123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
- namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Modes
- {
- /**
- * Implements OpenPGP's rather strange version of Cipher-FeedBack (CFB) mode
- * on top of a simple cipher. This class assumes the IV has been prepended
- * to the data stream already, and just accomodates the reset after
- * (blockSize + 2) bytes have been read.
- * <p>
- * For further info see <a href="http://www.ietf.org/rfc/rfc2440.html">RFC 2440</a>.
- * </p>
- */
- public class OpenPgpCfbBlockCipher
- : IBlockCipherMode
- {
- private byte[] IV;
- private byte[] FR;
- private byte[] FRE;
- private readonly IBlockCipher cipher;
- private readonly int blockSize;
- private int count;
- private bool forEncryption;
- /**
- * Basic constructor.
- *
- * @param cipher the block cipher to be used as the basis of the
- * feedback mode.
- */
- public OpenPgpCfbBlockCipher(
- IBlockCipher cipher)
- {
- this.cipher = cipher;
- this.blockSize = cipher.GetBlockSize();
- this.IV = new byte[blockSize];
- this.FR = new byte[blockSize];
- this.FRE = new byte[blockSize];
- }
- /**
- * return the underlying block cipher that we are wrapping.
- *
- * @return the underlying block cipher that we are wrapping.
- */
- public IBlockCipher UnderlyingCipher => cipher;
- /**
- * return the algorithm name and mode.
- *
- * @return the name of the underlying algorithm followed by "/PGPCFB"
- * and the block size in bits.
- */
- public string AlgorithmName
- {
- get { return cipher.AlgorithmName + "/OpenPGPCFB"; }
- }
- public bool IsPartialBlockOkay
- {
- get { return true; }
- }
- /**
- * return the block size we are operating at.
- *
- * @return the block size we are operating at (in bytes).
- */
- public int GetBlockSize()
- {
- return cipher.GetBlockSize();
- }
- public int ProcessBlock(byte[] input, int inOff, byte[] output, int outOff)
- {
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- return forEncryption
- ? EncryptBlock(input.AsSpan(inOff), output.AsSpan(outOff))
- : DecryptBlock(input.AsSpan(inOff), output.AsSpan(outOff));
- #else
- return forEncryption
- ? EncryptBlock(input, inOff, output, outOff)
- : DecryptBlock(input, inOff, output, outOff);
- #endif
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public int ProcessBlock(ReadOnlySpan<byte> input, Span<byte> output)
- {
- return forEncryption
- ? EncryptBlock(input, output)
- : DecryptBlock(input, output);
- }
- #endif
- /**
- * reset the chaining vector back to the IV and reset the underlying
- * cipher.
- */
- public void Reset()
- {
- count = 0;
- Array.Copy(IV, 0, FR, 0, FR.Length);
- }
- /**
- * Initialise the cipher and, possibly, the initialisation vector (IV).
- * If an IV isn't passed as part of the parameter, the IV will be all zeros.
- * An IV which is too short is handled in FIPS compliant fashion.
- *
- * @param forEncryption if true the cipher is initialised for
- * encryption, if false for decryption.
- * @param parameters the key and other data required by the cipher.
- * @exception ArgumentException if the parameters argument is
- * inappropriate.
- */
- public void Init(bool forEncryption, ICipherParameters parameters)
- {
- this.forEncryption = forEncryption;
- if (parameters is ParametersWithIV ivParam)
- {
- byte[] iv = ivParam.GetIV();
- if (iv.Length < IV.Length)
- {
- // prepend the supplied IV with zeros (per FIPS PUB 81)
- Array.Copy(iv, 0, IV, IV.Length - iv.Length, iv.Length);
- for (int i = 0; i < IV.Length - iv.Length; i++)
- {
- IV[i] = 0;
- }
- }
- else
- {
- Array.Copy(iv, 0, IV, 0, IV.Length);
- }
- parameters = ivParam.Parameters;
- }
- Reset();
- cipher.Init(true, parameters);
- }
- /**
- * Encrypt one byte of data according to CFB mode.
- * @param data the byte to encrypt
- * @param blockOff offset in the current block
- * @returns the encrypted byte
- */
- private byte EncryptByte(byte data, int blockOff)
- {
- return (byte)(FRE[blockOff] ^ data);
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- private int EncryptBlock(ReadOnlySpan<byte> input, Span<byte> output)
- {
- Check.DataLength(input, blockSize, "input buffer too short");
- Check.OutputLength(output, blockSize, "output buffer too short");
- if (count > blockSize)
- {
- FR[blockSize - 2] = output[0] = EncryptByte(input[0], blockSize - 2);
- FR[blockSize - 1] = output[1] = EncryptByte(input[1], blockSize - 1);
- cipher.ProcessBlock(FR, FRE);
- for (int n = 2; n < blockSize; n++)
- {
- FR[n - 2] = output[n] = EncryptByte(input[n], n - 2);
- }
- }
- else if (count == 0)
- {
- cipher.ProcessBlock(FR, FRE);
- for (int n = 0; n < blockSize; n++)
- {
- FR[n] = output[n] = EncryptByte(input[n], n);
- }
- count += blockSize;
- }
- else if (count == blockSize)
- {
- cipher.ProcessBlock(FR, FRE);
- output[0] = EncryptByte(input[0], 0);
- output[1] = EncryptByte(input[1], 1);
- //
- // do reset
- //
- Array.Copy(FR, 2, FR, 0, blockSize - 2);
- output[..2].CopyTo(FR.AsSpan(blockSize - 2));
- cipher.ProcessBlock(FR, FRE);
- for (int n = 2; n < blockSize; n++)
- {
- FR[n - 2] = output[n] = EncryptByte(input[n], n - 2);
- }
- count += blockSize;
- }
- return blockSize;
- }
- private int DecryptBlock(ReadOnlySpan<byte> input, Span<byte> output)
- {
- Check.DataLength(input, blockSize, "input buffer too short");
- Check.OutputLength(output, blockSize, "output buffer too short");
- if (count > blockSize)
- {
- byte inVal = input[0];
- FR[blockSize - 2] = inVal;
- output[0] = EncryptByte(inVal, blockSize - 2);
- inVal = input[1];
- FR[blockSize - 1] = inVal;
- output[1] = EncryptByte(inVal, blockSize - 1);
- cipher.ProcessBlock(FR, FRE);
- for (int n = 2; n < blockSize; n++)
- {
- inVal = input[n];
- FR[n - 2] = inVal;
- output[n] = EncryptByte(inVal, n - 2);
- }
- }
- else if (count == 0)
- {
- cipher.ProcessBlock(FR, FRE);
- for (int n = 0; n < blockSize; n++)
- {
- FR[n] = input[n];
- output[n] = EncryptByte(input[n], n);
- }
- count += blockSize;
- }
- else if (count == blockSize)
- {
- cipher.ProcessBlock(FR, 0, FRE, 0);
- byte inVal1 = input[0];
- byte inVal2 = input[1];
- output[0] = EncryptByte(inVal1, 0);
- output[1] = EncryptByte(inVal2, 1);
- Array.Copy(FR, 2, FR, 0, blockSize - 2);
- FR[blockSize - 2] = inVal1;
- FR[blockSize - 1] = inVal2;
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 2; n < blockSize; n++)
- {
- byte inVal = input[n];
- FR[n - 2] = inVal;
- output[n] = EncryptByte(inVal, n - 2);
- }
- count += blockSize;
- }
- return blockSize;
- }
- #else
- private int EncryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff)
- {
- Check.DataLength(input, inOff, blockSize, "input buffer too short");
- Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short");
- if (count > blockSize)
- {
- FR[blockSize - 2] = outBytes[outOff] = EncryptByte(input[inOff], blockSize - 2);
- FR[blockSize - 1] = outBytes[outOff + 1] = EncryptByte(input[inOff + 1], blockSize - 1);
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 2; n < blockSize; n++)
- {
- FR[n - 2] = outBytes[outOff + n] = EncryptByte(input[inOff + n], n - 2);
- }
- }
- else if (count == 0)
- {
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 0; n < blockSize; n++)
- {
- FR[n] = outBytes[outOff + n] = EncryptByte(input[inOff + n], n);
- }
- count += blockSize;
- }
- else if (count == blockSize)
- {
- cipher.ProcessBlock(FR, 0, FRE, 0);
- outBytes[outOff] = EncryptByte(input[inOff], 0);
- outBytes[outOff + 1] = EncryptByte(input[inOff + 1], 1);
- //
- // do reset
- //
- Array.Copy(FR, 2, FR, 0, blockSize - 2);
- Array.Copy(outBytes, outOff, FR, blockSize - 2, 2);
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 2; n < blockSize; n++)
- {
- FR[n - 2] = outBytes[outOff + n] = EncryptByte(input[inOff + n], n - 2);
- }
- count += blockSize;
- }
- return blockSize;
- }
- private int DecryptBlock(byte[] input, int inOff, byte[] outBytes, int outOff)
- {
- Check.DataLength(input, inOff, blockSize, "input buffer too short");
- Check.OutputLength(outBytes, outOff, blockSize, "output buffer too short");
- if (count > blockSize)
- {
- byte inVal = input[inOff];
- FR[blockSize - 2] = inVal;
- outBytes[outOff] = EncryptByte(inVal, blockSize - 2);
- inVal = input[inOff + 1];
- FR[blockSize - 1] = inVal;
- outBytes[outOff + 1] = EncryptByte(inVal, blockSize - 1);
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 2; n < blockSize; n++)
- {
- inVal = input[inOff + n];
- FR[n - 2] = inVal;
- outBytes[outOff + n] = EncryptByte(inVal, n - 2);
- }
- }
- else if (count == 0)
- {
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 0; n < blockSize; n++)
- {
- FR[n] = input[inOff + n];
- outBytes[outOff + n] = EncryptByte(input[inOff + n], n);
- }
- count += blockSize;
- }
- else if (count == blockSize)
- {
- cipher.ProcessBlock(FR, 0, FRE, 0);
- byte inVal1 = input[inOff];
- byte inVal2 = input[inOff + 1];
- outBytes[outOff ] = EncryptByte(inVal1, 0);
- outBytes[outOff + 1] = EncryptByte(inVal2, 1);
- Array.Copy(FR, 2, FR, 0, blockSize - 2);
- FR[blockSize - 2] = inVal1;
- FR[blockSize - 1] = inVal2;
- cipher.ProcessBlock(FR, 0, FRE, 0);
- for (int n = 2; n < blockSize; n++)
- {
- byte inVal = input[inOff + n];
- FR[n - 2] = inVal;
- outBytes[outOff + n] = EncryptByte(inVal, n - 2);
- }
- count += blockSize;
- }
- return blockSize;
- }
- #endif
- }
- }
- #pragma warning restore
- #endif
|