| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using System.IO;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO;
- namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters
- {
- public sealed class X25519PrivateKeyParameters
- : AsymmetricKeyParameter
- {
- public static readonly int KeySize = X25519.ScalarSize;
- public static readonly int SecretSize = X25519.PointSize;
- private readonly byte[] data = new byte[KeySize];
- public X25519PrivateKeyParameters(SecureRandom random)
- : base(true)
- {
- X25519.GeneratePrivateKey(random, data);
- }
- public X25519PrivateKeyParameters(byte[] buf, int off)
- : base(true)
- {
- Array.Copy(buf, off, data, 0, KeySize);
- }
- public X25519PrivateKeyParameters(Stream input)
- : base(true)
- {
- if (KeySize != Streams.ReadFully(input, data))
- throw new EndOfStreamException("EOF encountered in middle of X25519 private key");
- }
- public void Encode(byte[] buf, int off)
- {
- Array.Copy(data, 0, buf, off, KeySize);
- }
- public byte[] GetEncoded()
- {
- return Arrays.Clone(data);
- }
- public X25519PublicKeyParameters GeneratePublicKey()
- {
- byte[] publicKey = new byte[X25519.PointSize];
- X25519.GeneratePublicKey(data, 0, publicKey, 0);
- return new X25519PublicKeyParameters(publicKey, 0);
- }
- public void GenerateSecret(X25519PublicKeyParameters publicKey, byte[] buf, int off)
- {
- byte[] encoded = new byte[X25519.PointSize];
- publicKey.Encode(encoded, 0);
- if (!X25519.CalculateAgreement(data, 0, encoded, 0, buf, off))
- throw new InvalidOperationException("X25519 agreement failed");
- }
- }
- }
- #pragma warning restore
- #endif
|