BcTlsRsaPssVerifier.cs 1.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto;
  5. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines;
  6. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
  7. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers;
  8. namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC
  9. {
  10. /// <summary>Operator supporting the verification of RSASSA-PSS signatures using the BC light-weight API.</summary>
  11. public class BcTlsRsaPssVerifier
  12. : BcTlsVerifier
  13. {
  14. private readonly int m_signatureScheme;
  15. public BcTlsRsaPssVerifier(BcTlsCrypto crypto, RsaKeyParameters publicKey, int signatureScheme)
  16. : base(crypto, publicKey)
  17. {
  18. if (!SignatureScheme.IsRsaPss(signatureScheme))
  19. throw new ArgumentException("signatureScheme");
  20. this.m_signatureScheme = signatureScheme;
  21. }
  22. public override bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash)
  23. {
  24. SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm;
  25. if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme)
  26. throw new InvalidOperationException("Invalid algorithm: " + algorithm);
  27. int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme);
  28. IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
  29. PssSigner verifier = PssSigner.CreateRawSigner(new RsaEngine(), digest, digest, digest.GetDigestSize(),
  30. PssSigner.TrailerImplicit);
  31. verifier.Init(false, m_publicKey);
  32. verifier.BlockUpdate(hash, 0, hash.Length);
  33. return verifier.VerifySignature(digitallySigned.Signature);
  34. }
  35. }
  36. }
  37. #pragma warning restore
  38. #endif