150 lines
3.5 KiB
C#
150 lines
3.5 KiB
C#
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
|
|
#pragma warning disable
|
|
using System;
|
|
using System.Collections;
|
|
using System.IO;
|
|
using System.Text;
|
|
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1;
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers;
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Math;
|
|
using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
|
|
|
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers
|
|
{
|
|
public class Gost3410DigestSigner
|
|
: ISigner
|
|
{
|
|
private readonly IDigest digest;
|
|
private readonly IDsa dsaSigner;
|
|
private bool forSigning;
|
|
|
|
public Gost3410DigestSigner(
|
|
IDsa signer,
|
|
IDigest digest)
|
|
{
|
|
this.dsaSigner = signer;
|
|
this.digest = digest;
|
|
}
|
|
|
|
public virtual string AlgorithmName
|
|
{
|
|
get { return digest.AlgorithmName + "with" + dsaSigner.AlgorithmName; }
|
|
}
|
|
|
|
public virtual void Init(
|
|
bool forSigning,
|
|
ICipherParameters parameters)
|
|
{
|
|
this.forSigning = forSigning;
|
|
|
|
AsymmetricKeyParameter k;
|
|
if (parameters is ParametersWithRandom)
|
|
{
|
|
k = (AsymmetricKeyParameter)((ParametersWithRandom)parameters).Parameters;
|
|
}
|
|
else
|
|
{
|
|
k = (AsymmetricKeyParameter)parameters;
|
|
}
|
|
|
|
if (forSigning && !k.IsPrivate)
|
|
{
|
|
throw new InvalidKeyException("Signing Requires Private Key.");
|
|
}
|
|
|
|
if (!forSigning && k.IsPrivate)
|
|
{
|
|
throw new InvalidKeyException("Verification Requires Public Key.");
|
|
}
|
|
|
|
Reset();
|
|
|
|
dsaSigner.Init(forSigning, parameters);
|
|
}
|
|
|
|
/**
|
|
* update the internal digest with the byte b
|
|
*/
|
|
public virtual void Update(
|
|
byte input)
|
|
{
|
|
digest.Update(input);
|
|
}
|
|
|
|
/**
|
|
* update the internal digest with the byte array in
|
|
*/
|
|
public virtual void BlockUpdate(
|
|
byte[] input,
|
|
int inOff,
|
|
int length)
|
|
{
|
|
digest.BlockUpdate(input, inOff, length);
|
|
}
|
|
|
|
/**
|
|
* Generate a signature for the message we've been loaded with using
|
|
* the key we were initialised with.
|
|
*/
|
|
public virtual byte[] GenerateSignature()
|
|
{
|
|
if (!forSigning)
|
|
throw new InvalidOperationException("GOST3410DigestSigner not initialised for signature generation.");
|
|
|
|
byte[] hash = new byte[digest.GetDigestSize()];
|
|
digest.DoFinal(hash, 0);
|
|
|
|
try
|
|
{
|
|
BigInteger[] sig = dsaSigner.GenerateSignature(hash);
|
|
byte[] sigBytes = new byte[64];
|
|
|
|
// TODO Add methods to allow writing BigInteger to existing byte array?
|
|
byte[] r = sig[0].ToByteArrayUnsigned();
|
|
byte[] s = sig[1].ToByteArrayUnsigned();
|
|
s.CopyTo(sigBytes, 32 - s.Length);
|
|
r.CopyTo(sigBytes, 64 - r.Length);
|
|
return sigBytes;
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
throw new SignatureException(e.Message, e);
|
|
}
|
|
}
|
|
|
|
/// <returns>true if the internal state represents the signature described in the passed in array.</returns>
|
|
public virtual bool VerifySignature(
|
|
byte[] signature)
|
|
{
|
|
if (forSigning)
|
|
throw new InvalidOperationException("DSADigestSigner not initialised for verification");
|
|
|
|
byte[] hash = new byte[digest.GetDigestSize()];
|
|
digest.DoFinal(hash, 0);
|
|
|
|
BigInteger R, S;
|
|
try
|
|
{
|
|
R = new BigInteger(1, signature, 32, 32);
|
|
S = new BigInteger(1, signature, 0, 32);
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
throw new SignatureException("error decoding signature bytes.", e);
|
|
}
|
|
|
|
return dsaSigner.VerifySignature(hash, R, S);
|
|
}
|
|
|
|
/// <summary>Reset the internal state</summary>
|
|
public virtual void Reset()
|
|
{
|
|
digest.Reset();
|
|
}
|
|
}
|
|
}
|
|
#pragma warning restore
|
|
#endif
|