123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using System.IO;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl
- {
- public abstract class RsaUtilities
- {
- private static readonly byte[] RSAPSSParams_256_A, RSAPSSParams_384_A, RSAPSSParams_512_A;
- private static readonly byte[] RSAPSSParams_256_B, RSAPSSParams_384_B, RSAPSSParams_512_B;
- static RsaUtilities()
- {
- /*
- * RFC 4055
- */
- AlgorithmIdentifier sha256Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256);
- AlgorithmIdentifier sha384Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384);
- AlgorithmIdentifier sha512Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512);
- AlgorithmIdentifier sha256Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance);
- AlgorithmIdentifier sha384Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance);
- AlgorithmIdentifier sha512Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance);
- AlgorithmIdentifier mgf1SHA256Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha256Identifier_A);
- AlgorithmIdentifier mgf1SHA384Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha384Identifier_A);
- AlgorithmIdentifier mgf1SHA512Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha512Identifier_A);
- AlgorithmIdentifier mgf1SHA256Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha256Identifier_B);
- AlgorithmIdentifier mgf1SHA384Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha384Identifier_B);
- AlgorithmIdentifier mgf1SHA512Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha512Identifier_B);
- DerInteger sha256Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha256));
- DerInteger sha384Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha384));
- DerInteger sha512Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha512));
- DerInteger trailerField = new DerInteger(1);
- try
- {
- RSAPSSParams_256_A = new RsassaPssParameters(sha256Identifier_A, mgf1SHA256Identifier_A, sha256Size, trailerField)
- .GetEncoded(Asn1Encodable.Der);
- RSAPSSParams_384_A = new RsassaPssParameters(sha384Identifier_A, mgf1SHA384Identifier_A, sha384Size, trailerField)
- .GetEncoded(Asn1Encodable.Der);
- RSAPSSParams_512_A = new RsassaPssParameters(sha512Identifier_A, mgf1SHA512Identifier_A, sha512Size, trailerField)
- .GetEncoded(Asn1Encodable.Der);
- RSAPSSParams_256_B = new RsassaPssParameters(sha256Identifier_B, mgf1SHA256Identifier_B, sha256Size, trailerField)
- .GetEncoded(Asn1Encodable.Der);
- RSAPSSParams_384_B = new RsassaPssParameters(sha384Identifier_B, mgf1SHA384Identifier_B, sha384Size, trailerField)
- .GetEncoded(Asn1Encodable.Der);
- RSAPSSParams_512_B = new RsassaPssParameters(sha512Identifier_B, mgf1SHA512Identifier_B, sha512Size, trailerField)
- .GetEncoded(Asn1Encodable.Der);
- }
- catch (IOException e)
- {
- throw new InvalidOperationException(e.Message);
- }
- }
- public static bool SupportsPkcs1(AlgorithmIdentifier pubKeyAlgID)
- {
- DerObjectIdentifier oid = pubKeyAlgID.Algorithm;
- return PkcsObjectIdentifiers.RsaEncryption.Equals(oid)
- || X509ObjectIdentifiers.IdEARsa.Equals(oid);
- }
- public static bool SupportsPss_Pss(short signatureAlgorithm, AlgorithmIdentifier pubKeyAlgID)
- {
- DerObjectIdentifier oid = pubKeyAlgID.Algorithm;
- if (!PkcsObjectIdentifiers.IdRsassaPss.Equals(oid))
- return false;
- /*
- * TODO ASN.1 NULL shouldn't really be allowed here; it's a workaround for e.g. Oracle JDK
- * 1.8.0_241, where the X.509 certificate implementation adds the NULL when re-encoding the
- * original parameters. It appears it was fixed at some later date (OpenJDK 12.0.2 does not
- * have the issue), but not sure exactly when.
- */
- Asn1Encodable pssParams = pubKeyAlgID.Parameters;
- if (null == pssParams || pssParams is DerNull)
- {
- switch (signatureAlgorithm)
- {
- case SignatureAlgorithm.rsa_pss_pss_sha256:
- case SignatureAlgorithm.rsa_pss_pss_sha384:
- case SignatureAlgorithm.rsa_pss_pss_sha512:
- return true;
- default:
- return false;
- }
- }
- byte[] encoded;
- try
- {
- encoded = pssParams.ToAsn1Object().GetEncoded(Asn1Encodable.Der);
- }
- catch (Exception)
- {
- return false;
- }
- byte[] expected_A, expected_B;
- switch (signatureAlgorithm)
- {
- case SignatureAlgorithm.rsa_pss_pss_sha256:
- expected_A = RSAPSSParams_256_A;
- expected_B = RSAPSSParams_256_B;
- break;
- case SignatureAlgorithm.rsa_pss_pss_sha384:
- expected_A = RSAPSSParams_384_A;
- expected_B = RSAPSSParams_384_B;
- break;
- case SignatureAlgorithm.rsa_pss_pss_sha512:
- expected_A = RSAPSSParams_512_A;
- expected_B = RSAPSSParams_512_B;
- break;
- default:
- return false;
- }
- return Arrays.AreEqual(expected_A, encoded)
- || Arrays.AreEqual(expected_B, encoded);
- }
- public static bool SupportsPss_Rsae(AlgorithmIdentifier pubKeyAlgID)
- {
- DerObjectIdentifier oid = pubKeyAlgID.Algorithm;
- return PkcsObjectIdentifiers.RsaEncryption.Equals(oid);
- }
- }
- }
- #pragma warning restore
- #endif
|