123456789101112131415161718192021222324252627282930313233343536373839404142434445 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
- using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers;
- namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC
- {
- /// <summary>Operator supporting the verification of RSASSA-PSS signatures using the BC light-weight API.</summary>
- public class BcTlsRsaPssVerifier
- : BcTlsVerifier
- {
- private readonly int m_signatureScheme;
- public BcTlsRsaPssVerifier(BcTlsCrypto crypto, RsaKeyParameters publicKey, int signatureScheme)
- : base(crypto, publicKey)
- {
- if (!SignatureScheme.IsRsaPss(signatureScheme))
- throw new ArgumentException("signatureScheme");
- this.m_signatureScheme = signatureScheme;
- }
- public override bool VerifyRawSignature(DigitallySigned digitallySigned, byte[] hash)
- {
- SignatureAndHashAlgorithm algorithm = digitallySigned.Algorithm;
- if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme)
- throw new InvalidOperationException("Invalid algorithm: " + algorithm);
- int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme);
- IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
- PssSigner verifier = PssSigner.CreateRawSigner(new RsaEngine(), digest, digest, digest.GetDigestSize(),
- PssSigner.TrailerImplicit);
- verifier.Init(false, m_publicKey);
- verifier.BlockUpdate(hash, 0, hash.Length);
- return verifier.VerifySignature(digitallySigned.Signature);
- }
- }
- }
- #pragma warning restore
- #endif
|