123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Math;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
- namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators
- {
- /**
- * Generator for Pbe derived keys and ivs as defined by Pkcs 12 V1.0.
- * <p>
- * The document this implementation is based on can be found at
- * <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-12/index.html">
- * RSA's Pkcs12 Page</a>
- * </p>
- */
- public class Pkcs12ParametersGenerator
- : PbeParametersGenerator
- {
- public const int KeyMaterial = 1;
- public const int IVMaterial = 2;
- public const int MacMaterial = 3;
- private readonly IDigest digest;
- private readonly int u;
- private readonly int v;
- /**
- * Construct a Pkcs 12 Parameters generator.
- *
- * @param digest the digest to be used as the source of derived keys.
- * @exception ArgumentException if an unknown digest is passed in.
- */
- public Pkcs12ParametersGenerator(
- IDigest digest)
- {
- this.digest = digest;
- u = digest.GetDigestSize();
- v = digest.GetByteLength();
- }
- /**
- * add a + b + 1, returning the result in a. The a value is treated
- * as a BigInteger of length (b.Length * 8) bits. The result is
- * modulo 2^b.Length in case of overflow.
- */
- private void Adjust(
- byte[] a,
- int aOff,
- byte[] b)
- {
- int x = (b[b.Length - 1] & 0xff) + (a[aOff + b.Length - 1] & 0xff) + 1;
- a[aOff + b.Length - 1] = (byte)x;
- x = (int) ((uint) x >> 8);
- for (int i = b.Length - 2; i >= 0; i--)
- {
- x += (b[i] & 0xff) + (a[aOff + i] & 0xff);
- a[aOff + i] = (byte)x;
- x = (int) ((uint) x >> 8);
- }
- }
- /**
- * generation of a derived key ala Pkcs12 V1.0.
- */
- private byte[] GenerateDerivedKey(
- int idByte,
- int n)
- {
- byte[] D = new byte[v];
- byte[] dKey = new byte[n];
- for (int i = 0; i != D.Length; i++)
- {
- D[i] = (byte)idByte;
- }
- byte[] S;
- if ((mSalt != null) && (mSalt.Length != 0))
- {
- S = new byte[v * ((mSalt.Length + v - 1) / v)];
- for (int i = 0; i != S.Length; i++)
- {
- S[i] = mSalt[i % mSalt.Length];
- }
- }
- else
- {
- S = new byte[0];
- }
- byte[] P;
- if ((mPassword != null) && (mPassword.Length != 0))
- {
- P = new byte[v * ((mPassword.Length + v - 1) / v)];
- for (int i = 0; i != P.Length; i++)
- {
- P[i] = mPassword[i % mPassword.Length];
- }
- }
- else
- {
- P = new byte[0];
- }
- byte[] I = new byte[S.Length + P.Length];
- Array.Copy(S, 0, I, 0, S.Length);
- Array.Copy(P, 0, I, S.Length, P.Length);
- byte[] B = new byte[v];
- int c = (n + u - 1) / u;
- byte[] A = new byte[u];
- for (int i = 1; i <= c; i++)
- {
- digest.BlockUpdate(D, 0, D.Length);
- digest.BlockUpdate(I, 0, I.Length);
- digest.DoFinal(A, 0);
- for (int j = 1; j != mIterationCount; j++)
- {
- digest.BlockUpdate(A, 0, A.Length);
- digest.DoFinal(A, 0);
- }
- for (int j = 0; j != B.Length; j++)
- {
- B[j] = A[j % A.Length];
- }
- for (int j = 0; j != I.Length / v; j++)
- {
- Adjust(I, j * v, B);
- }
- if (i == c)
- {
- Array.Copy(A, 0, dKey, (i - 1) * u, dKey.Length - ((i - 1) * u));
- }
- else
- {
- Array.Copy(A, 0, dKey, (i - 1) * u, A.Length);
- }
- }
- return dKey;
- }
- /**
- * Generate a key parameter derived from the password, salt, and iteration
- * count we are currently initialised with.
- *
- * @param keySize the size of the key we want (in bits)
- * @return a KeyParameter object.
- */
- public override ICipherParameters GenerateDerivedParameters(
- int keySize)
- {
- keySize /= 8;
- byte[] dKey = GenerateDerivedKey(KeyMaterial, keySize);
- return new KeyParameter(dKey, 0, keySize);
- }
- public override ICipherParameters GenerateDerivedParameters(
- string algorithm,
- int keySize)
- {
- keySize /= 8;
- byte[] dKey = GenerateDerivedKey(KeyMaterial, keySize);
- return ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize);
- }
- /**
- * Generate a key with initialisation vector parameter derived from
- * the password, salt, and iteration count we are currently initialised
- * with.
- *
- * @param keySize the size of the key we want (in bits)
- * @param ivSize the size of the iv we want (in bits)
- * @return a ParametersWithIV object.
- */
- public override ICipherParameters GenerateDerivedParameters(
- int keySize,
- int ivSize)
- {
- keySize /= 8;
- ivSize /= 8;
- byte[] dKey = GenerateDerivedKey(KeyMaterial, keySize);
- byte[] iv = GenerateDerivedKey(IVMaterial, ivSize);
- return new ParametersWithIV(new KeyParameter(dKey, 0, keySize), iv, 0, ivSize);
- }
- public override ICipherParameters GenerateDerivedParameters(
- string algorithm,
- int keySize,
- int ivSize)
- {
- keySize /= 8;
- ivSize /= 8;
- byte[] dKey = GenerateDerivedKey(KeyMaterial, keySize);
- KeyParameter key = ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize);
- byte[] iv = GenerateDerivedKey(IVMaterial, ivSize);
- return new ParametersWithIV(key, iv, 0, ivSize);
- }
- /**
- * Generate a key parameter for use with a MAC derived from the password,
- * salt, and iteration count we are currently initialised with.
- *
- * @param keySize the size of the key we want (in bits)
- * @return a KeyParameter object.
- */
- public override ICipherParameters GenerateDerivedMacParameters(
- int keySize)
- {
- keySize /= 8;
- byte[] dKey = GenerateDerivedKey(MacMaterial, keySize);
- return new KeyParameter(dKey, 0, keySize);
- }
- }
- }
- #pragma warning restore
- #endif
|