#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) #pragma warning disable using System; using System.IO; using BestHTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Rfc7748; using BestHTTP.SecureProtocol.Org.BouncyCastle.Security; using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities; using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO; namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters { public sealed class X25519PrivateKeyParameters : AsymmetricKeyParameter { public static readonly int KeySize = X25519.ScalarSize; public static readonly int SecretSize = X25519.PointSize; private readonly byte[] data = new byte[KeySize]; public X25519PrivateKeyParameters(SecureRandom random) : base(true) { X25519.GeneratePrivateKey(random, data); } public X25519PrivateKeyParameters(byte[] buf) : this(Validate(buf), 0) { } public X25519PrivateKeyParameters(byte[] buf, int off) : base(true) { Array.Copy(buf, off, data, 0, KeySize); } public X25519PrivateKeyParameters(Stream input) : base(true) { if (KeySize != Streams.ReadFully(input, data)) throw new EndOfStreamException("EOF encountered in middle of X25519 private key"); } public void Encode(byte[] buf, int off) { Array.Copy(data, 0, buf, off, KeySize); } public byte[] GetEncoded() { return Arrays.Clone(data); } public X25519PublicKeyParameters GeneratePublicKey() { byte[] publicKey = new byte[X25519.PointSize]; X25519.GeneratePublicKey(data, 0, publicKey, 0); return new X25519PublicKeyParameters(publicKey, 0); } public void GenerateSecret(X25519PublicKeyParameters publicKey, byte[] buf, int off) { byte[] encoded = new byte[X25519.PointSize]; publicKey.Encode(encoded, 0); if (!X25519.CalculateAgreement(data, 0, encoded, 0, buf, off)) throw new InvalidOperationException("X25519 agreement failed"); } private static byte[] Validate(byte[] buf) { if (buf.Length != KeySize) throw new ArgumentException("must have length " + KeySize, "buf"); return buf; } } } #pragma warning restore #endif