using System; using System.Collections; using System.Text; using System.IO; using Org.BouncyCastle.X509; using Org.BouncyCastle.Asn1; using Org.BouncyCastle.Security; using Org.BouncyCastle.Crypto; using Org.BouncyCastle.Crypto.Generators; using Org.BouncyCastle.Crypto.Parameters; using Org.BouncyCastle.Math; using Org.BouncyCastle.Crypto.Digests; using Org.BouncyCastle.Utilities; /* * Copyright 2004 by Paulo Soares. * * The contents of this file are subject to the Mozilla Public License Version 1.1 * (the "License"); you may not use this file except in compliance with the License. * You may obtain a copy of the License at http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the License. * * The Original Code is 'iText, a free JAVA-PDF library'. * * The Initial Developer of the Original Code is Bruno Lowagie. Portions created by * the Initial Developer are Copyright (C) 1999, 2000, 2001, 2002 by Bruno Lowagie. * All Rights Reserved. * Co-Developer of the code is Paulo Soares. Portions created by the Co-Developer * are Copyright (C) 2000, 2001, 2002 by Paulo Soares. All Rights Reserved. * * Contributor(s): all the names of the contributors are added in the source code * where applicable. * * Alternatively, the contents of this file may be used under the terms of the * LGPL license (the "GNU LIBRARY GENERAL PUBLIC LICENSE"), in which case the * provisions of LGPL are applicable instead of those above. If you wish to * allow use of your version of this file only under the terms of the LGPL * License and not to allow others to use your version of this file under * the MPL, indicate your decision by deleting the provisions above and * replace them with the notice and other provisions required by the LGPL. * If you do not delete the provisions above, a recipient may use your version * of this file under either the MPL or the GNU LIBRARY GENERAL PUBLIC LICENSE. * * This library is free software; you can redistribute it and/or modify it * under the terms of the MPL as stated above or under the terms of the GNU * Library General Public License as published by the Free Software Foundation; * either version 2 of the License, or any later version. * * This library is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS * FOR A PARTICULAR PURPOSE. See the GNU Library general Public License for more * details. * * If you didn't download this code from the following link, you should check if * you aren't using an obsolete version: * http://www.lowagie.com/iText/ */ namespace iTextSharp.text.pdf { /** * This class does all the processing related to signing and verifying a PKCS#7 * signature. *

* It's based in code found at org.bouncycastle. */ public class PdfPKCS7 { private byte[] sigAttr; private byte[] digestAttr; private int version, signerversion; private Hashtable digestalgos; private ArrayList certs, crls; private X509Certificate signCert; private byte[] digest; private IDigest messageDigest; private String digestAlgorithm, digestEncryptionAlgorithm; private ISigner sig; private ICipherParameters privKey; private byte[] RSAdata; private bool verified; private bool verifyResult; private byte[] externalDigest; private byte[] externalRSAdata; private const String ID_PKCS7_DATA = "1.2.840.113549.1.7.1"; private const String ID_PKCS7_SIGNED_DATA = "1.2.840.113549.1.7.2"; private const String ID_MD5 = "1.2.840.113549.2.5"; private const String ID_MD2 = "1.2.840.113549.2.2"; private const String ID_SHA1 = "1.3.14.3.2.26"; private const String ID_RSA = "1.2.840.113549.1.1.1"; private const String ID_DSA = "1.2.840.10040.4.1"; private const String ID_CONTENT_TYPE = "1.2.840.113549.1.9.3"; private const String ID_MESSAGE_DIGEST = "1.2.840.113549.1.9.4"; private const String ID_SIGNING_TIME = "1.2.840.113549.1.9.5"; private const String ID_MD2RSA = "1.2.840.113549.1.1.2"; private const String ID_MD5RSA = "1.2.840.113549.1.1.4"; private const String ID_SHA1RSA = "1.2.840.113549.1.1.5"; /** * Holds value of property reason. */ private String reason; /** * Holds value of property location. */ private String location; /** * Holds value of property signDate. */ private DateTime signDate; /** * Holds value of property signName. */ private String signName; /** * Verifies a signature using the sub-filter adbe.x509.rsa_sha1. * @param contentsKey the /Contents key * @param certsKey the /Cert key * @param provider the provider or null for the default provider * @throws SecurityException on error * @throws CRLException on error * @throws InvalidKeyException on error * @throws CertificateException on error * @throws NoSuchProviderException on error * @throws NoSuchAlgorithmException on error * @throws IOException on error */ public PdfPKCS7(byte[] contentsKey, byte[] certsKey) { X509CertificateParser cf = new X509CertificateParser(); certs = new ArrayList(); foreach (X509Certificate cc in cf.ReadCertificates(certsKey)) { certs.Add(cc); } signCert = (X509Certificate)certs[0]; crls = new ArrayList(); Asn1InputStream inp = new Asn1InputStream(new MemoryStream(contentsKey)); digest = ((DerOctetString)inp.ReadObject()).GetOctets(); sig = SignerUtilities.GetSigner("SHA1withRSA"); sig.Init(false, signCert.GetPublicKey()); } /** * Verifies a signature using the sub-filter adbe.pkcs7.detached or * adbe.pkcs7.sha1. * @param contentsKey the /Contents key * @param provider the provider or null for the default provider * @throws SecurityException on error * @throws CRLException on error * @throws InvalidKeyException on error * @throws CertificateException on error * @throws NoSuchProviderException on error * @throws NoSuchAlgorithmException on error */ public PdfPKCS7(byte[] contentsKey) { Asn1InputStream din = new Asn1InputStream(new MemoryStream(contentsKey)); // // Basic checks to make sure it's a PKCS#7 SignedData Object // Asn1Object pkcs; try { pkcs = din.ReadObject(); } catch { throw new ArgumentException("can't decode PKCS7SignedData object"); } if (!(pkcs is Asn1Sequence)) { throw new ArgumentException("Not a valid PKCS#7 object - not a sequence"); } Asn1Sequence signedData = (Asn1Sequence)pkcs; DerObjectIdentifier objId = (DerObjectIdentifier)signedData[0]; if (!objId.Id.Equals(ID_PKCS7_SIGNED_DATA)) throw new ArgumentException("Not a valid PKCS#7 object - not signed data"); Asn1Sequence content = (Asn1Sequence)((DerTaggedObject)signedData[1]).GetObject(); // the positions that we care are: // 0 - version // 1 - digestAlgorithms // 2 - possible ID_PKCS7_DATA // (the certificates and crls are taken out by other means) // last - signerInfos // the version version = ((DerInteger)content[0]).Value.IntValue; // the digestAlgorithms digestalgos = new Hashtable(); IEnumerator e = ((Asn1Set)content[1]).GetEnumerator(); while (e.MoveNext()) { Asn1Sequence s = (Asn1Sequence)e.Current; DerObjectIdentifier o = (DerObjectIdentifier)s[0]; digestalgos[o.Id] = null; } // the certificates and crls X509CertificateParser cf = new X509CertificateParser(); certs = new ArrayList(); foreach (X509Certificate cc in cf.ReadCertificates(contentsKey)) { certs.Add(cc); } crls = new ArrayList(); // the possible ID_PKCS7_DATA Asn1Sequence rsaData = (Asn1Sequence)content[2]; if (rsaData.Count > 1) { DerOctetString rsaDataContent = (DerOctetString)((DerTaggedObject)rsaData[1]).GetObject(); RSAdata = rsaDataContent.GetOctets(); } // the signerInfos int next = 3; while (content[next] is DerTaggedObject) ++next; Asn1Set signerInfos = (Asn1Set)content[next]; if (signerInfos.Count != 1) throw new ArgumentException("This PKCS#7 object has multiple SignerInfos - only one is supported at this time"); Asn1Sequence signerInfo = (Asn1Sequence)signerInfos[0]; // the positions that we care are // 0 - version // 1 - the signing certificate serial number // 2 - the digest algorithm // 3 or 4 - digestEncryptionAlgorithm // 4 or 5 - encryptedDigest signerversion = ((DerInteger)signerInfo[0]).Value.IntValue; // Get the signing certificate Asn1Sequence issuerAndSerialNumber = (Asn1Sequence)signerInfo[1]; BigInteger serialNumber = ((DerInteger)issuerAndSerialNumber[1]).Value; foreach (X509Certificate cert in certs) { if (serialNumber.Equals(cert.SerialNumber)) { signCert = cert; break; } } if (signCert == null) { throw new ArgumentException("Can't find signing certificate with serial " + serialNumber.ToString(16)); } digestAlgorithm = ((DerObjectIdentifier)((Asn1Sequence)signerInfo[2])[0]).Id; next = 3; if (signerInfo[next] is Asn1TaggedObject) { Asn1TaggedObject tagsig = (Asn1TaggedObject)signerInfo[next]; Asn1Sequence sseq = (Asn1Sequence)tagsig.GetObject(); MemoryStream bOut = new MemoryStream(); Asn1OutputStream dout = new Asn1OutputStream(bOut); try { Asn1EncodableVector attribute = new Asn1EncodableVector(); for (int k = 0; k < sseq.Count; ++k) { attribute.Add(sseq[k]); } dout.WriteObject(new DerSet(attribute)); dout.Close(); } catch (IOException){} sigAttr = bOut.ToArray(); for (int k = 0; k < sseq.Count; ++k) { Asn1Sequence seq2 = (Asn1Sequence)sseq[k]; if (((DerObjectIdentifier)seq2[0]).Id.Equals(ID_MESSAGE_DIGEST)) { Asn1Set sset = (Asn1Set)seq2[1]; digestAttr = ((DerOctetString)sset[0]).GetOctets(); break; } } if (digestAttr == null) throw new ArgumentException("Authenticated attribute is missing the digest."); ++next; } digestEncryptionAlgorithm = ((DerObjectIdentifier)((Asn1Sequence)signerInfo[next++])[0]).Id; digest = ((DerOctetString)signerInfo[next]).GetOctets(); if (RSAdata != null || digestAttr != null) { messageDigest = GetHashClass(); } sig = SignerUtilities.GetSigner(GetDigestAlgorithm()); sig.Init(false, signCert.GetPublicKey()); } /** * Generates a signature. * @param privKey the private key * @param certChain the certificate chain * @param crlList the certificate revocation list * @param hashAlgorithm the hash algorithm * @param provider the provider or null for the default provider * @param hasRSAdata true if the sub-filter is adbe.pkcs7.sha1 * @throws SecurityException on error * @throws InvalidKeyException on error * @throws NoSuchProviderException on error * @throws NoSuchAlgorithmException on error */ public PdfPKCS7(ICipherParameters privKey, X509Certificate[] certChain, object[] crlList, String hashAlgorithm, bool hasRSAdata) { this.privKey = privKey; if (hashAlgorithm.Equals("MD5")) { digestAlgorithm = ID_MD5; } else if (hashAlgorithm.Equals("MD2")) { digestAlgorithm = ID_MD2; } else if (hashAlgorithm.Equals("SHA")) { digestAlgorithm = ID_SHA1; } else if (hashAlgorithm.Equals("SHA1")) { digestAlgorithm = ID_SHA1; } else { throw new ArgumentException("Unknown Hash Algorithm "+hashAlgorithm); } version = signerversion = 1; certs = new ArrayList(); crls = new ArrayList(); digestalgos = new Hashtable(); digestalgos[digestAlgorithm] = null; // // Copy in the certificates and crls used to sign the private key. // signCert = certChain[0]; for (int i = 0;i < certChain.Length;i++) { certs.Add(certChain[i]); } // if (crlList != null) { // for (int i = 0;i < crlList.length;i++) { // crls.Add(crlList[i]); // } // } if (privKey != null) { // // Now we have private key, find out what the digestEncryptionAlgorithm is. // if (privKey is RsaKeyParameters) digestEncryptionAlgorithm = ID_RSA; else if (privKey is DsaKeyParameters) digestEncryptionAlgorithm = ID_DSA; else throw new ArgumentException("Unknown Key Algorithm "+privKey.ToString()); } if (hasRSAdata) { RSAdata = new byte[0]; messageDigest = GetHashClass(); } if (privKey != null) { sig = SignerUtilities.GetSigner(GetDigestAlgorithm()); sig.Init(true, privKey); } } /** * Update the digest with the specified bytes. This method is used both for signing and verifying * @param buf the data buffer * @param off the offset in the data buffer * @param len the data length * @throws SignatureException on error */ public void Update(byte[] buf, int off, int len) { if (RSAdata != null || digestAttr != null) messageDigest.BlockUpdate(buf, off, len); else sig.BlockUpdate(buf, off, len); } /** * Verify the digest. * @throws SignatureException on error * @return true if the signature checks out, false otherwise */ public bool Verify() { if (verified) return verifyResult; if (sigAttr != null) { byte[] msd = new byte[messageDigest.GetDigestSize()]; sig.BlockUpdate(sigAttr, 0, sigAttr.Length); if (RSAdata != null) { messageDigest.DoFinal(msd, 0); messageDigest.BlockUpdate(msd, 0, msd.Length); } messageDigest.DoFinal(msd, 0); verifyResult = (Arrays.AreEqual(msd, digestAttr) && sig.VerifySignature(digest)); } else { if (RSAdata != null){ byte[] msd = new byte[messageDigest.GetDigestSize()]; messageDigest.DoFinal(msd, 0); sig.BlockUpdate(msd, 0, msd.Length); } verifyResult = sig.VerifySignature(digest); } verified = true; return verifyResult; } /** * Get the X.509 certificates associated with this PKCS#7 object * @return the X.509 certificates associated with this PKCS#7 object */ public X509Certificate[] Certificates { get { X509Certificate[] c = new X509Certificate[certs.Count]; certs.CopyTo(c); return c; } } /** * Get the X.509 certificate revocation lists associated with this PKCS#7 object * @return the X.509 certificate revocation lists associated with this PKCS#7 object */ public ArrayList CRLs { get { return crls; } } /** * Get the X.509 certificate actually used to sign the digest. * @return the X.509 certificate actually used to sign the digest */ public X509Certificate SigningCertificate { get { return signCert; } } /** * Get the version of the PKCS#7 object. Always 1 * @return the version of the PKCS#7 object. Always 1 */ public int Version { get { return version; } } /** * Get the version of the PKCS#7 "SignerInfo" object. Always 1 * @return the version of the PKCS#7 "SignerInfo" object. Always 1 */ public int SigningInfoVersion { get { return signerversion; } } /** * Get the algorithm used to calculate the message digest * @return the algorithm used to calculate the message digest */ public String GetDigestAlgorithm() { String dea = digestEncryptionAlgorithm; if (digestEncryptionAlgorithm.Equals(ID_RSA) || digestEncryptionAlgorithm.Equals(ID_MD5RSA) || digestEncryptionAlgorithm.Equals(ID_MD2RSA) || digestEncryptionAlgorithm.Equals(ID_SHA1RSA)) { dea = "RSA"; } else if (digestEncryptionAlgorithm.Equals(ID_DSA)) { dea = "DSA"; } return GetHashAlgorithm() + "with" + dea; } /** * Returns the algorithm. * @return the digest algorithm */ public String GetHashAlgorithm() { String da = digestAlgorithm; if (digestAlgorithm.Equals(ID_MD5) || digestAlgorithm.Equals(ID_MD5RSA)) { da = "MD5"; } else if (digestAlgorithm.Equals(ID_MD2) || digestAlgorithm.Equals(ID_MD2RSA)) { da = "MD2"; } else if (digestAlgorithm.Equals(ID_SHA1) || digestAlgorithm.Equals(ID_SHA1RSA)) { da = "SHA1"; } return da; } public IDigest GetHashClass() { if (digestAlgorithm.Equals(ID_MD5) || digestAlgorithm.Equals(ID_MD5RSA)) { return new MD5Digest(); } else if (digestAlgorithm.Equals(ID_MD2) || digestAlgorithm.Equals(ID_MD2RSA)) { return new MD2Digest(); } else if (digestAlgorithm.Equals(ID_SHA1) || digestAlgorithm.Equals(ID_SHA1RSA)) { return new Sha1Digest(); } return null; } /** * Loads the default root certificates at <java.home>/lib/security/cacerts * with the default provider. * @return a KeyStore */ // public static KeyStore LoadCacertsKeyStore() { // return LoadCacertsKeyStore(null); // } /** * Loads the default root certificates at <java.home>/lib/security/cacerts. * @param provider the provider or null for the default provider * @return a KeyStore */ // public static KeyStore LoadCacertsKeyStore(String provider) { // File file = new File(System.GetProperty("java.home"), "lib"); // file = new File(file, "security"); // file = new File(file, "cacerts"); // FileInputStream fin = null; // try { // fin = new FileInputStream(file); // KeyStore k; // if (provider == null) // k = KeyStore.GetInstance("JKS"); // else // k = KeyStore.GetInstance("JKS", provider); // k.Load(fin, null); // return k; // } // catch (Exception e) { // throw new ExceptionConverter(e); // } // finally { // try{fin.Close();}catch(Exception ex){} // } // } /** * Verifies a single certificate. * @param cert the certificate to verify * @param crls the certificate revocation list or null * @param calendar the date or null for the current date * @return a String with the error description or null * if no error */ public static String VerifyCertificate(X509Certificate cert, object[] crls, DateTime calendar) { try { if (!cert.IsValid(calendar)) return "The certificate has expired or is not yet valid"; } catch (Exception e) { return e.ToString(); } return null; } /** * Verifies a certificate chain against a KeyStore. * @param certs the certificate chain * @param keystore the KeyStore * @param crls the certificate revocation list or null * @param calendar the date or null for the current date * @return null if the certificate chain could be validade or a * Object[]{cert,error} where cert is the * failed certificate and error is the error message */ public static Object[] VerifyCertificates(X509Certificate[] certs, ArrayList keystore, object[] crls, DateTime calendar) { for (int k = 0; k < certs.Length; ++k) { X509Certificate cert = certs[k]; String err = VerifyCertificate(cert, crls, calendar); if (err != null) return new Object[]{cert, err}; foreach (X509Certificate certStoreX509 in keystore) { try { if (VerifyCertificate(certStoreX509, crls, calendar) != null) continue; try { cert.Verify(certStoreX509.GetPublicKey()); return null; } catch { continue; } } catch { } } int j; for (j = 0; j < certs.Length; ++j) { if (j == k) continue; X509Certificate certNext = certs[j]; try { cert.Verify(certNext.GetPublicKey()); break; } catch { } } if (j == certs.Length) return new Object[]{cert, "Cannot be verified against the KeyStore or the certificate chain"}; } return new Object[]{null, "Invalid state. Possible circular certificate chain"}; } /** * Get the "issuer" from the TBSCertificate bytes that are passed in * @param enc a TBSCertificate in a byte array * @return a DERObject */ private static Asn1Object GetIssuer(byte[] enc) { Asn1InputStream inp = new Asn1InputStream(new MemoryStream(enc)); Asn1Sequence seq = (Asn1Sequence)inp.ReadObject(); return (Asn1Object)seq[seq[0] is DerTaggedObject ? 3 : 2]; } /** * Get the "subject" from the TBSCertificate bytes that are passed in * @param enc A TBSCertificate in a byte array * @return a DERObject */ private static Asn1Object GetSubject(byte[] enc) { Asn1InputStream inp = new Asn1InputStream(new MemoryStream(enc)); Asn1Sequence seq = (Asn1Sequence)inp.ReadObject(); return (Asn1Object)seq[seq[0] is DerTaggedObject ? 5 : 4]; } /** * Get the issuer fields from an X509 Certificate * @param cert an X509Certificate * @return an X509Name */ public static X509Name GetIssuerFields(X509Certificate cert) { return new X509Name((Asn1Sequence)GetIssuer(cert.GetTbsCertificate())); } /** * Get the subject fields from an X509 Certificate * @param cert an X509Certificate * @return an X509Name */ public static X509Name GetSubjectFields(X509Certificate cert) { return new X509Name((Asn1Sequence)GetSubject(cert.GetTbsCertificate())); } /** * Gets the bytes for the PKCS#1 object. * @return a byte array */ public byte[] GetEncodedPKCS1() { if (externalDigest != null) digest = externalDigest; else digest = sig.GenerateSignature(); MemoryStream bOut = new MemoryStream(); Asn1OutputStream dout = new Asn1OutputStream(bOut); dout.WriteObject(new DerOctetString(digest)); dout.Close(); return bOut.ToArray(); } /** * Sets the digest/signature to an external calculated value. * @param digest the digest. This is the actual signature * @param RSAdata the extra data that goes into the data tag in PKCS#7 * @param digestEncryptionAlgorithm the encryption algorithm. It may must be null if the digest * is also null. If the digest is not null * then it may be "RSA" or "DSA" */ public void SetExternalDigest(byte[] digest, byte[] RSAdata, String digestEncryptionAlgorithm) { externalDigest = digest; externalRSAdata = RSAdata; if (digestEncryptionAlgorithm != null) { if (digestEncryptionAlgorithm.Equals("RSA")) { this.digestEncryptionAlgorithm = ID_RSA; } else if (digestEncryptionAlgorithm.Equals("DSA")) { this.digestEncryptionAlgorithm = ID_DSA; } else throw new ArgumentException("Unknown Key Algorithm "+digestEncryptionAlgorithm); } } /** * Gets the bytes for the PKCS7SignedData object. * @return the bytes for the PKCS7SignedData object */ public byte[] GetEncodedPKCS7() { return GetEncodedPKCS7(null, DateTime.Now); } /** * Gets the bytes for the PKCS7SignedData object. Optionally the authenticatedAttributes * in the signerInfo can also be set. If either of the parameters is null, none will be used. * @param secondDigest the digest in the authenticatedAttributes * @param signingTime the signing time in the authenticatedAttributes * @return the bytes for the PKCS7SignedData object */ public byte[] GetEncodedPKCS7(byte[] secondDigest, DateTime signingTime) { if (externalDigest != null) { digest = externalDigest; if (RSAdata != null) RSAdata = externalRSAdata; } else if (externalRSAdata != null && RSAdata != null) { RSAdata = externalRSAdata; sig.BlockUpdate(RSAdata, 0, RSAdata.Length); digest = sig.GenerateSignature(); } else { if (RSAdata != null) { RSAdata = new byte[messageDigest.GetDigestSize()]; messageDigest.DoFinal(RSAdata, 0); sig.BlockUpdate(RSAdata, 0, RSAdata.Length); } digest = sig.GenerateSignature(); } // Create the set of Hash algorithms Asn1EncodableVector digestAlgorithms = new Asn1EncodableVector(); foreach (string dal in digestalgos.Keys) { Asn1EncodableVector algos = new Asn1EncodableVector(); algos.Add(new DerObjectIdentifier(dal)); algos.Add(DerNull.Instance); digestAlgorithms.Add(new DerSequence(algos)); } // Create the contentInfo. Asn1EncodableVector v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_PKCS7_DATA)); if (RSAdata != null) v.Add(new DerTaggedObject(0, new DerOctetString(RSAdata))); DerSequence contentinfo = new DerSequence(v); // Get all the certificates // v = new Asn1EncodableVector(); foreach (X509Certificate xcert in certs) { Asn1InputStream tempstream = new Asn1InputStream(new MemoryStream(xcert.GetEncoded())); v.Add(tempstream.ReadObject()); } DerSet dercertificates = new DerSet(v); // Create signerinfo structure. // Asn1EncodableVector signerinfo = new Asn1EncodableVector(); // Add the signerInfo version // signerinfo.Add(new DerInteger(signerversion)); v = new Asn1EncodableVector(); v.Add(GetIssuer(signCert.GetTbsCertificate())); v.Add(new DerInteger(signCert.SerialNumber)); signerinfo.Add(new DerSequence(v)); // Add the digestAlgorithm v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(digestAlgorithm)); v.Add(DerNull.Instance); signerinfo.Add(new DerSequence(v)); // add the authenticated attribute if present if (secondDigest != null /*&& signingTime != null*/) { Asn1EncodableVector attribute = new Asn1EncodableVector(); v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_CONTENT_TYPE)); v.Add(new DerSet(new DerObjectIdentifier(ID_PKCS7_DATA))); attribute.Add(new DerSequence(v)); v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_SIGNING_TIME)); v.Add(new DerSet(new DerUtcTime(signingTime))); attribute.Add(new DerSequence(v)); v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_MESSAGE_DIGEST)); v.Add(new DerSet(new DerOctetString(secondDigest))); attribute.Add(new DerSequence(v)); signerinfo.Add(new DerTaggedObject(false, 0, new DerSet(attribute))); } // Add the digestEncryptionAlgorithm v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(digestEncryptionAlgorithm)); v.Add(DerNull.Instance); signerinfo.Add(new DerSequence(v)); // Add the digest signerinfo.Add(new DerOctetString(digest)); // Finally build the body out of all the components above Asn1EncodableVector body = new Asn1EncodableVector(); body.Add(new DerInteger(version)); body.Add(new DerSet(digestAlgorithms)); body.Add(contentinfo); body.Add(new DerTaggedObject(false, 0, dercertificates)); // if (crls.Count > 0) { // v = new Asn1EncodableVector(); // for (Iterator i = crls.Iterator();i.HasNext();) { // Asn1InputStream t = new Asn1InputStream(new ByteArrayInputStream((((X509CRL)i.Next()).GetEncoded()))); // v.Add(t.ReadObject()); // } // DERSet dercrls = new DERSet(v); // body.Add(new DERTaggedObject(false, 1, dercrls)); // } // Only allow one signerInfo body.Add(new DerSet(new DerSequence(signerinfo))); // Now we have the body, wrap it in it's PKCS7Signed shell // and return it // Asn1EncodableVector whole = new Asn1EncodableVector(); whole.Add(new DerObjectIdentifier(ID_PKCS7_SIGNED_DATA)); whole.Add(new DerTaggedObject(0, new DerSequence(body))); MemoryStream bOut = new MemoryStream(); Asn1OutputStream dout = new Asn1OutputStream(bOut); dout.WriteObject(new DerSequence(whole)); dout.Close(); return bOut.ToArray(); } /** * When using authenticatedAttributes the authentication process is different. * The document digest is generated and put inside the attribute. The signing is done over the DER encoded * authenticatedAttributes. This method provides that encoding and the parameters must be * exactly the same as in {@link #getEncodedPKCS7(byte[],Calendar)}. *

* A simple example: *

*

        * Calendar cal = Calendar.GetInstance();
        * PdfPKCS7 pk7 = new PdfPKCS7(key, chain, null, "SHA1", null, false);
        * MessageDigest messageDigest = MessageDigest.GetInstance("SHA1");
        * byte buf[] = new byte[8192];
        * int n;
        * Stream inp = sap.GetRangeStream();
        * while ((n = inp.Read(buf)) > 0) {
        *    messageDigest.Update(buf, 0, n);
        * }
        * byte hash[] = messageDigest.Digest();
        * byte sh[] = pk7.GetAuthenticatedAttributeBytes(hash, cal);
        * pk7.Update(sh, 0, sh.length);
        * byte sg[] = pk7.GetEncodedPKCS7(hash, cal);
        * 
* @param secondDigest the content digest * @param signingTime the signing time * @return the byte array representation of the authenticatedAttributes ready to be signed */ public byte[] GetAuthenticatedAttributeBytes(byte[] secondDigest, DateTime signingTime) { Asn1EncodableVector attribute = new Asn1EncodableVector(); Asn1EncodableVector v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_CONTENT_TYPE)); v.Add(new DerSet(new DerObjectIdentifier(ID_PKCS7_DATA))); attribute.Add(new DerSequence(v)); v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_SIGNING_TIME)); v.Add(new DerSet(new DerUtcTime(signingTime))); attribute.Add(new DerSequence(v)); v = new Asn1EncodableVector(); v.Add(new DerObjectIdentifier(ID_MESSAGE_DIGEST)); v.Add(new DerSet(new DerOctetString(secondDigest))); attribute.Add(new DerSequence(v)); MemoryStream bOut = new MemoryStream(); Asn1OutputStream dout = new Asn1OutputStream(bOut); dout.WriteObject(new DerSet(attribute)); dout.Close(); return bOut.ToArray(); } public string Reason { get { return reason; } set { reason = value; } } public string Location { get { return location; } set { location = value; } } public DateTime SignDate { get { return signDate; } set { signDate = value; } } public string SignName { get { return signName; } set { signName = value; } } /** * a class that holds an X509 name */ public class X509Name { /** * country code - StringType(SIZE(2)) */ public static DerObjectIdentifier C = new DerObjectIdentifier("2.5.4.6"); /** * organization - StringType(SIZE(1..64)) */ public static DerObjectIdentifier O = new DerObjectIdentifier("2.5.4.10"); /** * organizational unit name - StringType(SIZE(1..64)) */ public static DerObjectIdentifier OU = new DerObjectIdentifier("2.5.4.11"); /** * Title */ public static DerObjectIdentifier T = new DerObjectIdentifier("2.5.4.12"); /** * common name - StringType(SIZE(1..64)) */ public static DerObjectIdentifier CN = new DerObjectIdentifier("2.5.4.3"); /** * device serial number name - StringType(SIZE(1..64)) */ public static DerObjectIdentifier SN = new DerObjectIdentifier("2.5.4.5"); /** * locality name - StringType(SIZE(1..64)) */ public static DerObjectIdentifier L = new DerObjectIdentifier("2.5.4.7"); /** * state, or province name - StringType(SIZE(1..64)) */ public static DerObjectIdentifier ST = new DerObjectIdentifier("2.5.4.8"); /** Naming attribute of type X520name */ public static DerObjectIdentifier SURNAME = new DerObjectIdentifier("2.5.4.4"); /** Naming attribute of type X520name */ public static DerObjectIdentifier GIVENNAME = new DerObjectIdentifier("2.5.4.42"); /** Naming attribute of type X520name */ public static DerObjectIdentifier INITIALS = new DerObjectIdentifier("2.5.4.43"); /** Naming attribute of type X520name */ public static DerObjectIdentifier GENERATION = new DerObjectIdentifier("2.5.4.44"); /** Naming attribute of type X520name */ public static DerObjectIdentifier UNIQUE_IDENTIFIER = new DerObjectIdentifier("2.5.4.45"); /** * Email address (RSA PKCS#9 extension) - IA5String. *

Note: if you're trying to be ultra orthodox, don't use this! It shouldn't be in here. */ public static DerObjectIdentifier EmailAddress = new DerObjectIdentifier("1.2.840.113549.1.9.1"); /** * email address in Verisign certificates */ public static DerObjectIdentifier E = EmailAddress; /** object identifier */ public static DerObjectIdentifier DC = new DerObjectIdentifier("0.9.2342.19200300.100.1.25"); /** LDAP User id. */ public static DerObjectIdentifier UID = new DerObjectIdentifier("0.9.2342.19200300.100.1.1"); /** A Hashtable with default symbols */ public static Hashtable DefaultSymbols = new Hashtable(); static X509Name(){ DefaultSymbols[C] = "C"; DefaultSymbols[O] = "O"; DefaultSymbols[T] = "T"; DefaultSymbols[OU] = "OU"; DefaultSymbols[CN] = "CN"; DefaultSymbols[L] = "L"; DefaultSymbols[ST] = "ST"; DefaultSymbols[SN] = "SN"; DefaultSymbols[EmailAddress] = "E"; DefaultSymbols[DC] = "DC"; DefaultSymbols[UID] = "UID"; DefaultSymbols[SURNAME] = "SURNAME"; DefaultSymbols[GIVENNAME] = "GIVENNAME"; DefaultSymbols[INITIALS] = "INITIALS"; DefaultSymbols[GENERATION] = "GENERATION"; } /** A Hashtable with values */ public Hashtable values = new Hashtable(); /** * Constructs an X509 name * @param seq an Asn1 Sequence */ public X509Name(Asn1Sequence seq) { IEnumerator e = seq.GetEnumerator(); while (e.MoveNext()) { Asn1Set sett = (Asn1Set)e.Current; for (int i = 0; i < sett.Count; i++) { Asn1Sequence s = (Asn1Sequence)sett[i]; String id = (String)DefaultSymbols[s[0]]; if (id == null) continue; ArrayList vs = (ArrayList)values[id]; if (vs == null) { vs = new ArrayList(); values[id] = vs; } vs.Add(((DerStringBase)s[1]).GetString()); } } } /** * Constructs an X509 name * @param dirName a directory name */ public X509Name(String dirName) { X509NameTokenizer nTok = new X509NameTokenizer(dirName); while (nTok.HasMoreTokens()) { String token = nTok.NextToken(); int index = token.IndexOf('='); if (index == -1) { throw new ArgumentException("badly formated directory string"); } String id = token.Substring(0, index).ToUpper(System.Globalization.CultureInfo.InvariantCulture); String value = token.Substring(index + 1); ArrayList vs = (ArrayList)values[id]; if (vs == null) { vs = new ArrayList(); values[id] = vs; } vs.Add(value); } } public String GetField(String name) { ArrayList vs = (ArrayList)values[name]; return vs == null ? null : (String)vs[0]; } /** * gets a field array from the values Hashmap * @param name * @return an ArrayList */ public ArrayList GetFieldArray(String name) { ArrayList vs = (ArrayList)values[name]; return vs == null ? null : vs; } /** * getter for values * @return a Hashtable with the fields of the X509 name */ public Hashtable GetFields() { return values; } /** * @see java.lang.Object#toString() */ public override String ToString() { return values.ToString(); } } /** * class for breaking up an X500 Name into it's component tokens, ala * java.util.StringTokenizer. We need this class as some of the * lightweight Java environment don't support classes like * StringTokenizer. */ public class X509NameTokenizer { private String oid; private int index; private StringBuilder buf = new StringBuilder(); public X509NameTokenizer( String oid) { this.oid = oid; this.index = -1; } public bool HasMoreTokens() { return (index != oid.Length); } public String NextToken() { if (index == oid.Length) { return null; } int end = index + 1; bool quoted = false; bool escaped = false; buf.Length = 0; while (end != oid.Length) { char c = oid[end]; if (c == '"') { if (!escaped) { quoted = !quoted; } else { buf.Append(c); } escaped = false; } else { if (escaped || quoted) { buf.Append(c); escaped = false; } else if (c == '\\') { escaped = true; } else if (c == ',') { break; } else { buf.Append(c); } } end++; } index = end; return buf.ToString().Trim(); } } } }