You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
137 lines
4.3 KiB
137 lines
4.3 KiB
1 year ago
|
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
|
||
|
#pragma warning disable
|
||
|
using System;
|
||
|
using System.IO;
|
||
|
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cms;
|
||
|
using Asn1Pkcs = BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.X509;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Operators;
|
||
|
|
||
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Cms
|
||
|
{
|
||
|
/**
|
||
|
* the KeyTransRecipientInformation class for a recipient who has been sent a secret
|
||
|
* key encrypted using their public key that needs to be used to
|
||
|
* extract the message.
|
||
|
*/
|
||
|
public class KeyTransRecipientInformation
|
||
|
: RecipientInformation
|
||
|
{
|
||
|
private KeyTransRecipientInfo info;
|
||
|
|
||
|
internal KeyTransRecipientInformation(
|
||
|
KeyTransRecipientInfo info,
|
||
|
CmsSecureReadable secureReadable)
|
||
|
: base(info.KeyEncryptionAlgorithm, secureReadable)
|
||
|
{
|
||
|
this.info = info;
|
||
|
this.rid = new RecipientID();
|
||
|
|
||
|
RecipientIdentifier r = info.RecipientIdentifier;
|
||
|
|
||
|
try
|
||
|
{
|
||
|
if (r.IsTagged)
|
||
|
{
|
||
|
Asn1OctetString octs = Asn1OctetString.GetInstance(r.ID);
|
||
|
|
||
|
rid.SubjectKeyIdentifier = octs.GetOctets();
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
Asn1.Cms.IssuerAndSerialNumber iAnds = Asn1.Cms.IssuerAndSerialNumber.GetInstance(r.ID);
|
||
|
|
||
|
rid.Issuer = iAnds.Name;
|
||
|
rid.SerialNumber = iAnds.SerialNumber.Value;
|
||
|
}
|
||
|
}
|
||
|
catch (IOException)
|
||
|
{
|
||
|
throw new ArgumentException("invalid rid in KeyTransRecipientInformation");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
private string GetExchangeEncryptionAlgorithmName(
|
||
|
AlgorithmIdentifier algo)
|
||
|
{
|
||
|
DerObjectIdentifier oid = algo.Algorithm;
|
||
|
|
||
|
if (Asn1Pkcs.PkcsObjectIdentifiers.RsaEncryption.Equals(oid))
|
||
|
{
|
||
|
return "RSA//PKCS1Padding";
|
||
|
} else if (Asn1Pkcs.PkcsObjectIdentifiers.IdRsaesOaep.Equals(oid))
|
||
|
{
|
||
|
Asn1Pkcs.RsaesOaepParameters rsaParams = Asn1Pkcs.RsaesOaepParameters.GetInstance(algo.Parameters);
|
||
|
return "RSA//OAEPWITH"+DigestUtilities.GetAlgorithmName(rsaParams.HashAlgorithm.Algorithm)+"ANDMGF1Padding";
|
||
|
}
|
||
|
|
||
|
return oid.Id;
|
||
|
}
|
||
|
|
||
|
internal KeyParameter UnwrapKey(ICipherParameters key)
|
||
|
{
|
||
|
byte[] encryptedKey = info.EncryptedKey.GetOctets();
|
||
|
|
||
|
|
||
|
try
|
||
|
{
|
||
|
if (keyEncAlg.Algorithm.Equals(PkcsObjectIdentifiers.IdRsaesOaep))
|
||
|
{
|
||
|
IKeyUnwrapper keyWrapper = new Asn1KeyUnwrapper(keyEncAlg.Algorithm, keyEncAlg.Parameters, key);
|
||
|
|
||
|
return ParameterUtilities.CreateKeyParameter(
|
||
|
GetContentAlgorithmName(), keyWrapper.Unwrap(encryptedKey, 0, encryptedKey.Length).Collect());
|
||
|
}
|
||
|
else
|
||
|
{
|
||
|
string keyExchangeAlgorithm = GetExchangeEncryptionAlgorithmName(keyEncAlg);
|
||
|
IWrapper keyWrapper = WrapperUtilities.GetWrapper(keyExchangeAlgorithm);
|
||
|
keyWrapper.Init(false, key);
|
||
|
|
||
|
// FIXME Support for MAC algorithm parameters similar to cipher parameters
|
||
|
return ParameterUtilities.CreateKeyParameter(
|
||
|
GetContentAlgorithmName(), keyWrapper.Unwrap(encryptedKey, 0, encryptedKey.Length));
|
||
|
}
|
||
|
}
|
||
|
catch (SecurityUtilityException e)
|
||
|
{
|
||
|
throw new CmsException("couldn't create cipher.", e);
|
||
|
}
|
||
|
catch (InvalidKeyException e)
|
||
|
{
|
||
|
throw new CmsException("key invalid in message.", e);
|
||
|
}
|
||
|
// catch (IllegalBlockSizeException e)
|
||
|
catch (DataLengthException e)
|
||
|
{
|
||
|
throw new CmsException("illegal blocksize in message.", e);
|
||
|
}
|
||
|
// catch (BadPaddingException e)
|
||
|
catch (InvalidCipherTextException e)
|
||
|
{
|
||
|
throw new CmsException("bad padding in message.", e);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* decrypt the content and return it as a byte array.
|
||
|
*/
|
||
|
public override CmsTypedStream GetContentStream(
|
||
|
ICipherParameters key)
|
||
|
{
|
||
|
KeyParameter sKey = UnwrapKey(key);
|
||
|
|
||
|
return GetContentFromSessionKey(sKey);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
#pragma warning restore
|
||
|
#endif
|