o
    5h"                     @   sX   d dl Zd dl mZmZmZ d dlmZmZmZm	Z	 G dd dZ
dddZd	d
 ZdS )    N)ceil_divbytes_to_longlong_to_bytes)DerSequenceDerNullDerOctetStringDerObjectIdc                   @   s0   e Zd ZdZdd Zdd Zdd Zdd	 Zd
S )PKCS115_SigSchemezA signature object for ``RSASSA-PKCS1-v1_5``.
    Do not instantiate directly.
    Use :func:`Crypto.Signature.pkcs1_15.new`.
    c                 C   s
   || _ dS )a  Initialize this PKCS#1 v1.5 signature scheme object.

        :Parameters:
          rsa_key : an RSA key object
            Creation of signatures is only possible if this is a *private*
            RSA key. Verification of signatures is always possible.
        N)_key)selfrsa_key r   m/var/www/html/construction_image-detection-poc/venv/lib/python3.10/site-packages/Crypto/Signature/pkcs1_15.py__init__)   s   
zPKCS115_SigScheme.__init__c                 C   s
   | j  S )z<Return ``True`` if this object can be used to sign messages.)r
   has_private)r   r   r   r   can_sign3   s   
zPKCS115_SigScheme.can_signc                 C   sb   t jj| jj}t|d}t||}t|}| j	|}|t
t|| jj| jjkr/td|S )a  Create the PKCS#1 v1.5 signature of a message.

        This function is also called ``RSASSA-PKCS1-V1_5-SIGN`` and
        it is specified in
        `section 8.2.1 of RFC8017 <https://tools.ietf.org/html/rfc8017#page-36>`_.

        :parameter msg_hash:
            This is an object from the :mod:`Crypto.Hash` package.
            It has been used to digest the message to sign.
        :type msg_hash: hash object

        :return: the signature encoded as a *byte string*.
        :raise ValueError: if the RSA key is not long enough for the given hash algorithm.
        :raise TypeError: if the RSA key has no private half.
           z+Fault detected in RSA private key operation)CryptoUtilnumbersizer
   nr   _EMSA_PKCS1_V1_5_ENCODEr   _decrypt_to_bytespowe
ValueError)r   msg_hashmodBitskemem_int	signaturer   r   r   sign7   s   

zPKCS115_SigScheme.signc           
      C   s   t jj| jj}t|d}t||krtdt	|}| j
|}t||}z(t||dg}z|jd}	W n tyB   d}	Y nw |	sN|t||d W n tyZ   tdw ||vrctddS )ax  Check if the  PKCS#1 v1.5 signature over a message is valid.

        This function is also called ``RSASSA-PKCS1-V1_5-VERIFY`` and
        it is specified in
        `section 8.2.2 of RFC8037 <https://tools.ietf.org/html/rfc8017#page-37>`_.

        :parameter msg_hash:
            The hash that was carried out over the message. This is an object
            belonging to the :mod:`Crypto.Hash` module.
        :type parameter: hash object

        :parameter signature:
            The signature that needs to be validated.
        :type signature: byte string

        :raise ValueError: if the signature is not valid.
        r   zInvalid signatureTz1.2.840.113549.2.FN)r   r   r   r   r
   r   r   lenr   r   _encryptr   r   oid
startswithAttributeErrorappend)
r   r   r"   r   r   signature_intr!   em1possible_em1algorithm_is_mdr   r   r   verifyW   s.   

zPKCS115_SigScheme.verifyN)__name__
__module____qualname____doc__r   r   r#   r.   r   r   r   r   r	   #   s    
 r	   Tc                 C   s   t t| j g}|r|t   t|  }t | | g }|t|d k r6t	dt| d|t| d  }d| d | S )a  
    Implement the ``EMSA-PKCS1-V1_5-ENCODE`` function, as defined
    in PKCS#1 v2.1 (RFC3447, 9.2).

    ``_EMSA-PKCS1-V1_5-ENCODE`` actually accepts the message ``M`` as input,
    and hash it internally. Here, we expect that the message has already
    been hashed instead.

    :Parameters:
     msg_hash : hash object
            The hash object that holds the digest of the message being signed.
     emLen : int
            The length the final encoding must have, in bytes.
     with_hash_parameters : bool
            If True (default), include NULL parameters for the hash
            algorithm in the ``digestAlgorithm`` SEQUENCE.

    :attention: the early standard (RFC2313) stated that ``DigestInfo``
        had to be BER-encoded. This means that old signatures
        might have length tags in indefinite form, which
        is not supported in DER. Such encoding cannot be
        reproduced by this function.

    :Return: An ``emLen`` byte long string that encodes the hash.
       z3DigestInfo is too long for this RSA key (%d bytes).      s        )
r   r   r&   encoder)   r   r   digestr$   	TypeError)r   emLenwith_hash_parameters
digestAlgor8   
digestInfoPSr   r   r   r      s   2r   c                 C   s   t | S )a  Create a signature object for creating
    or verifying PKCS#1 v1.5 signatures.

    :parameter rsa_key:
      The RSA key to use for signing or verifying the message.
      This is a :class:`Crypto.PublicKey.RSA` object.
      Signing is only possible when ``rsa_key`` is a **private** RSA key.
    :type rsa_key: RSA object

    :return: a :class:`PKCS115_SigScheme` signature object
    )r	   )r   r   r   r   new   s   r?   )T)Crypto.Util.numberr   r   r   r   Crypto.Util.asn1r   r   r   r   r	   r   r?   r   r   r   r   <module>   s   
kD