#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) #pragma warning disable using System; using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto; using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines; using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters; using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers; namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC { /// Operator supporting the verification of RSASSA-PSS signatures using the BC light-weight API. public class BcTlsRsaPssVerifier : BcTlsVerifier { private readonly int m_signatureScheme; public BcTlsRsaPssVerifier(BcTlsCrypto crypto, RsaKeyParameters publicKey, int signatureScheme) : base(crypto, publicKey) { if (!SignatureScheme.IsRsaPss(signatureScheme)) throw new ArgumentException("signatureScheme"); this.m_signatureScheme = signatureScheme; } public override bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash) { SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm; if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme) throw new InvalidOperationException("Invalid algorithm: " + algorithm); int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme); IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm); PssSigner verifier = PssSigner.CreateRawSigner(new RsaEngine(), digest, digest, digest.GetDigestSize(), PssSigner.TrailerImplicit); verifier.Init(false, m_publicKey); verifier.BlockUpdate(hash, 0, hash.Length); return verifier.VerifySignature(digitallySigned.Signature); } } } #pragma warning restore #endif