#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
#pragma warning disable
using System;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng.Drbg;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Prng
{
public class SP800SecureRandom
: SecureRandom
{
private readonly IDrbgProvider mDrbgProvider;
private readonly bool mPredictionResistant;
private readonly SecureRandom mRandomSource;
private readonly IEntropySource mEntropySource;
private ISP80090Drbg mDrbg;
internal SP800SecureRandom(SecureRandom randomSource, IEntropySource entropySource, IDrbgProvider drbgProvider, bool predictionResistant)
: base((IRandomGenerator)null)
{
this.mRandomSource = randomSource;
this.mEntropySource = entropySource;
this.mDrbgProvider = drbgProvider;
this.mPredictionResistant = predictionResistant;
}
public override void SetSeed(byte[] seed)
{
lock (this)
{
if (mRandomSource != null)
{
this.mRandomSource.SetSeed(seed);
}
}
}
public override void SetSeed(long seed)
{
lock (this)
{
// this will happen when SecureRandom() is created
if (mRandomSource != null)
{
this.mRandomSource.SetSeed(seed);
}
}
}
public override void NextBytes(byte[] bytes)
{
lock (this)
{
if (mDrbg == null)
{
mDrbg = mDrbgProvider.Get(mEntropySource);
}
// check if a reseed is required...
if (mDrbg.Generate(bytes, null, mPredictionResistant) < 0)
{
mDrbg.Reseed(null);
mDrbg.Generate(bytes, null, mPredictionResistant);
}
}
}
public override void NextBytes(byte[] buf, int off, int len)
{
byte[] bytes = new byte[len];
NextBytes(bytes);
Array.Copy(bytes, 0, buf, off, len);
}
public override byte[] GenerateSeed(int numBytes)
{
return EntropyUtilities.GenerateSeed(mEntropySource, numBytes);
}
/// Force a reseed of the DRBG.
/// optional additional input
public virtual void Reseed(byte[] additionalInput)
{
lock (this)
{
if (mDrbg == null)
{
mDrbg = mDrbgProvider.Get(mEntropySource);
}
mDrbg.Reseed(additionalInput);
}
}
}
}
#pragma warning restore
#endif