培训考核三期,新版培训,网页版培训登录器
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

240 lines
8.0 KiB

#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
#pragma warning disable
using System;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls
{
public abstract class SignatureScheme
{
/*
* RFC 8446
*/
public const int rsa_pkcs1_sha1 = 0x0201;
public const int ecdsa_sha1 = 0x0203;
public const int rsa_pkcs1_sha256 = 0x0401;
public const int rsa_pkcs1_sha384 = 0x0501;
public const int rsa_pkcs1_sha512 = 0x0601;
public const int ecdsa_secp256r1_sha256 = 0x0403;
public const int ecdsa_secp384r1_sha384 = 0x0503;
public const int ecdsa_secp521r1_sha512 = 0x0603;
public const int rsa_pss_rsae_sha256 = 0x0804;
public const int rsa_pss_rsae_sha384 = 0x0805;
public const int rsa_pss_rsae_sha512 = 0x0806;
public const int ed25519 = 0x0807;
public const int ed448 = 0x0808;
public const int rsa_pss_pss_sha256 = 0x0809;
public const int rsa_pss_pss_sha384 = 0x080A;
public const int rsa_pss_pss_sha512 = 0x080B;
/*
* RFC 8734
*/
public const int ecdsa_brainpoolP256r1tls13_sha256 = 0x081A;
public const int ecdsa_brainpoolP384r1tls13_sha384 = 0x081B;
public const int ecdsa_brainpoolP512r1tls13_sha512 = 0x081C;
/*
* RFC 8998
*/
public const int sm2sig_sm3 = 0x0708;
/*
* RFC 8446 reserved for private use (0xFE00..0xFFFF)
*/
public static int From(SignatureAndHashAlgorithm sigAndHashAlg)
{
if (null == sigAndHashAlg)
throw new ArgumentNullException();
return From(sigAndHashAlg.Hash, sigAndHashAlg.Signature);
}
public static int From(short hashAlgorithm, short signatureAlgorithm)
{
return ((hashAlgorithm & 0xFF) << 8) | (signatureAlgorithm & 0xFF);
}
public static int GetCryptoHashAlgorithm(int signatureScheme)
{
switch (signatureScheme)
{
case ed25519:
case ed448:
return -1;
case ecdsa_brainpoolP256r1tls13_sha256:
case rsa_pss_pss_sha256:
case rsa_pss_rsae_sha256:
return CryptoHashAlgorithm.sha256;
case ecdsa_brainpoolP384r1tls13_sha384:
case rsa_pss_pss_sha384:
case rsa_pss_rsae_sha384:
return CryptoHashAlgorithm.sha384;
case ecdsa_brainpoolP512r1tls13_sha512:
case rsa_pss_pss_sha512:
case rsa_pss_rsae_sha512:
return CryptoHashAlgorithm.sha512;
case sm2sig_sm3:
return CryptoHashAlgorithm.sm3;
default:
{
short hashAlgorithm = GetHashAlgorithm(signatureScheme);
if (HashAlgorithm.Intrinsic == hashAlgorithm || !HashAlgorithm.IsRecognized(hashAlgorithm))
return -1;
return TlsCryptoUtilities.GetHash(GetHashAlgorithm(signatureScheme));
}
}
}
public static string GetName(int signatureScheme)
{
switch (signatureScheme)
{
case rsa_pkcs1_sha1:
return "rsa_pkcs1_sha1";
case ecdsa_sha1:
return "ecdsa_sha1";
case rsa_pkcs1_sha256:
return "rsa_pkcs1_sha256";
case rsa_pkcs1_sha384:
return "rsa_pkcs1_sha384";
case rsa_pkcs1_sha512:
return "rsa_pkcs1_sha512";
case ecdsa_secp256r1_sha256:
return "ecdsa_secp256r1_sha256";
case ecdsa_secp384r1_sha384:
return "ecdsa_secp384r1_sha384";
case ecdsa_secp521r1_sha512:
return "ecdsa_secp521r1_sha512";
case rsa_pss_rsae_sha256:
return "rsa_pss_rsae_sha256";
case rsa_pss_rsae_sha384:
return "rsa_pss_rsae_sha384";
case rsa_pss_rsae_sha512:
return "rsa_pss_rsae_sha512";
case ed25519:
return "ed25519";
case ed448:
return "ed448";
case rsa_pss_pss_sha256:
return "rsa_pss_pss_sha256";
case rsa_pss_pss_sha384:
return "rsa_pss_pss_sha384";
case rsa_pss_pss_sha512:
return "rsa_pss_pss_sha512";
case ecdsa_brainpoolP256r1tls13_sha256:
return "ecdsa_brainpoolP256r1tls13_sha256";
case ecdsa_brainpoolP384r1tls13_sha384:
return "ecdsa_brainpoolP384r1tls13_sha384";
case ecdsa_brainpoolP512r1tls13_sha512:
return "ecdsa_brainpoolP512r1tls13_sha512";
case sm2sig_sm3:
return "sm2sig_sm3";
default:
return "UNKNOWN";
}
}
/**
* For TLS 1.3+ usage, some signature schemes are constrained to use a particular
* ({@link NamedGroup}. Not relevant for TLS 1.2 and below.
*/
public static int GetNamedGroup(int signatureScheme)
{
switch (signatureScheme)
{
case ecdsa_brainpoolP256r1tls13_sha256:
return NamedGroup.brainpoolP256r1tls13;
case ecdsa_brainpoolP384r1tls13_sha384:
return NamedGroup.brainpoolP384r1tls13;
case ecdsa_brainpoolP512r1tls13_sha512:
return NamedGroup.brainpoolP512r1tls13;
case ecdsa_secp256r1_sha256:
return NamedGroup.secp256r1;
case ecdsa_secp384r1_sha384:
return NamedGroup.secp384r1;
case ecdsa_secp521r1_sha512:
return NamedGroup.secp521r1;
case sm2sig_sm3:
return NamedGroup.curveSM2;
default:
return -1;
}
}
public static short GetHashAlgorithm(int signatureScheme)
{
// TODO[RFC 8998] sm2sig_sm3
return (short)((signatureScheme >> 8) & 0xFF);
}
public static short GetSignatureAlgorithm(int signatureScheme)
{
// TODO[RFC 8998] sm2sig_sm3
return (short)(signatureScheme & 0xFF);
}
public static SignatureAndHashAlgorithm GetSignatureAndHashAlgorithm(int signatureScheme)
{
return SignatureAndHashAlgorithm.GetInstance(
GetHashAlgorithm(signatureScheme),
GetSignatureAlgorithm(signatureScheme));
}
public static string GetText(int signatureScheme)
{
string hex = BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.Platform.ToUpperInvariant(Convert.ToString(signatureScheme, 16));
return GetName(signatureScheme) + "(0x" + hex + ")";
}
public static bool IsPrivate(int signatureScheme)
{
return (signatureScheme >> 9) == 0xFE;
}
public static bool IsECDsa(int signatureScheme)
{
switch (signatureScheme)
{
case ecdsa_brainpoolP256r1tls13_sha256:
case ecdsa_brainpoolP384r1tls13_sha384:
case ecdsa_brainpoolP512r1tls13_sha512:
return true;
default:
return SignatureAlgorithm.ecdsa == GetSignatureAlgorithm(signatureScheme);
}
}
public static bool IsRsaPss(int signatureScheme)
{
switch (signatureScheme)
{
case rsa_pss_rsae_sha256:
case rsa_pss_rsae_sha384:
case rsa_pss_rsae_sha512:
case rsa_pss_pss_sha256:
case rsa_pss_pss_sha384:
case rsa_pss_pss_sha512:
return true;
default:
return false;
}
}
}
}
#pragma warning restore
#endif