You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

48 lines
1.7 KiB

2 months ago
using System;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Crypto.Digests;
using Org.BouncyCastle.Crypto.Signers;
namespace Org.BouncyCastle.Tls.Crypto.Impl.BC
{
/// <summary>BC light-weight base class for the verifiers supporting the two DSA style algorithms from FIPS PUB
/// 186-4: DSA and ECDSA.</summary>
public abstract class BcTlsDssVerifier
: BcTlsVerifier
{
protected BcTlsDssVerifier(BcTlsCrypto crypto, AsymmetricKeyParameter publicKey)
: base(crypto, publicKey)
{
}
protected abstract IDsa CreateDsaImpl(int cryptoHashAlgorithm);
protected abstract short SignatureAlgorithm { get; }
public override bool VerifyRawSignature(DigitallySigned signedParams, byte[] hash)
{
SignatureAndHashAlgorithm algorithm = signedParams.Algorithm;
if (algorithm != null && algorithm.Signature != SignatureAlgorithm)
throw new InvalidOperationException("Invalid algorithm: " + algorithm);
int cryptoHashAlgorithm = (null == algorithm)
? CryptoHashAlgorithm.sha1
: TlsCryptoUtilities.GetHash(algorithm.Hash);
ISigner signer = new DsaDigestSigner(CreateDsaImpl(cryptoHashAlgorithm), new NullDigest());
signer.Init(false, m_publicKey);
if (algorithm == null)
{
// Note: Only use the SHA1 part of the (MD5/SHA1) hash
signer.BlockUpdate(hash, 16, 20);
}
else
{
signer.BlockUpdate(hash, 0, hash.Length);
}
return signer.VerifySignature(signedParams.Signature);
}
}
}