#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
#pragma warning disable
using System;
using System.IO;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto;
using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Tls
{
public abstract class TlsEccUtilities
{
///
public static TlsECConfig CreateNamedECConfig(TlsContext context, int namedGroup)
{
if (NamedGroup.GetCurveBits(namedGroup) < 1)
throw new TlsFatalAlert(AlertDescription.internal_error);
return new TlsECConfig(namedGroup);
}
public static int GetMinimumCurveBits(int cipherSuite)
{
/*
* NOTE: This mechanism was added to support a minimum bit-size requirement mooted in early
* drafts of RFC 8442. This requirement was removed in later drafts, so this mechanism is
* currently somewhat trivial.
*/
return IsEccCipherSuite(cipherSuite) ? 1 : 0;
}
public static bool IsEccCipherSuite(int cipherSuite)
{
switch (TlsUtilities.GetKeyExchangeAlgorithm(cipherSuite))
{
case KeyExchangeAlgorithm.ECDH_anon:
case KeyExchangeAlgorithm.ECDH_ECDSA:
case KeyExchangeAlgorithm.ECDH_RSA:
case KeyExchangeAlgorithm.ECDHE_ECDSA:
case KeyExchangeAlgorithm.ECDHE_PSK:
case KeyExchangeAlgorithm.ECDHE_RSA:
return true;
default:
return false;
}
}
///
public static void CheckPointEncoding(int namedGroup, byte[] encoding)
{
if (TlsUtilities.IsNullOrEmpty(encoding))
throw new TlsFatalAlert(AlertDescription.illegal_parameter);
switch (namedGroup)
{
case NamedGroup.x25519:
case NamedGroup.x448:
return;
}
switch (encoding[0])
{
case 0x04: // uncompressed
return;
case 0x00: // infinity
case 0x02: // compressed
case 0x03: // compressed
case 0x06: // hybrid
case 0x07: // hybrid
default:
throw new TlsFatalAlert(AlertDescription.illegal_parameter);
}
}
///
public static TlsECConfig ReceiveECDHConfig(TlsContext context, Stream input)
{
short curveType = TlsUtilities.ReadUint8(input);
if (curveType != ECCurveType.named_curve)
throw new TlsFatalAlert(AlertDescription.handshake_failure);
int namedGroup = TlsUtilities.ReadUint16(input);
if (NamedGroup.RefersToAnECDHCurve(namedGroup))
{
int[] clientSupportedGroups = context.SecurityParameters.ClientSupportedGroups;
if (null == clientSupportedGroups || Arrays.Contains(clientSupportedGroups, namedGroup))
return new TlsECConfig(namedGroup);
}
throw new TlsFatalAlert(AlertDescription.illegal_parameter);
}
///
public static void WriteECConfig(TlsECConfig ecConfig, Stream output)
{
WriteNamedECParameters(ecConfig.NamedGroup, output);
}
///
public static void WriteNamedECParameters(int namedGroup, Stream output)
{
if (!NamedGroup.RefersToASpecificCurve(namedGroup))
{
/*
* RFC 4492 5.4. All those values of NamedCurve are allowed that refer to a specific
* curve. Values of NamedCurve that indicate support for a class of explicitly defined
* curves are not allowed here [...].
*/
throw new TlsFatalAlert(AlertDescription.internal_error);
}
TlsUtilities.WriteUint8(ECCurveType.named_curve, output);
TlsUtilities.CheckUint16(namedGroup);
TlsUtilities.WriteUint16(namedGroup, output);
}
}
}
#pragma warning restore
#endif