blob: 8488dc8d2c2f79c8c14b5a168c47717a7315dd2b (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
using System;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Crypto.Digests;
using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Crypto.Signers;
namespace Org.BouncyCastle.Tls.Crypto.Impl.BC
{
/// <summary>Implementation class for verification of ECDSA signatures in TLS 1.3+ using the BC light-weight API.
/// </summary>
public class BcTlsECDsa13Verifier
: BcTlsVerifier
{
private readonly int m_signatureScheme;
public BcTlsECDsa13Verifier(BcTlsCrypto crypto, ECPublicKeyParameters publicKey, int signatureScheme)
: base(crypto, publicKey)
{
if (!SignatureScheme.IsECDsa(signatureScheme))
throw new ArgumentException("signatureScheme");
this.m_signatureScheme = signatureScheme;
}
public override bool VerifyRawSignature(DigitallySigned signature, byte[] hash)
{
SignatureAndHashAlgorithm algorithm = signature.Algorithm;
if (algorithm == null || SignatureScheme.From(algorithm) != m_signatureScheme)
throw new InvalidOperationException("Invalid algorithm: " + algorithm);
int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(m_signatureScheme);
IDsa dsa = new ECDsaSigner(new HMacDsaKCalculator(m_crypto.CreateDigest(cryptoHashAlgorithm)));
ISigner signer = new DsaDigestSigner(dsa, new NullDigest());
signer.Init(false, m_publicKey);
signer.BlockUpdate(hash, 0, hash.Length);
return signer.VerifySignature(signature.Signature);
}
}
}
|