o
    n~b."                     @   sX   d dl Zd dl mZmZmZ d dlmZmZmZm	Z	 G dd dZ
dddZd	d
 ZdS )    N)ceil_divbytes_to_longlong_to_bytes)DerSequenceDerNullDerOctetStringDerObjectIdc                   @   s0   e Zd ZdZdd Zdd Zdd Zdd	 Zd
S )PKCS115_SigSchemezA signature object for ``RSASSA-PKCS1-v1_5``.
    Do not instantiate directly.
    Use :func:`Cryptodome.Signature.pkcs1_15.new`.
    c                 C   s
   || _ dS )a  Initialize this PKCS#1 v1.5 signature scheme object.

        :Parameters:
          rsa_key : an RSA key object
            Creation of signatures is only possible if this is a *private*
            RSA key. Verification of signatures is always possible.
        N)_key)selfrsa_key r   H/usr/local/lib/python3.10/dist-packages/Cryptodome/Signature/pkcs1_15.py__init__)   s   
zPKCS115_SigScheme.__init__c                 C   s
   | j  S )z<Return ``True`` if this object can be used to sign messages.)r
   Zhas_private)r   r   r   r   can_sign3   s   
zPKCS115_SigScheme.can_signc                 C   sH   t jj| jj}t|d}t||}t|}| j	|}t
||}|S )a  Create the PKCS#1 v1.5 signature of a message.

        This function is also called ``RSASSA-PKCS1-V1_5-SIGN`` and
        it is specified in
        `section 8.2.1 of RFC8017 <https://tools.ietf.org/html/rfc8017#page-36>`_.

        :parameter msg_hash:
            This is an object from the :mod:`Cryptodome.Hash` package.
            It has been used to digest the message to sign.
        :type msg_hash: hash object

        :return: the signature encoded as a *byte string*.
        :raise ValueError: if the RSA key is not long enough for the given hash algorithm.
        :raise TypeError: if the RSA key has no private half.
           )
CryptodomeUtilnumbersizer
   nr   _EMSA_PKCS1_V1_5_ENCODEr   Z_decryptr   )r   msg_hashmodBitskemem_intZm_int	signaturer   r   r   sign7   s   


zPKCS115_SigScheme.signc           
      C   s   t jj| jj}t|d}t||krtdt	|}| j
|}t||}z(t||dg}z|jd}	W n tyB   d}	Y nw |	sN|t||d W n tyZ   tdw ||vrctddS )a|  Check if the  PKCS#1 v1.5 signature over a message is valid.

        This function is also called ``RSASSA-PKCS1-V1_5-VERIFY`` and
        it is specified in
        `section 8.2.2 of RFC8037 <https://tools.ietf.org/html/rfc8017#page-37>`_.

        :parameter msg_hash:
            The hash that was carried out over the message. This is an object
            belonging to the :mod:`Cryptodome.Hash` module.
        :type parameter: hash object

        :parameter signature:
            The signature that needs to be validated.
        :type signature: byte string

        :raise ValueError: if the signature is not valid.
        r   zInvalid signatureTz1.2.840.113549.2.FN)r   r   r   r   r
   r   r   len
ValueErrorr   Z_encryptr   r   oid
startswithAttributeErrorappend)
r   r   r   r   r   Zsignature_intr   Zem1Zpossible_em1Zalgorithm_is_mdr   r   r   verifyV   s.   

zPKCS115_SigScheme.verifyN)__name__
__module____qualname____doc__r   r   r   r%   r   r   r   r   r	   #   s    
r	   Tc                 C   s   t t| j g}|r|t   t|  }t | | g }|t|d k r6t	dt| d|t| d  }d| d | S )a  
    Implement the ``EMSA-PKCS1-V1_5-ENCODE`` function, as defined
    in PKCS#1 v2.1 (RFC3447, 9.2).

    ``_EMSA-PKCS1-V1_5-ENCODE`` actually accepts the message ``M`` as input,
    and hash it internally. Here, we expect that the message has already
    been hashed instead.

    :Parameters:
     msg_hash : hash object
            The hash object that holds the digest of the message being signed.
     emLen : int
            The length the final encoding must have, in bytes.
     with_hash_parameters : bool
            If True (default), include NULL parameters for the hash
            algorithm in the ``digestAlgorithm`` SEQUENCE.

    :attention: the early standard (RFC2313) stated that ``DigestInfo``
        had to be BER-encoded. This means that old signatures
        might have length tags in indefinite form, which
        is not supported in DER. Such encoding cannot be
        reproduced by this function.

    :Return: An ``emLen`` byte long string that encodes the hash.
       z9Selected hash algorithm has a too long digest (%d bytes).      s        )
r   r   r!   encoder$   r   r   digestr   	TypeError)r   ZemLenZwith_hash_parametersZ
digestAlgor/   Z
digestInfoZPSr   r   r   r      s   2r   c                 C   s   t | S )a  Create a signature object for creating
    or verifying PKCS#1 v1.5 signatures.

    :parameter rsa_key:
      The RSA key to use for signing or verifying the message.
      This is a :class:`Cryptodome.PublicKey.RSA` object.
      Signing is only possible when ``rsa_key`` is a **private** RSA key.
    :type rsa_key: RSA object

    :return: a :class:`PKCS115_SigScheme` signature object
    )r	   )r   r   r   r   new   s   r1   )T)ZCryptodome.Util.numberr   r   r   r   ZCryptodome.Util.asn1r   r   r   r   r	   r   r1   r   r   r   r   <module>   s   
jD