123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Digests;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Macs;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Utilities;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Math;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
- namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators
- {
- /**
- * Generator for Pbe derived keys and ivs as defined by Pkcs 5 V2.0 Scheme 2.
- * This generator uses a SHA-1 HMac as the calculation function.
- * <p>
- * The document this implementation is based on can be found at
- * <a href="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5/index.html">
- * RSA's Pkcs5 Page</a></p>
- */
- public class Pkcs5S2ParametersGenerator
- : PbeParametersGenerator
- {
- private readonly IMac hMac;
- private readonly byte[] state;
- /**
- * construct a Pkcs5 Scheme 2 Parameters generator.
- */
- public Pkcs5S2ParametersGenerator()
- : this(new Sha1Digest())
- {
- }
- public Pkcs5S2ParametersGenerator(IDigest digest)
- {
- this.hMac = new HMac(digest);
- this.state = new byte[hMac.GetMacSize()];
- }
- private void F(
- byte[] S,
- int c,
- byte[] iBuf,
- byte[] outBytes,
- int outOff)
- {
- if (c == 0)
- throw new ArgumentException("iteration count must be at least 1.");
- if (S != null)
- {
- hMac.BlockUpdate(S, 0, S.Length);
- }
- hMac.BlockUpdate(iBuf, 0, iBuf.Length);
- hMac.DoFinal(state, 0);
- Array.Copy(state, 0, outBytes, outOff, state.Length);
- for (int count = 1; count < c; ++count)
- {
- hMac.BlockUpdate(state, 0, state.Length);
- hMac.DoFinal(state, 0);
- for (int j = 0; j < state.Length; ++j)
- {
- outBytes[outOff + j] ^= state[j];
- }
- }
- }
- private byte[] GenerateDerivedKey(
- int dkLen)
- {
- int hLen = hMac.GetMacSize();
- int l = (dkLen + hLen - 1) / hLen;
- byte[] iBuf = new byte[4];
- byte[] outBytes = new byte[l * hLen];
- int outPos = 0;
- ICipherParameters param = new KeyParameter(mPassword);
- hMac.Init(param);
- for (int i = 1; i <= l; i++)
- {
- // Increment the value in 'iBuf'
- int pos = 3;
- while (++iBuf[pos] == 0)
- {
- --pos;
- }
- F(mSalt, mIterationCount, iBuf, outBytes, outPos);
- outPos += hLen;
- }
- return outBytes;
- }
- /**
- * Generate a key parameter derived from the password, salt, and iteration
- * count we are currently initialised with.
- *
- * @param keySize the size of the key we want (in bits)
- * @return a KeyParameter object.
- */
- public override ICipherParameters GenerateDerivedParameters(
- int keySize)
- {
- return GenerateDerivedMacParameters(keySize);
- }
- public override ICipherParameters GenerateDerivedParameters(
- string algorithm,
- int keySize)
- {
- keySize /= 8;
- byte[] dKey = GenerateDerivedKey(keySize);
- return ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize);
- }
- /**
- * Generate a key with initialisation vector parameter derived from
- * the password, salt, and iteration count we are currently initialised
- * with.
- *
- * @param keySize the size of the key we want (in bits)
- * @param ivSize the size of the iv we want (in bits)
- * @return a ParametersWithIV object.
- */
- public override ICipherParameters GenerateDerivedParameters(
- int keySize,
- int ivSize)
- {
- keySize /= 8;
- ivSize /= 8;
- byte[] dKey = GenerateDerivedKey(keySize + ivSize);
- return new ParametersWithIV(new KeyParameter(dKey, 0, keySize), dKey, keySize, ivSize);
- }
- public override ICipherParameters GenerateDerivedParameters(
- string algorithm,
- int keySize,
- int ivSize)
- {
- keySize /= 8;
- ivSize /= 8;
- byte[] dKey = GenerateDerivedKey(keySize + ivSize);
- KeyParameter key = ParameterUtilities.CreateKeyParameter(algorithm, dKey, 0, keySize);
- return new ParametersWithIV(key, dKey, keySize, ivSize);
- }
- /**
- * Generate a key parameter for use with a MAC derived from the password,
- * salt, and iteration count we are currently initialised with.
- *
- * @param keySize the size of the key we want (in bits)
- * @return a KeyParameter object.
- */
- public override ICipherParameters GenerateDerivedMacParameters(
- int keySize)
- {
- keySize /= 8;
- byte[] dKey = GenerateDerivedKey(keySize);
- return new KeyParameter(dKey, 0, keySize);
- }
- }
- }
- #pragma warning restore
- #endif
|