blob: 8a89be08f9d9b957c20143caf04b012369970e44 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
using System;
using System.IO;
using Org.BouncyCastle.Math.EC.Rfc8032;
using Org.BouncyCastle.Utilities;
using Org.BouncyCastle.Utilities.IO;
namespace Org.BouncyCastle.Crypto.Parameters
{
public sealed class Ed448PublicKeyParameters
: AsymmetricKeyParameter
{
public static readonly int KeySize = Ed448.PublicKeySize;
private readonly byte[] data = new byte[KeySize];
public Ed448PublicKeyParameters(byte[] buf)
: this(Validate(buf), 0)
{
}
public Ed448PublicKeyParameters(byte[] buf, int off)
: base(false)
{
Array.Copy(buf, off, data, 0, KeySize);
}
public Ed448PublicKeyParameters(Stream input)
: base(false)
{
if (KeySize != Streams.ReadFully(input, data))
throw new EndOfStreamException("EOF encountered in middle of Ed448 public key");
}
public void Encode(byte[] buf, int off)
{
Array.Copy(data, 0, buf, off, KeySize);
}
public byte[] GetEncoded()
{
return Arrays.Clone(data);
}
private static byte[] Validate(byte[] buf)
{
if (buf.Length != KeySize)
throw new ArgumentException("must have length " + KeySize, "buf");
return buf;
}
}
}
|