|
|
@@ -121,6 +121,12 @@ extension RSA {
|
|
|
case message_pkcs1v15_SHA512_224
|
|
|
/// Hashes the raw message using SHA512-256 before signing the data
|
|
|
case message_pkcs1v15_SHA512_256
|
|
|
+ /// Hashes the raw message using SHA3_256 before signing the data
|
|
|
+ case message_pkcs1v15_SHA3_256
|
|
|
+ /// Hashes the raw message using SHA3_384 before signing the data
|
|
|
+ case message_pkcs1v15_SHA3_384
|
|
|
+ /// Hashes the raw message using SHA3_512 before signing the data
|
|
|
+ case message_pkcs1v15_SHA3_512
|
|
|
/// This variant isn't supported yet
|
|
|
case digest_pkcs1v15_RAW
|
|
|
/// This variant expects that the data to be signed is a valid MD5 Hash Digest
|
|
|
@@ -139,7 +145,13 @@ extension RSA {
|
|
|
case digest_pkcs1v15_SHA512_224
|
|
|
/// This variant expects that the data to be signed is a valid SHA512-256 Hash Digest
|
|
|
case digest_pkcs1v15_SHA512_256
|
|
|
-
|
|
|
+ /// This variant expects that the data to be signed is a valid SHA3-256 Hash Digest
|
|
|
+ case digest_pkcs1v15_SHA3_256
|
|
|
+ /// This variant expects that the data to be signed is a valid SHA3-384 Hash Digest
|
|
|
+ case digest_pkcs1v15_SHA3_384
|
|
|
+ /// This variant expects that the data to be signed is a valid SHA3-512 Hash Digest
|
|
|
+ case digest_pkcs1v15_SHA3_512
|
|
|
+
|
|
|
internal var identifier: Array<UInt8> {
|
|
|
switch self {
|
|
|
case .raw, .digest_pkcs1v15_RAW: return []
|
|
|
@@ -151,9 +163,12 @@ extension RSA {
|
|
|
case .message_pkcs1v15_SHA224, .digest_pkcs1v15_SHA224: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04)
|
|
|
case .message_pkcs1v15_SHA512_224, .digest_pkcs1v15_SHA512_224: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x05)
|
|
|
case .message_pkcs1v15_SHA512_256, .digest_pkcs1v15_SHA512_256: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x06)
|
|
|
+ case .message_pkcs1v15_SHA3_256, .digest_pkcs1v15_SHA3_256: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x08)
|
|
|
+ case .message_pkcs1v15_SHA3_384, .digest_pkcs1v15_SHA3_384: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x09)
|
|
|
+ case .message_pkcs1v15_SHA3_512, .digest_pkcs1v15_SHA3_512: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x0A)
|
|
|
}
|
|
|
}
|
|
|
-
|
|
|
+
|
|
|
internal func calculateHash(_ bytes: Array<UInt8>) -> Array<UInt8> {
|
|
|
switch self {
|
|
|
case .message_pkcs1v15_MD5:
|
|
|
@@ -172,20 +187,29 @@ extension RSA {
|
|
|
return Digest.sha2(bytes, variant: .sha224)
|
|
|
case .message_pkcs1v15_SHA512_256:
|
|
|
return Digest.sha2(bytes, variant: .sha256)
|
|
|
+ case .message_pkcs1v15_SHA3_256:
|
|
|
+ return Digest.sha3(bytes, variant: .sha256)
|
|
|
+ case .message_pkcs1v15_SHA3_384:
|
|
|
+ return Digest.sha3(bytes, variant: .sha384)
|
|
|
+ case .message_pkcs1v15_SHA3_512:
|
|
|
+ return Digest.sha3(bytes, variant: .sha512)
|
|
|
case .raw,
|
|
|
- .digest_pkcs1v15_RAW,
|
|
|
- .digest_pkcs1v15_MD5,
|
|
|
- .digest_pkcs1v15_SHA1,
|
|
|
- .digest_pkcs1v15_SHA224,
|
|
|
- .digest_pkcs1v15_SHA256,
|
|
|
- .digest_pkcs1v15_SHA384,
|
|
|
- .digest_pkcs1v15_SHA512,
|
|
|
- .digest_pkcs1v15_SHA512_224,
|
|
|
- .digest_pkcs1v15_SHA512_256:
|
|
|
- return bytes
|
|
|
+ .digest_pkcs1v15_RAW,
|
|
|
+ .digest_pkcs1v15_MD5,
|
|
|
+ .digest_pkcs1v15_SHA1,
|
|
|
+ .digest_pkcs1v15_SHA224,
|
|
|
+ .digest_pkcs1v15_SHA256,
|
|
|
+ .digest_pkcs1v15_SHA384,
|
|
|
+ .digest_pkcs1v15_SHA512,
|
|
|
+ .digest_pkcs1v15_SHA512_224,
|
|
|
+ .digest_pkcs1v15_SHA512_256,
|
|
|
+ .digest_pkcs1v15_SHA3_256,
|
|
|
+ .digest_pkcs1v15_SHA3_384,
|
|
|
+ .digest_pkcs1v15_SHA3_512:
|
|
|
+ return bytes
|
|
|
}
|
|
|
}
|
|
|
-
|
|
|
+
|
|
|
internal func enforceLength(_ bytes: Array<UInt8>, keySizeInBytes: Int) -> Bool {
|
|
|
switch self {
|
|
|
case .raw, .digest_pkcs1v15_RAW:
|
|
|
@@ -196,25 +220,28 @@ extension RSA {
|
|
|
return bytes.count <= 20
|
|
|
case .digest_pkcs1v15_SHA224:
|
|
|
return bytes.count <= 28
|
|
|
- case .digest_pkcs1v15_SHA256:
|
|
|
+ case .digest_pkcs1v15_SHA256, .digest_pkcs1v15_SHA3_256:
|
|
|
return bytes.count <= 32
|
|
|
- case .digest_pkcs1v15_SHA384:
|
|
|
+ case .digest_pkcs1v15_SHA384, .digest_pkcs1v15_SHA3_384:
|
|
|
return bytes.count <= 48
|
|
|
- case .digest_pkcs1v15_SHA512:
|
|
|
+ case .digest_pkcs1v15_SHA512, .digest_pkcs1v15_SHA3_512:
|
|
|
return bytes.count <= 64
|
|
|
case .digest_pkcs1v15_SHA512_224:
|
|
|
return bytes.count <= 28
|
|
|
case .digest_pkcs1v15_SHA512_256:
|
|
|
return bytes.count <= 32
|
|
|
case .message_pkcs1v15_MD5,
|
|
|
- .message_pkcs1v15_SHA1,
|
|
|
- .message_pkcs1v15_SHA224,
|
|
|
- .message_pkcs1v15_SHA256,
|
|
|
- .message_pkcs1v15_SHA384,
|
|
|
- .message_pkcs1v15_SHA512,
|
|
|
- .message_pkcs1v15_SHA512_224,
|
|
|
- .message_pkcs1v15_SHA512_256:
|
|
|
- return true
|
|
|
+ .message_pkcs1v15_SHA1,
|
|
|
+ .message_pkcs1v15_SHA224,
|
|
|
+ .message_pkcs1v15_SHA256,
|
|
|
+ .message_pkcs1v15_SHA384,
|
|
|
+ .message_pkcs1v15_SHA512,
|
|
|
+ .message_pkcs1v15_SHA512_224,
|
|
|
+ .message_pkcs1v15_SHA512_256,
|
|
|
+ .message_pkcs1v15_SHA3_256,
|
|
|
+ .message_pkcs1v15_SHA3_384,
|
|
|
+ .message_pkcs1v15_SHA3_512:
|
|
|
+ return true
|
|
|
}
|
|
|
}
|
|
|
|