using System; using System.IO; namespace Org.BouncyCastle.Tls { /// RFC 6066 3. Server Name Indication /// /// Current implementation uses this guidance: "For backward compatibility, all future data structures associated /// with new NameTypes MUST begin with a 16-bit length field. TLS MAY treat provided server names as opaque data /// and pass the names and types to the application.". RFC 6066 specifies ASCII encoding for host_name (possibly /// using A-labels for IDNs), but note that the previous version (RFC 4366) specified UTF-8 encoding (see RFC 6066 /// Appendix A). For maximum compatibility, it is recommended that client code tolerate receiving UTF-8 from the /// peer, but only generate ASCII itself. /// public sealed class ServerName { private readonly short nameType; private readonly byte[] nameData; public ServerName(short nameType, byte[] nameData) { if (!TlsUtilities.IsValidUint8(nameType)) throw new ArgumentException("must be from 0 to 255", "nameType"); if (null == nameData) throw new ArgumentNullException("nameData"); if (nameData.Length < 1 || !TlsUtilities.IsValidUint16(nameData.Length)) throw new ArgumentException("must have length from 1 to 65535", "nameData"); this.nameType = nameType; this.nameData = nameData; } public byte[] NameData { get { return nameData; } } public short NameType { get { return nameType; } } /// Encode this to a . /// the to encode to. /// public void Encode(Stream output) { TlsUtilities.WriteUint8(nameType, output); TlsUtilities.WriteOpaque16(nameData, output); } /// Parse a from a . /// the to parse from. /// a object. /// public static ServerName Parse(Stream input) { short name_type = TlsUtilities.ReadUint8(input); byte[] nameData = TlsUtilities.ReadOpaque16(input, 1); return new ServerName(name_type, nameData); } } }