- // the handshake is much easier if we can reuse a previous session settings
- if (this.context.AbbreviatedHandshake)
- {
- ClientSessionCache.SetContextFromCache (this.context);
- this.context.Negotiating.Cipher.ComputeKeys ();
- this.context.Negotiating.Cipher.InitializeCipher ();
- // Send Cipher Spec protocol
- this.protocol.SendChangeCipherSpec ();
- // Read record until server finished is received
- while (this.context.HandshakeState != HandshakeState.Finished)
- {
- // If all goes well this will process messages:
- // Change Cipher Spec
- // Server finished
- SafeReceiveRecord (this.innerStream);
- }
- // Send Finished message
- this.protocol.SendRecord (HandshakeType.Finished);
- }
- else
- {
- // Send client certificate if requested
- // even if the server ask for it it _may_ still be optional
- bool clientCertificate = this.context.ServerSettings.CertificateRequest;
- // NOTE: sadly SSL3 and TLS1 differs in how they handle this and
- // the current design doesn't allow a very cute way to handle
- // SSL3 alert warning for NoCertificate (41).
- if (this.context.SecurityProtocol == SecurityProtocolType.Ssl3)
- {
- clientCertificate = ((this.context.ClientSettings.Certificates != null) &&
- (this.context.ClientSettings.Certificates.Count > 0));
- // this works well with OpenSSL (but only for SSL3)
- }
- if (clientCertificate)
- {
- this.protocol.SendRecord(HandshakeType.Certificate);
- }
- // Send Client Key Exchange
- this.protocol.SendRecord(HandshakeType.ClientKeyExchange);
- // Now initialize session cipher with the generated keys
- this.context.Negotiating.Cipher.InitializeCipher();
- // Send certificate verify if requested (optional)
- if (clientCertificate && (this.context.ClientSettings.ClientCertificate != null))
- {
- this.protocol.SendRecord(HandshakeType.CertificateVerify);
- }
- // Send Cipher Spec protocol
- this.protocol.SendChangeCipherSpec ();
- // Send Finished message
- this.protocol.SendRecord (HandshakeType.Finished);
- // Read record until server finished is received
- while (this.context.HandshakeState != HandshakeState.Finished) {
- // If all goes well this will process messages:
- // Change Cipher Spec
- // Server finished
- SafeReceiveRecord (this.innerStream);
- }
- }
- // Reset Handshake messages information
- this.context.HandshakeMessages.Reset ();
- // Clear Key Info
- this.context.ClearKeyInfo();
- }
- #endregion
- #region Event Methods
- internal override X509Certificate OnLocalCertificateSelection(X509CertificateCollection clientCertificates, X509Certificate serverCertificate, string targetHost, X509CertificateCollection serverRequestedCertificates)
- {
- if (this.ClientCertSelection != null)
- {
- return this.ClientCertSelection(
- clientCertificates,
- serverCertificate,
- targetHost,
- serverRequestedCertificates);
- }
- return null;
- }
-
- internal override bool OnRemoteCertificateValidation(X509Certificate certificate, int[] errors)
- {
- if (this.ServerCertValidation != null)
- {
- return this.ServerCertValidation(certificate, errors);
- }
- return (errors != null && errors.Length == 0);
- }
- internal virtual bool RaiseServerCertificateValidation(
- X509Certificate certificate,
- int[] certificateErrors)
- {
- return base.RaiseRemoteCertificateValidation(certificate, certificateErrors);
- }
- internal X509Certificate RaiseClientCertificateSelection(
- X509CertificateCollection clientCertificates,
- X509Certificate serverCertificate,
- string targetHost,
- X509CertificateCollection serverRequestedCertificates)
- {
- return base.RaiseLocalCertificateSelection(clientCertificates, serverCertificate, targetHost, serverRequestedCertificates);
- }
- internal override AsymmetricAlgorithm OnLocalPrivateKeySelection(X509Certificate certificate, string targetHost)
- {
- if (this.PrivateKeySelection != null)
- {
- return this.PrivateKeySelection(certificate, targetHost);
- }
- return null;
- }
- internal AsymmetricAlgorithm RaisePrivateKeySelection(
- X509Certificate certificate,
- string targetHost)
- {
- return base.RaiseLocalPrivateKeySelection(certificate, targetHost);
- }
- #endregion
- }
- }
|