terraria-cpp2il-methodrecon v1.4.4.9
Terraria mobile dump, with reconstructed method body. Dump with CallAnalysis: https://infinitynichto.github.io/terraria-cpp2il
Loading...
Searching...
No Matches
MobileTlsContext.cs
Go to the documentation of this file.
1using System;
8
9namespace Mono.Net.Security
10{
11 // Token: 0x0200005F RID: 95
12 internal abstract class MobileTlsContext : IDisposable
13 {
14 // Token: 0x0600012F RID: 303 RVA: 0x000050FC File Offset: 0x000032FC
22
23 // Token: 0x17000032 RID: 50
24 // (get) Token: 0x06000130 RID: 304 RVA: 0x00005190 File Offset: 0x00003390
26 {
28 get
29 {
30 return this.<Parent>k__BackingField;
31 }
32 }
33
34 // Token: 0x17000033 RID: 51
35 // (get) Token: 0x06000131 RID: 305 RVA: 0x00002050 File Offset: 0x00000250
37 {
38 get
39 {
40 throw new global::Cpp2IlInjected.AnalysisFailedException("CPP2IL failed to recover any usable IL for this method.");
41 }
42 }
43
44 // Token: 0x17000034 RID: 52
45 // (get) Token: 0x06000132 RID: 306
46 public abstract bool IsAuthenticated { get; }
47
48 // Token: 0x17000035 RID: 53
49 // (get) Token: 0x06000133 RID: 307 RVA: 0x000051A4 File Offset: 0x000033A4
50 public bool IsServer
51 {
53 get
54 {
55 return this.<IsServer>k__BackingField;
56 }
57 }
58
59 // Token: 0x17000036 RID: 54
60 // (get) Token: 0x06000134 RID: 308 RVA: 0x000051B8 File Offset: 0x000033B8
61 internal string TargetHost
62 {
64 get
65 {
66 return this.<TargetHost>k__BackingField;
67 }
68 }
69
70 // Token: 0x17000037 RID: 55
71 // (get) Token: 0x06000135 RID: 309 RVA: 0x000051CC File Offset: 0x000033CC
72 protected string ServerName
73 {
75 get
76 {
77 return this.<ServerName>k__BackingField;
78 }
79 }
80
81 // Token: 0x17000038 RID: 56
82 // (get) Token: 0x06000136 RID: 310 RVA: 0x000051E0 File Offset: 0x000033E0
84 {
86 get
87 {
89 }
90 }
91
92 // Token: 0x17000039 RID: 57
93 // (get) Token: 0x06000137 RID: 311 RVA: 0x000051F4 File Offset: 0x000033F4
94 protected global::System.Security.Cryptography.X509Certificates.X509CertificateCollection ClientCertificates
95 {
97 get
98 {
100 }
101 }
102
103 // Token: 0x06000138 RID: 312
104 public abstract void StartHandshake();
105
106 // Token: 0x06000139 RID: 313
107 public abstract bool ProcessHandshake();
108
109 // Token: 0x0600013A RID: 314
110 public abstract void FinishHandshake();
111
112 // Token: 0x1700003A RID: 58
113 // (get) Token: 0x0600013B RID: 315 RVA: 0x00005208 File Offset: 0x00003408
114 // (set) Token: 0x0600013C RID: 316 RVA: 0x0000521C File Offset: 0x0000341C
116 {
118 get
119 {
121 }
123 private set
124 {
126 }
127 }
128
129 // Token: 0x1700003B RID: 59
130 // (get) Token: 0x0600013D RID: 317
131 internal abstract X509Certificate LocalClientCertificate { get; }
132
133 // Token: 0x1700003C RID: 60
134 // (get) Token: 0x0600013E RID: 318
135 public abstract global::System.Security.Cryptography.X509Certificates.X509Certificate2 RemoteCertificate { get; }
136
137 // Token: 0x0600013F RID: 319
138 public abstract ValueTuple<int, bool> Read(byte[] buffer, int offset, int count);
139
140 // Token: 0x06000140 RID: 320
141 public abstract ValueTuple<int, bool> Write(byte[] buffer, int offset, int count);
142
143 // Token: 0x06000141 RID: 321
144 public abstract void Shutdown();
145
146 // Token: 0x06000142 RID: 322
147 public abstract bool PendingRenegotiation();
148
149 // Token: 0x06000143 RID: 323 RVA: 0x00005230 File Offset: 0x00003430
150 protected bool ValidateCertificate(global::System.Security.Cryptography.X509Certificates.X509Certificate2 leaf, global::System.Security.Cryptography.X509Certificates.X509Chain chain)
151 {
153 do
154 {
156 string text = this.<TargetHost>k__BackingField;
157 bool flag = this.<IsServer>k__BackingField;
158 validationResult = chainValidationHelper.ValidateCertificate(text, flag, leaf, chain);
159 }
160 while (validationResult == null);
161 if (validationResult.trusted)
162 {
163 bool user_denied = validationResult.user_denied;
164 return;
165 }
166 }
167
168 // Token: 0x06000144 RID: 324 RVA: 0x00005274 File Offset: 0x00003474
170 {
171 if (true)
172 {
173 }
174 if (this != null)
175 {
177 string text = this.<TargetHost>k__BackingField;
178 global::System.Security.Cryptography.X509Certificates.X509CertificateCollection x509CertificateCollection = this.<ClientCertificates>k__BackingField;
179 global::System.Net.Security.LocalCertSelectionCallback certSelectionCallback = chainValidationHelper.certSelectionCallback;
180 if (certSelectionCallback != null)
181 {
182 IntPtr invoke_impl = certSelectionCallback.invoke_impl;
183 IntPtr method_code = certSelectionCallback.method_code;
184 IntPtr method = certSelectionCallback.method;
185 }
186 global::System.Security.Cryptography.X509Certificates.X509CertificateCollection x509CertificateCollection2 = this.<ClientCertificates>k__BackingField;
188 {
189 if (acceptableIssuers != null && certSelectionCallback != null)
190 {
191 int count = this.<ClientCertificates>k__BackingField.Count;
192 long num = 0L;
193 long num3;
194 if (this.<ClientCertificates>k__BackingField[(int)num] != null)
195 {
196 global::System.Security.Cryptography.X509Certificates.X509ChainElementCollection x509ChainElementCollection;
197 if (x509ChainElementCollection.Count != 0)
198 {
199 long num2 = 0L;
200 global::System.Security.Cryptography.X509Certificates.X509ChainElementCollection x509ChainElementCollection2;
202 global::System.Security.Cryptography.X509Certificates.X509ChainElementCollection x509ChainElementCollection3;
203 string issuer = x509ChainElementCollection3[(int)num2].certificate.Issuer;
204 num3 = 0L;
205 }
206 long num4 = 0L;
207 int num5 = 15;
208 if (num3 != 0L)
209 {
210 }
211 if (num4 != 0L)
212 {
213 goto IL_00F5;
214 }
215 if (num5 != 0)
216 {
217 goto IL_00E0;
218 }
219 }
220 int count3 = this.<ClientCertificates>k__BackingField.Count;
221 while (num3 != 0L)
222 {
223 }
224 }
225 }
226 IL_00E0:
227 global::System.Security.Cryptography.X509Certificates.X509CertificateCollection x509CertificateCollection3 = this.<ClientCertificates>k__BackingField;
228 long num6 = 0L;
229 return x509CertificateCollection3[(int)num6];
230 }
231 IL_00F5:
232 throw new OutOfMemoryException();
233 }
234
235 // Token: 0x06000145 RID: 325
236 public abstract void Renegotiate();
237
238 // Token: 0x06000146 RID: 326 RVA: 0x00005390 File Offset: 0x00003590
239 public void Dispose()
240 {
241 GC.SuppressFinalize(this);
242 }
243
244 // Token: 0x06000147 RID: 327 RVA: 0x000053A4 File Offset: 0x000035A4
245 protected virtual void Dispose(bool disposing)
246 {
247 }
248
249 // Token: 0x06000148 RID: 328 RVA: 0x000053B4 File Offset: 0x000035B4
250 protected override void Finalize()
251 {
252 base.Finalize();
253 }
254
255 // Token: 0x04000109 RID: 265
257
258 // Token: 0x0400010A RID: 266
260 private readonly MonoSslAuthenticationOptions <Options>k__BackingField;
261
262 // Token: 0x0400010B RID: 267
264 private readonly MobileAuthenticatedStream <Parent>k__BackingField;
265
266 // Token: 0x0400010C RID: 268
268 private readonly bool <IsServer>k__BackingField;
269
270 // Token: 0x0400010D RID: 269
272 private readonly string <TargetHost>k__BackingField;
273
274 // Token: 0x0400010E RID: 270
276 private readonly string <ServerName>k__BackingField;
277
278 // Token: 0x0400010F RID: 271
280 private readonly bool <AskForClientCertificate>k__BackingField;
281
282 // Token: 0x04000110 RID: 272
284 private readonly global::System.Security.Authentication.SslProtocols <EnabledProtocols>k__BackingField;
285
286 // Token: 0x04000111 RID: 273
288 private readonly global::System.Security.Cryptography.X509Certificates.X509CertificateCollection <ClientCertificates>k__BackingField;
289
290 // Token: 0x04000112 RID: 274
292 private X509Certificate <LocalServerCertificate>k__BackingField;
293 }
294}
class f__AnonymousType0<< Count > j__TPar
readonly MobileAuthenticatedStream< Parent > k__BackingField
bool ValidateCertificate(global::System.Security.Cryptography.X509Certificates.X509Certificate2 leaf, global::System.Security.Cryptography.X509Certificates.X509Chain chain)
ValueTuple< int, bool > Write(byte[] buffer, int offset, int count)
MobileAuthenticatedStream Parent
readonly bool< AskForClientCertificate > k__BackingField
X509Certificate< LocalServerCertificate > k__BackingField
readonly global::System.Security.Authentication.SslProtocols< EnabledProtocols > k__BackingField
ChainValidationHelper certificateValidator
MobileTlsContext(MobileAuthenticatedStream parent, MonoSslAuthenticationOptions options)
ValueTuple< int, bool > Read(byte[] buffer, int offset, int count)
readonly MonoSslAuthenticationOptions< Options > k__BackingField
readonly global::System.Security.Cryptography.X509Certificates.X509CertificateCollection< ClientCertificates > k__BackingField
readonly bool< IsServer > k__BackingField
readonly string< TargetHost > k__BackingField
X509Certificate SelectClientCertificate(string[] acceptableIssuers)
global::System.Security.Cryptography.X509Certificates.X509CertificateCollection ClientCertificates
global::System.Security.Cryptography.X509Certificates.X509Certificate2 RemoteCertificate
virtual void Dispose(bool disposing)
readonly string< ServerName > k__BackingField
static void SuppressFinalize(object obj)
Definition GC.cs:116