using System;
using System.IO;
namespace Org.BouncyCastle.Tls
{
/// RFC 6066 3. Server Name Indication
///
/// Current implementation uses this guidance: "For backward compatibility, all future data structures associated
/// with new NameTypes MUST begin with a 16-bit length field. TLS MAY treat provided server names as opaque data
/// and pass the names and types to the application.". RFC 6066 specifies ASCII encoding for host_name (possibly
/// using A-labels for IDNs), but note that the previous version (RFC 4366) specified UTF-8 encoding (see RFC 6066
/// Appendix A). For maximum compatibility, it is recommended that client code tolerate receiving UTF-8 from the
/// peer, but only generate ASCII itself.
///
public sealed class ServerName
{
private readonly short nameType;
private readonly byte[] nameData;
public ServerName(short nameType, byte[] nameData)
{
if (!TlsUtilities.IsValidUint8(nameType))
throw new ArgumentException("must be from 0 to 255", "nameType");
if (null == nameData)
throw new ArgumentNullException("nameData");
if (nameData.Length < 1 || !TlsUtilities.IsValidUint16(nameData.Length))
throw new ArgumentException("must have length from 1 to 65535", "nameData");
this.nameType = nameType;
this.nameData = nameData;
}
public byte[] NameData
{
get { return nameData; }
}
public short NameType
{
get { return nameType; }
}
/// Encode this to a .
/// the to encode to.
///
public void Encode(Stream output)
{
TlsUtilities.WriteUint8(nameType, output);
TlsUtilities.WriteOpaque16(nameData, output);
}
/// Parse a from a .
/// the to parse from.
/// a object.
///
public static ServerName Parse(Stream input)
{
short name_type = TlsUtilities.ReadUint8(input);
byte[] nameData = TlsUtilities.ReadOpaque16(input, 1);
return new ServerName(name_type, nameData);
}
}
}