ECGOST3410Signer.cs 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto;
  5. using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
  6. using BestHTTP.SecureProtocol.Org.BouncyCastle.Math;
  7. using BestHTTP.SecureProtocol.Org.BouncyCastle.Math.EC;
  8. using BestHTTP.SecureProtocol.Org.BouncyCastle.Math.EC.Multiplier;
  9. using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
  10. using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
  11. namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers
  12. {
  13. /**
  14. * GOST R 34.10-2001 Signature Algorithm
  15. */
  16. public class ECGost3410Signer
  17. : IDsaExt
  18. {
  19. private ECKeyParameters key;
  20. private SecureRandom random;
  21. private bool forSigning;
  22. public virtual string AlgorithmName
  23. {
  24. get { return key.AlgorithmName; }
  25. }
  26. public virtual void Init(
  27. bool forSigning,
  28. ICipherParameters parameters)
  29. {
  30. this.forSigning = forSigning;
  31. if (forSigning)
  32. {
  33. if (parameters is ParametersWithRandom)
  34. {
  35. ParametersWithRandom rParam = (ParametersWithRandom)parameters;
  36. this.random = rParam.Random;
  37. parameters = rParam.Parameters;
  38. }
  39. else
  40. {
  41. this.random = new SecureRandom();
  42. }
  43. if (!(parameters is ECPrivateKeyParameters))
  44. throw new InvalidKeyException("EC private key required for signing");
  45. this.key = (ECPrivateKeyParameters) parameters;
  46. }
  47. else
  48. {
  49. if (!(parameters is ECPublicKeyParameters))
  50. throw new InvalidKeyException("EC public key required for verification");
  51. this.key = (ECPublicKeyParameters)parameters;
  52. }
  53. }
  54. public virtual BigInteger Order
  55. {
  56. get { return key.Parameters.N; }
  57. }
  58. /**
  59. * generate a signature for the given message using the key we were
  60. * initialised with. For conventional GOST3410 the message should be a GOST3411
  61. * hash of the message of interest.
  62. *
  63. * @param message the message that will be verified later.
  64. */
  65. public virtual BigInteger[] GenerateSignature(
  66. byte[] message)
  67. {
  68. if (!forSigning)
  69. {
  70. throw new InvalidOperationException("not initialized for signing");
  71. }
  72. byte[] mRev = Arrays.Reverse(message); // conversion is little-endian
  73. BigInteger e = new BigInteger(1, mRev);
  74. ECDomainParameters ec = key.Parameters;
  75. BigInteger n = ec.N;
  76. BigInteger d = ((ECPrivateKeyParameters)key).D;
  77. BigInteger r, s = null;
  78. ECMultiplier basePointMultiplier = CreateBasePointMultiplier();
  79. do // generate s
  80. {
  81. BigInteger k;
  82. do // generate r
  83. {
  84. do
  85. {
  86. k = new BigInteger(n.BitLength, random);
  87. }
  88. while (k.SignValue == 0);
  89. ECPoint p = basePointMultiplier.Multiply(ec.G, k).Normalize();
  90. r = p.AffineXCoord.ToBigInteger().Mod(n);
  91. }
  92. while (r.SignValue == 0);
  93. s = (k.Multiply(e)).Add(d.Multiply(r)).Mod(n);
  94. }
  95. while (s.SignValue == 0);
  96. return new BigInteger[]{ r, s };
  97. }
  98. /**
  99. * return true if the value r and s represent a GOST3410 signature for
  100. * the passed in message (for standard GOST3410 the message should be
  101. * a GOST3411 hash of the real message to be verified).
  102. */
  103. public virtual bool VerifySignature(
  104. byte[] message,
  105. BigInteger r,
  106. BigInteger s)
  107. {
  108. if (forSigning)
  109. {
  110. throw new InvalidOperationException("not initialized for verification");
  111. }
  112. byte[] mRev = Arrays.Reverse(message); // conversion is little-endian
  113. BigInteger e = new BigInteger(1, mRev);
  114. BigInteger n = key.Parameters.N;
  115. // r in the range [1,n-1]
  116. if (r.CompareTo(BigInteger.One) < 0 || r.CompareTo(n) >= 0)
  117. {
  118. return false;
  119. }
  120. // s in the range [1,n-1]
  121. if (s.CompareTo(BigInteger.One) < 0 || s.CompareTo(n) >= 0)
  122. {
  123. return false;
  124. }
  125. BigInteger v = BigIntegers.ModOddInverseVar(n, e);
  126. BigInteger z1 = s.Multiply(v).Mod(n);
  127. BigInteger z2 = (n.Subtract(r)).Multiply(v).Mod(n);
  128. ECPoint G = key.Parameters.G; // P
  129. ECPoint Q = ((ECPublicKeyParameters)key).Q;
  130. ECPoint point = ECAlgorithms.SumOfTwoMultiplies(G, z1, Q, z2).Normalize();
  131. if (point.IsInfinity)
  132. return false;
  133. BigInteger R = point.AffineXCoord.ToBigInteger().Mod(n);
  134. return R.Equals(r);
  135. }
  136. protected virtual ECMultiplier CreateBasePointMultiplier()
  137. {
  138. return new FixedPointCombMultiplier();
  139. }
  140. }
  141. }
  142. #pragma warning restore
  143. #endif