1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
using System;
using System.IO;
using Org.BouncyCastle.Math.EC.Rfc8032;
using Org.BouncyCastle.Utilities;
using Org.BouncyCastle.Utilities.IO;
namespace Org.BouncyCastle.Crypto.Parameters
{
public sealed class Ed448PublicKeyParameters
: AsymmetricKeyParameter
{
public static readonly int KeySize = Ed448.PublicKeySize;
private readonly byte[] data = new byte[KeySize];
public Ed448PublicKeyParameters(byte[] buf)
: this(Validate(buf), 0)
{
}
public Ed448PublicKeyParameters(byte[] buf, int off)
: base(false)
{
Array.Copy(buf, off, data, 0, KeySize);
}
#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER
public Ed448PublicKeyParameters(ReadOnlySpan<byte> buf)
: base(false)
{
if (buf.Length != KeySize)
throw new ArgumentException("must have length " + KeySize, nameof(buf));
buf.CopyTo(data);
}
#endif
public Ed448PublicKeyParameters(Stream input)
: base(false)
{
if (KeySize != Streams.ReadFully(input, data))
throw new EndOfStreamException("EOF encountered in middle of Ed448 public key");
}
public void Encode(byte[] buf, int off)
{
Array.Copy(data, 0, buf, off, KeySize);
}
#if NETCOREAPP2_1_OR_GREATER || NETSTANDARD2_1_OR_GREATER
public void Encode(Span<byte> buf)
{
data.CopyTo(buf);
}
#endif
public byte[] GetEncoded()
{
return Arrays.Clone(data);
}
public bool Verify(Ed448.Algorithm algorithm, byte[] ctx, byte[] msg, int msgOff, int msgLen,
byte[] sig, int sigOff)
{
switch (algorithm)
{
case Ed448.Algorithm.Ed448:
{
if (null == ctx)
throw new ArgumentNullException(nameof(ctx));
if (ctx.Length > 255)
throw new ArgumentOutOfRangeException(nameof(ctx));
return Ed448.Verify(sig, sigOff, data, 0, ctx, msg, msgOff, msgLen);
}
case Ed448.Algorithm.Ed448ph:
{
if (null == ctx)
throw new ArgumentNullException(nameof(ctx));
if (ctx.Length > 255)
throw new ArgumentOutOfRangeException(nameof(ctx));
if (Ed448.PrehashSize != msgLen)
throw new ArgumentOutOfRangeException(nameof(msgLen));
return Ed448.VerifyPrehash(sig, sigOff, data, 0, ctx, msg, msgOff);
}
default:
{
throw new ArgumentOutOfRangeException(nameof(algorithm));
}
}
}
private static byte[] Validate(byte[] buf)
{
if (buf.Length != KeySize)
throw new ArgumentException("must have length " + KeySize, nameof(buf));
return buf;
}
}
}
|