blob: 8ab8a8d48f3e1e79889913ac1508d129d3b71796 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
|
package org.spongycastle.crypto.tls;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
public class DigitallySigned
{
protected SignatureAndHashAlgorithm algorithm;
protected byte[] signature;
public DigitallySigned(SignatureAndHashAlgorithm algorithm, byte[] signature)
{
if (signature == null)
{
throw new IllegalArgumentException("'signature' cannot be null");
}
this.algorithm = algorithm;
this.signature = signature;
}
/**
* @return a {@link SignatureAndHashAlgorithm} (or null before TLS 1.2).
*/
public SignatureAndHashAlgorithm getAlgorithm()
{
return algorithm;
}
public byte[] getSignature()
{
return signature;
}
/**
* Encode this {@link DigitallySigned} to an {@link OutputStream}.
*
* @param output
* the {@link OutputStream} to encode to.
* @throws IOException
*/
public void encode(OutputStream output) throws IOException
{
if (algorithm != null)
{
algorithm.encode(output);
}
TlsUtils.writeOpaque16(signature, output);
}
/**
* Parse a {@link DigitallySigned} from an {@link InputStream}.
*
* @param context
* the {@link TlsContext} of the current connection.
* @param input
* the {@link InputStream} to parse from.
* @return a {@link DigitallySigned} object.
* @throws IOException
*/
public static DigitallySigned parse(TlsContext context, InputStream input) throws IOException
{
SignatureAndHashAlgorithm algorithm = null;
if (TlsUtils.isTLSv12(context))
{
algorithm = SignatureAndHashAlgorithm.parse(input);
}
byte[] signature = TlsUtils.readOpaque16(input);
return new DigitallySigned(algorithm, signature);
}
}
|