如何使用SHA256检查签名XML文档的签名?

Hom*_*mam 12 signing .net-4.5

似乎SignedXml.CheckSignature只对使用SHA1的签名文档工作正常.

我通过添加算法SHA256 尝试了此代码,并且CheckSignature工作正常,但WIF类开始抛出以下异常:

System.Security.Cryptography.CryptographicException:指定的算法无效.在此方法中,调用System.IdentityModel.Services.FederatedPassiveSecurityTokenServiceOperations.ProcessSignInRequest

似乎ProcessSignInRequest使用已在内部覆盖的算法SHA1:

CryptoConfig.AddAlgorithm(typeof(RSAPKCS1SHA256SignatureDescription), 
                          "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256");
Run Code Online (Sandbox Code Playgroud)

我错过了什么?如何在CheckSignature中指定算法?

Dar*_*kin 3

我今天也遇到了同样的问题。事实证明,WIF 签名证书是使用不支持 SHA256 的 CSP 生成的(更多详细信息)。

我浏览了System.IdentityModel源代码,发现它包含针对这种情况的特殊处理。当您在全局注册了相应的算法时,WIF 将使用它而不是其内部实现,并且该类RSAPKCS1SHA256SignatureDescription不包含此特殊处理。

因此,我制作了自己的SignatureDescription实现,它使用默认参数重新创建RSACryptoServiceProvider,其中包括 SHA256 支持。

/// <summary>
/// Represents the sha256RSA signature algorithm.
/// </summary>
public sealed class RsaPkcs1Sha256SignatureDescription : SignatureDescription
{
    /// <summary>
    /// This type of CSP has SHA256 support
    /// </summary>
    private const int PROV_RSA_AES = 24;

    public RsaPkcs1Sha256SignatureDescription()
    {
        KeyAlgorithm = typeof(RSACryptoServiceProvider).FullName;
        DigestAlgorithm = typeof(SHA256Cng).FullName;
        FormatterAlgorithm = typeof(RSAPKCS1SignatureFormatter).FullName;
        DeformatterAlgorithm = typeof(RSAPKCS1SignatureDeformatter).FullName;
    }

    /// <summary>
    /// Adds support for sha256RSA XML signatures.
    /// </summary>
    public static void RegisterForSignedXml()
    {
        CryptoConfig.AddAlgorithm(
            typeof (RsaPkcs1Sha256SignatureDescription),
            "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256");
    }

    public override AsymmetricSignatureDeformatter CreateDeformatter(AsymmetricAlgorithm key)
    {
        if (key == null) throw new ArgumentNullException("key");

        key = GetSha2CompatibleKey(key);

        var signatureDeformatter = new RSAPKCS1SignatureDeformatter(key);
        signatureDeformatter.SetHashAlgorithm("SHA256");
        return signatureDeformatter;
    }

    public override AsymmetricSignatureFormatter CreateFormatter(AsymmetricAlgorithm key)
    {
        if (key == null) throw new ArgumentNullException("key");

        key = GetSha2CompatibleKey(key);

        var signatureFormatter = new RSAPKCS1SignatureFormatter(key);
        signatureFormatter.SetHashAlgorithm("SHA256");
        return signatureFormatter;
    }

    // Some certificates are generated without SHA2 support, this method recreates the CSP for them.
    // See https://stackoverflow.com/a/11223454/280778
    // WIF handles this case internally if no sha256RSA support is installed globally.
    private static AsymmetricAlgorithm GetSha2CompatibleKey(AsymmetricAlgorithm key)
    {
        var csp = key as RSACryptoServiceProvider;
        if (csp == null || csp.CspKeyContainerInfo.ProviderType == PROV_RSA_AES)
            return key;

        var newKey = new RSACryptoServiceProvider(new CspParameters(PROV_RSA_AES));
        newKey.ImportParameters(csp.ExportParameters(true));
        return newKey;
    }
}
Run Code Online (Sandbox Code Playgroud)