You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
141 lines
6.6 KiB
141 lines
6.6 KiB
1 year ago
|
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
|
||
|
#pragma warning disable
|
||
|
using System;
|
||
|
using System.IO;
|
||
|
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Nist;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
|
||
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
|
||
|
|
||
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl
|
||
|
{
|
||
|
public abstract class RsaUtilities
|
||
|
{
|
||
|
private static readonly byte[] RSAPSSParams_256_A, RSAPSSParams_384_A, RSAPSSParams_512_A;
|
||
|
private static readonly byte[] RSAPSSParams_256_B, RSAPSSParams_384_B, RSAPSSParams_512_B;
|
||
|
|
||
|
static RsaUtilities()
|
||
|
{
|
||
|
/*
|
||
|
* RFC 4055
|
||
|
*/
|
||
|
|
||
|
AlgorithmIdentifier sha256Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256);
|
||
|
AlgorithmIdentifier sha384Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384);
|
||
|
AlgorithmIdentifier sha512Identifier_A = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512);
|
||
|
AlgorithmIdentifier sha256Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha256, DerNull.Instance);
|
||
|
AlgorithmIdentifier sha384Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha384, DerNull.Instance);
|
||
|
AlgorithmIdentifier sha512Identifier_B = new AlgorithmIdentifier(NistObjectIdentifiers.IdSha512, DerNull.Instance);
|
||
|
|
||
|
AlgorithmIdentifier mgf1SHA256Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha256Identifier_A);
|
||
|
AlgorithmIdentifier mgf1SHA384Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha384Identifier_A);
|
||
|
AlgorithmIdentifier mgf1SHA512Identifier_A = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha512Identifier_A);
|
||
|
AlgorithmIdentifier mgf1SHA256Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha256Identifier_B);
|
||
|
AlgorithmIdentifier mgf1SHA384Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha384Identifier_B);
|
||
|
AlgorithmIdentifier mgf1SHA512Identifier_B = new AlgorithmIdentifier(PkcsObjectIdentifiers.IdMgf1, sha512Identifier_B);
|
||
|
|
||
|
DerInteger sha256Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha256));
|
||
|
DerInteger sha384Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha384));
|
||
|
DerInteger sha512Size = new DerInteger(TlsCryptoUtilities.GetHashOutputSize(CryptoHashAlgorithm.sha512));
|
||
|
|
||
|
DerInteger trailerField = new DerInteger(1);
|
||
|
|
||
|
try
|
||
|
{
|
||
|
RSAPSSParams_256_A = new RsassaPssParameters(sha256Identifier_A, mgf1SHA256Identifier_A, sha256Size, trailerField)
|
||
|
.GetEncoded(Asn1Encodable.Der);
|
||
|
RSAPSSParams_384_A = new RsassaPssParameters(sha384Identifier_A, mgf1SHA384Identifier_A, sha384Size, trailerField)
|
||
|
.GetEncoded(Asn1Encodable.Der);
|
||
|
RSAPSSParams_512_A = new RsassaPssParameters(sha512Identifier_A, mgf1SHA512Identifier_A, sha512Size, trailerField)
|
||
|
.GetEncoded(Asn1Encodable.Der);
|
||
|
RSAPSSParams_256_B = new RsassaPssParameters(sha256Identifier_B, mgf1SHA256Identifier_B, sha256Size, trailerField)
|
||
|
.GetEncoded(Asn1Encodable.Der);
|
||
|
RSAPSSParams_384_B = new RsassaPssParameters(sha384Identifier_B, mgf1SHA384Identifier_B, sha384Size, trailerField)
|
||
|
.GetEncoded(Asn1Encodable.Der);
|
||
|
RSAPSSParams_512_B = new RsassaPssParameters(sha512Identifier_B, mgf1SHA512Identifier_B, sha512Size, trailerField)
|
||
|
.GetEncoded(Asn1Encodable.Der);
|
||
|
}
|
||
|
catch (IOException e)
|
||
|
{
|
||
|
throw new InvalidOperationException(e.Message);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
public static bool SupportsPkcs1(AlgorithmIdentifier pubKeyAlgID)
|
||
|
{
|
||
|
DerObjectIdentifier oid = pubKeyAlgID.Algorithm;
|
||
|
return PkcsObjectIdentifiers.RsaEncryption.Equals(oid)
|
||
|
|| X509ObjectIdentifiers.IdEARsa.Equals(oid);
|
||
|
}
|
||
|
|
||
|
public static bool SupportsPss_Pss(short signatureAlgorithm, AlgorithmIdentifier pubKeyAlgID)
|
||
|
{
|
||
|
DerObjectIdentifier oid = pubKeyAlgID.Algorithm;
|
||
|
if (!PkcsObjectIdentifiers.IdRsassaPss.Equals(oid))
|
||
|
return false;
|
||
|
|
||
|
/*
|
||
|
* TODO ASN.1 NULL shouldn't really be allowed here; it's a workaround for e.g. Oracle JDK
|
||
|
* 1.8.0_241, where the X.509 certificate implementation adds the NULL when re-encoding the
|
||
|
* original parameters. It appears it was fixed at some later date (OpenJDK 12.0.2 does not
|
||
|
* have the issue), but not sure exactly when.
|
||
|
*/
|
||
|
Asn1Encodable pssParams = pubKeyAlgID.Parameters;
|
||
|
if (null == pssParams || pssParams is DerNull)
|
||
|
{
|
||
|
switch (signatureAlgorithm)
|
||
|
{
|
||
|
case SignatureAlgorithm.rsa_pss_pss_sha256:
|
||
|
case SignatureAlgorithm.rsa_pss_pss_sha384:
|
||
|
case SignatureAlgorithm.rsa_pss_pss_sha512:
|
||
|
return true;
|
||
|
default:
|
||
|
return false;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
byte[] encoded;
|
||
|
try
|
||
|
{
|
||
|
encoded = pssParams.ToAsn1Object().GetEncoded(Asn1Encodable.Der);
|
||
|
}
|
||
|
catch (Exception)
|
||
|
{
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
byte[] expected_A, expected_B;
|
||
|
switch (signatureAlgorithm)
|
||
|
{
|
||
|
case SignatureAlgorithm.rsa_pss_pss_sha256:
|
||
|
expected_A = RSAPSSParams_256_A;
|
||
|
expected_B = RSAPSSParams_256_B;
|
||
|
break;
|
||
|
case SignatureAlgorithm.rsa_pss_pss_sha384:
|
||
|
expected_A = RSAPSSParams_384_A;
|
||
|
expected_B = RSAPSSParams_384_B;
|
||
|
break;
|
||
|
case SignatureAlgorithm.rsa_pss_pss_sha512:
|
||
|
expected_A = RSAPSSParams_512_A;
|
||
|
expected_B = RSAPSSParams_512_B;
|
||
|
break;
|
||
|
default:
|
||
|
return false;
|
||
|
}
|
||
|
|
||
|
return Arrays.AreEqual(expected_A, encoded)
|
||
|
|| Arrays.AreEqual(expected_B, encoded);
|
||
|
}
|
||
|
|
||
|
public static bool SupportsPss_Rsae(AlgorithmIdentifier pubKeyAlgID)
|
||
|
{
|
||
|
DerObjectIdentifier oid = pubKeyAlgID.Algorithm;
|
||
|
return PkcsObjectIdentifiers.RsaEncryption.Equals(oid);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
#pragma warning restore
|
||
|
#endif
|