123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using System.IO;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO;
- namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters
- {
- public sealed class X448PrivateKeyParameters
- : AsymmetricKeyParameter
- {
- public static readonly int KeySize = X448.ScalarSize;
- public static readonly int SecretSize = X448.PointSize;
- private readonly byte[] data = new byte[KeySize];
- public X448PrivateKeyParameters(SecureRandom random)
- : base(true)
- {
- X448.GeneratePrivateKey(random, data);
- }
- public X448PrivateKeyParameters(byte[] buf)
- : this(Validate(buf), 0)
- {
- }
- public X448PrivateKeyParameters(byte[] buf, int off)
- : base(true)
- {
- Array.Copy(buf, off, data, 0, KeySize);
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public X448PrivateKeyParameters(ReadOnlySpan<byte> buf)
- : base(true)
- {
- if (buf.Length != KeySize)
- throw new ArgumentException("must have length " + KeySize, nameof(buf));
- buf.CopyTo(data);
- }
- #endif
- public X448PrivateKeyParameters(Stream input)
- : base(true)
- {
- if (KeySize != Streams.ReadFully(input, data))
- throw new EndOfStreamException("EOF encountered in middle of X448 private key");
- }
- public void Encode(byte[] buf, int off)
- {
- Array.Copy(data, 0, buf, off, KeySize);
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public void Encode(Span<byte> buf)
- {
- data.CopyTo(buf);
- }
- #endif
- public byte[] GetEncoded()
- {
- return Arrays.Clone(data);
- }
- public X448PublicKeyParameters GeneratePublicKey()
- {
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- Span<byte> publicKey = stackalloc byte[X448.PointSize];
- X448.GeneratePublicKey(data, publicKey);
- return new X448PublicKeyParameters(publicKey);
- #else
- byte[] publicKey = new byte[X448.PointSize];
- X448.GeneratePublicKey(data, 0, publicKey, 0);
- return new X448PublicKeyParameters(publicKey, 0);
- #endif
- }
- public void GenerateSecret(X448PublicKeyParameters publicKey, byte[] buf, int off)
- {
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- GenerateSecret(publicKey, buf.AsSpan(off));
- #else
- byte[] encoded = new byte[X448.PointSize];
- publicKey.Encode(encoded, 0);
- if (!X448.CalculateAgreement(data, 0, encoded, 0, buf, off))
- throw new InvalidOperationException("X448 agreement failed");
- #endif
- }
- #if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER || UNITY_2021_2_OR_NEWER
- public void GenerateSecret(X448PublicKeyParameters publicKey, Span<byte> buf)
- {
- Span<byte> encoded = stackalloc byte[X448.PointSize];
- publicKey.Encode(encoded);
- if (!X448.CalculateAgreement(data, encoded, buf))
- throw new InvalidOperationException("X448 agreement failed");
- }
- #endif
- private static byte[] Validate(byte[] buf)
- {
- if (buf.Length != KeySize)
- throw new ArgumentException("must have length " + KeySize, nameof(buf));
- return buf;
- }
- }
- }
- #pragma warning restore
- #endif
|