Imported Upstream version 5.18.0.142

Former-commit-id: 7467d4b717762eeaf652d77f1486dd11ffb1ff1f
This commit is contained in:
Xamarin Public Jenkins (auto-signing)
2018-10-09 08:20:59 +00:00
parent e52655b4dc
commit 0abdbe5a7d
1547 changed files with 93792 additions and 47893 deletions

View File

@@ -275,19 +275,19 @@ namespace Mono.Security.Cryptography {
#if INSIDE_CORLIB
[MethodImplAttribute (MethodImplOptions.InternalCall)]
internal static extern bool _CanSecure (string root);
unsafe internal static extern bool _CanSecure (char* root);
[MethodImplAttribute (MethodImplOptions.InternalCall)]
internal static extern bool _ProtectUser (string path);
unsafe internal static extern bool _ProtectUser (char* path);
[MethodImplAttribute (MethodImplOptions.InternalCall)]
internal static extern bool _ProtectMachine (string path);
unsafe internal static extern bool _ProtectMachine (char* path);
[MethodImplAttribute (MethodImplOptions.InternalCall)]
internal static extern bool _IsUserProtected (string path);
unsafe internal static extern bool _IsUserProtected (char* path);
[MethodImplAttribute (MethodImplOptions.InternalCall)]
internal static extern bool _IsMachineProtected (string path);
unsafe internal static extern bool _IsMachineProtected (char* path);
#else
// Mono.Security.dll assembly can't use the internal
// call (and still run with other runtimes)
@@ -295,34 +295,34 @@ namespace Mono.Security.Cryptography {
// Note: Class is only available in Mono.Security.dll as
// a management helper (e.g. build a GUI app)
internal static bool _CanSecure (string root)
unsafe internal static bool _CanSecure (char* root)
{
return true;
}
internal static bool _ProtectUser (string path)
unsafe internal static bool _ProtectUser (char* path)
{
return true;
}
internal static bool _ProtectMachine (string path)
unsafe internal static bool _ProtectMachine (char* path)
{
return true;
}
internal static bool _IsUserProtected (string path)
unsafe internal static bool _IsUserProtected (char* path)
{
return true;
}
internal static bool _IsMachineProtected (string path)
unsafe internal static bool _IsMachineProtected (char* path)
{
return true;
}
#endif
// private stuff
private static bool CanSecure (string path)
unsafe private static bool CanSecure (string path)
{
// we assume POSIX filesystems can always be secured
@@ -333,44 +333,54 @@ namespace Mono.Security.Cryptography {
return true;
// while we ask the runtime for Windows OS
return _CanSecure (Path.GetPathRoot (path));
fixed (char* fpath = path) {
return _CanSecure (fpath);
}
}
private static bool ProtectUser (string path)
unsafe private static bool ProtectUser (string path)
{
// we cannot protect on some filsystem (like FAT)
if (CanSecure (path)) {
return _ProtectUser (path);
fixed (char* fpath = path) {
return _ProtectUser (fpath);
}
}
// but Mono still needs to run on them :(
return true;
}
private static bool ProtectMachine (string path)
unsafe private static bool ProtectMachine (string path)
{
// we cannot protect on some filsystem (like FAT)
if (CanSecure (path)) {
return _ProtectMachine (path);
fixed (char* fpath = path) {
return _ProtectMachine (fpath);
}
}
// but Mono still needs to run on them :(
return true;
}
private static bool IsUserProtected (string path)
unsafe private static bool IsUserProtected (string path)
{
// we cannot protect on some filsystem (like FAT)
if (CanSecure (path)) {
return _IsUserProtected (path);
fixed (char* fpath = path) {
return _IsUserProtected (fpath);
}
}
// but Mono still needs to run on them :(
return true;
}
private static bool IsMachineProtected (string path)
unsafe private static bool IsMachineProtected (string path)
{
// we cannot protect on some filsystem (like FAT)
if (CanSecure (path)) {
return _IsMachineProtected (path);
fixed (char* fpath = path) {
return _IsMachineProtected (fpath);
}
}
// but Mono still needs to run on them :(
return true;

View File

@@ -1,148 +0,0 @@
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to
// permit persons to whom the Software is furnished to do so, subject to
// the following conditions:
//
// The above copyright notice and this permission notice shall be
// included in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
/* Transport Security Layer (TLS)
* Copyright (c) 2003-2004 Carlos Guzman Alvarez
*
* Permission is hereby granted, free of charge, to any person
* obtaining a copy of this software and associated documentation
* files (the "Software"), to deal in the Software without restriction,
* including without limitation the rights to use, copy, modify, merge,
* publish, distribute, sublicense, and/or sell copies of the Software,
* and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included
* in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
* OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
* WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
* DEALINGS IN THE SOFTWARE.
*/
using System;
using System.Security.Cryptography;
using Mono.Security.Protocol.Tls;
namespace Mono.Security.Cryptography
{
internal class MD5SHA1 : HashAlgorithm
{
#region Fields
private HashAlgorithm md5;
private HashAlgorithm sha;
private bool hashing;
#endregion
#region Constructors
public MD5SHA1() : base()
{
this.md5 = MD5.Create();
this.sha = SHA1.Create();
// Set HashSizeValue
this.HashSizeValue = this.md5.HashSize + this.sha.HashSize;
}
#endregion
#region Methods
public override void Initialize()
{
this.md5.Initialize();
this.sha.Initialize();
this.hashing = false;
}
protected override byte[] HashFinal()
{
if (!hashing)
{
this.hashing = true;
}
// Finalize the original hash
this.md5.TransformFinalBlock(new byte[0], 0, 0);
this.sha.TransformFinalBlock(new byte[0], 0, 0);
byte[] hash = new byte[36];
Buffer.BlockCopy(this.md5.Hash, 0, hash, 0, 16);
Buffer.BlockCopy(this.sha.Hash, 0, hash, 16, 20);
return hash;
}
protected override void HashCore(
byte[] array,
int ibStart,
int cbSize)
{
if (!hashing)
{
hashing = true;
}
this.md5.TransformBlock(array, ibStart, cbSize, array, ibStart);
this.sha.TransformBlock(array, ibStart, cbSize, array, ibStart);
}
public byte[] CreateSignature(RSA rsa)
{
if (rsa == null)
{
throw new CryptographicUnexpectedOperationException ("missing key");
}
RSASslSignatureFormatter f = new RSASslSignatureFormatter(rsa);
f.SetHashAlgorithm("MD5SHA1");
return f.CreateSignature(this.Hash);
}
public bool VerifySignature(RSA rsa, byte[] rgbSignature)
{
if (rsa == null)
{
throw new CryptographicUnexpectedOperationException ("missing key");
}
if (rgbSignature == null)
{
throw new ArgumentNullException ("rgbSignature");
}
RSASslSignatureDeformatter d = new RSASslSignatureDeformatter(rsa);
d.SetHashAlgorithm("MD5SHA1");
return d.VerifySignature(this.Hash, rgbSignature);
}
#endregion
}
}