You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

52 lines
1.9 KiB

using System;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Crypto.Digests;
using Org.BouncyCastle.Crypto.Encodings;
using Org.BouncyCastle.Crypto.Engines;
using Org.BouncyCastle.Crypto.Parameters;
using Org.BouncyCastle.Crypto.Signers;
namespace Org.BouncyCastle.Tls.Crypto.Impl.BC
{
/// <summary>Operator supporting the verification of RSASSA-PKCS1-v1_5 signatures using the BC light-weight API.
/// </summary>
public class BcTlsRsaVerifier
: BcTlsVerifier
{
public BcTlsRsaVerifier(BcTlsCrypto crypto, RsaKeyParameters publicKey)
: base(crypto, publicKey)
{
}
public override bool VerifyRawSignature(DigitallySigned signedParams, byte[] hash)
{
IDigest nullDigest = new NullDigest();
SignatureAndHashAlgorithm algorithm = signedParams.Algorithm;
ISigner signer;
if (algorithm != null)
{
if (algorithm.Signature != SignatureAlgorithm.rsa)
throw new InvalidOperationException("Invalid algorithm: " + algorithm);
/*
* RFC 5246 4.7. In RSA signing, the opaque vector contains the signature generated
* using the RSASSA-PKCS1-v1_5 signature scheme defined in [PKCS1].
*/
signer = new RsaDigestSigner(nullDigest, TlsUtilities.GetOidForHashAlgorithm(algorithm.Hash));
}
else
{
/*
* RFC 5246 4.7. Note that earlier versions of TLS used a different RSA signature scheme
* that did not include a DigestInfo encoding.
*/
signer = new GenericSigner(new Pkcs1Encoding(new RsaBlindedEngine()), nullDigest);
}
signer.Init(false, m_publicKey);
signer.BlockUpdate(hash, 0, hash.Length);
return signer.VerifySignature(signedParams.Signature);
}
}
}