13
13
import org .bouncycastle .tls .TlsCredentialedDecryptor ;
14
14
import org .bouncycastle .tls .crypto .TlsCryptoParameters ;
15
15
import org .bouncycastle .tls .crypto .TlsSecret ;
16
- import org .bouncycastle .tls .crypto .impl .TlsImplUtils ;
17
16
import org .bouncycastle .util .Arrays ;
18
17
19
18
/**
@@ -76,11 +75,11 @@ public TlsSecret decrypt(TlsCryptoParameters cryptoParams, byte[] ciphertext) th
76
75
}
77
76
78
77
/*
79
- * TODO[tls-ops] Probably need to make RSA encryption/decryption into TlsCrypto functions so
80
- * that users can implement "generic" encryption credentials externally
78
+ * TODO[tls-ops] Probably need to make RSA encryption/decryption into TlsCrypto functions so that users
79
+ * can implement "generic" encryption credentials externally
81
80
*/
82
- protected TlsSecret safeDecryptPreMasterSecret (TlsCryptoParameters cryptoParams , RSAKeyParameters rsaServerPrivateKey ,
83
- byte [] encryptedPreMasterSecret )
81
+ protected TlsSecret safeDecryptPreMasterSecret (TlsCryptoParameters cryptoParams ,
82
+ RSAKeyParameters rsaServerPrivateKey , byte [] encryptedPreMasterSecret )
84
83
{
85
84
SecureRandom secureRandom = crypto .getSecureRandom ();
86
85
@@ -89,12 +88,8 @@ protected TlsSecret safeDecryptPreMasterSecret(TlsCryptoParameters cryptoParams,
89
88
*/
90
89
ProtocolVersion expectedVersion = cryptoParams .getRSAPreMasterSecretVersion ();
91
90
92
- // TODO Provide as configuration option?
93
- boolean versionNumberCheckDisabled = false ;
94
-
95
91
/*
96
- * Generate 48 random bytes we can use as a Pre-Master-Secret, if the
97
- * PKCS1 padding check should fail.
92
+ * Generate 48 random bytes we can use as a Pre-Master-Secret, if the PKCS1 padding check should fail.
98
93
*/
99
94
byte [] fallback = new byte [48 ];
100
95
secureRandom .nextBytes (fallback );
@@ -110,46 +105,31 @@ protected TlsSecret safeDecryptPreMasterSecret(TlsCryptoParameters cryptoParams,
110
105
catch (Exception e )
111
106
{
112
107
/*
113
- * This should never happen since the decryption should never throw an exception
114
- * and return a random value instead.
108
+ * This should never happen since the decryption should never throw an exception and return a
109
+ * random value instead.
115
110
*
116
- * In any case, a TLS server MUST NOT generate an alert if processing an
117
- * RSA-encrypted premaster secret message fails, or the version number is not as
118
- * expected. Instead, it MUST continue the handshake with a randomly generated
119
- * premaster secret.
111
+ * In any case, a TLS server MUST NOT generate an alert if processing an RSA-encrypted premaster
112
+ * secret message fails, or the version number is not as expected. Instead, it MUST continue the
113
+ * handshake with a randomly generated premaster secret.
120
114
*/
121
115
}
122
116
123
117
/*
124
- * If ClientHello.legacy_version is TLS 1.1 or higher, server implementations MUST check the
125
- * version number [..].
118
+ * Compare the version number in the decrypted Pre-Master-Secret with the legacy_version field from
119
+ * the ClientHello. If they don't match, continue the handshake with the randomly generated 'fallback'
120
+ * value.
121
+ *
122
+ * NOTE: The comparison and replacement must be constant-time.
126
123
*/
127
- if (versionNumberCheckDisabled && !TlsImplUtils .isTLSv11 (expectedVersion ))
128
- {
129
- /*
130
- * If the version number is TLS 1.0 or earlier, server implementations SHOULD check the
131
- * version number, but MAY have a configuration option to disable the check.
132
- */
133
- }
134
- else
135
- {
136
- /*
137
- * Compare the version number in the decrypted Pre-Master-Secret with the legacy_version
138
- * field from the ClientHello. If they don't match, continue the handshake with the
139
- * randomly generated 'fallback' value.
140
- *
141
- * NOTE: The comparison and replacement must be constant-time.
142
- */
143
- int mask = (expectedVersion .getMajorVersion () ^ (M [0 ] & 0xFF ))
144
- | (expectedVersion .getMinorVersion () ^ (M [1 ] & 0xFF ));
124
+ int mask = (expectedVersion .getMajorVersion () ^ (M [0 ] & 0xFF ))
125
+ | (expectedVersion .getMinorVersion () ^ (M [1 ] & 0xFF ));
145
126
146
- // 'mask' will be all 1s if the versions matched, or else all 0s.
147
- mask = (mask - 1 ) >> 31 ;
127
+ // 'mask' will be all 1s if the versions matched, or else all 0s.
128
+ mask = (mask - 1 ) >> 31 ;
148
129
149
- for (int i = 0 ; i < 48 ; i ++)
150
- {
151
- M [i ] = (byte )((M [i ] & mask ) | (fallback [i ] & ~mask ));
152
- }
130
+ for (int i = 0 ; i < 48 ; i ++)
131
+ {
132
+ M [i ] = (byte )((M [i ] & mask ) | (fallback [i ] & ~mask ));
153
133
}
154
134
155
135
return crypto .createSecret (M );
0 commit comments