1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
|
using System;
using System.IO;
using Org.BouncyCastle.Math.EC.Rfc7748;
using Org.BouncyCastle.Security;
using Org.BouncyCastle.Utilities;
using Org.BouncyCastle.Utilities.IO;
namespace Org.BouncyCastle.Crypto.Parameters
{
public sealed class X25519PrivateKeyParameters
: AsymmetricKeyParameter
{
public static readonly int KeySize = X25519.ScalarSize;
public static readonly int SecretSize = X25519.PointSize;
private readonly byte[] data = new byte[KeySize];
public X25519PrivateKeyParameters(SecureRandom random)
: base(true)
{
random.NextBytes(data);
}
public X25519PrivateKeyParameters(byte[] buf, int off)
: base(true)
{
Array.Copy(buf, off, data, 0, KeySize);
}
public X25519PrivateKeyParameters(Stream input)
: base(true)
{
if (KeySize != Streams.ReadFully(input, data))
throw new EndOfStreamException("EOF encountered in middle of X25519 private key");
}
public void Encode(byte[] buf, int off)
{
Array.Copy(data, 0, buf, off, KeySize);
}
public byte[] GetEncoded()
{
return Arrays.Clone(data);
}
public X25519PublicKeyParameters GeneratePublicKey()
{
byte[] publicKey = new byte[X25519.PointSize];
X25519.ScalarMultBase(data, 0, publicKey, 0);
return new X25519PublicKeyParameters(publicKey, 0);
}
public void GenerateSecret(X25519PublicKeyParameters publicKey, byte[] buf, int off)
{
byte[] encoded = new byte[X25519.PointSize];
publicKey.Encode(encoded, 0);
X25519.ScalarMult(data, 0, encoded, 0, buf, off);
}
}
}
|