使用带有外部 Azure KeyVault (HSM) 密钥的 BouncyCastle 创建证书时签名无效

NOP*_*MOV 11 c# encryption bouncycastle .net-core azure-keyvault

我正在尝试生成由存储在 Azure KeyVault 中的密钥对自签名的证书。

我的最终结果是带有无效签名的证书:

在此处输入图片说明

生成证书参数:

     DateTime startDate = DateTime.Now.AddDays(-30);
     DateTime expiryDate = startDate.AddYears(100);

     BigInteger serialNumber = new BigInteger(32, new Random());
     X509V1CertificateGenerator certGen = new X509V1CertificateGenerator();

     X509Name selfSignedCA = new X509Name("CN=Test Root CA");

     certGen.SetSerialNumber(serialNumber);
     certGen.SetIssuerDN(selfSignedCA); //Self Signed
     certGen.SetNotBefore(startDate);
     certGen.SetNotAfter(expiryDate);
     certGen.SetSubjectDN(selfSignedCA);
      
Run Code Online (Sandbox Code Playgroud)

获取对 Azure KeyVault 存储密钥的引用(类似 HSM 的服务):

    //Create a client connector to Azure KeyVault
    var keyClient = new Azure.Security.KeyVault.Keys.KeyClient(
         vaultUri: new Uri("https://xxxx.vault.azure.net/"),
         credential: new ClientSecretCredential(
             tenantId: "xxxx", //Active Directory
             clientId: "xxxx", //Application id?
             clientSecret: "xxxx"
             )
         );

        var x = keyClient.GetKey("key-new-ec"); //Fetch the reference to the key
Run Code Online (Sandbox Code Playgroud)

密钥已成功检索。然后我尝试使用密钥的公共数据生成一个ECPublicKeyParameters对象:

    X9ECParameters x9 = ECNamedCurveTable.GetByName("P-256");
    Org.BouncyCastle.Math.EC.ECCurve curve = x9.Curve;

    var ecPoint = curve.CreatePoint(new Org.BouncyCastle.Math.BigInteger(1, x.Value.Key.X), new Org.BouncyCastle.Math.BigInteger(1, x.Value.Key.Y));
    ECDomainParameters dParams = new ECDomainParameters(curve, ecPoint, x9.N);
    ECPublicKeyParameters pubKey = new ECPublicKeyParameters(ecPoint, dParams);

    certGen.SetPublicKey(pubKey); //Setting the certificate's public key with the fetched one
Run Code Online (Sandbox Code Playgroud)

下一步是生成用密钥签名的证书。我实现了一个新的ISignatureFactory对象,该对象应该使用 KeyVault 的外部签名功能进行签名:

      AzureKeyVaultSignatureFactory customSignatureFactory = new AzureKeyVaultSignatureFactory(1);
      Org.BouncyCastle.X509.X509Certificate cert = certGen.Generate(customSignatureFactory);
Run Code Online (Sandbox Code Playgroud)

这是我的自定义AzureKeyVaultSignatureFactory

public class AzureKeyVaultSignatureFactory : ISignatureFactory
{
    private readonly int _keyHandle;

    public AzureKeyVaultSignatureFactory(int keyHandle)
    {
        this._keyHandle = keyHandle;
    }

    public IStreamCalculator CreateCalculator()
    {
        var sig = new CustomAzureKeyVaultDigestSigner(this._keyHandle);

        sig.Init(true, null);

        return new DefaultSignatureCalculator(sig);
    }

    internal class CustomAzureKeyVaultDigestSigner : ISigner
    {
        private readonly int _keyHandle;
        private byte[] _input;

        public CustomAzureKeyVaultDigestSigner(int keyHandle)
        {
            this._keyHandle = keyHandle;
        }

        public void Init(bool forSigning, ICipherParameters parameters)
        {
            this.Reset();
        }

        public void Update(byte input)
        {
            return;
        }

        public void BlockUpdate(byte[] input, int inOff, int length)
        {
            this._input = input.Skip(inOff).Take(length).ToArray();
        }

        public byte[] GenerateSignature()
        {
            //Crypto Client (Specific Key)
            try
            {

                //Crypto Client (Specific Key)
                CryptographyClient identitiesCAKey_cryptoClient = new CryptographyClient(
                    keyId: new Uri("https://xxxx.vault.azure.net/keys/key-new-ec/xxxx"),
                    credential: new ClientSecretCredential(

                          tenantId: "xxxx", //Active Directory
                          clientId: "xxxx", //Application id?
                          clientSecret: "xxxx"
                          )
                );

                SignResult signResult = identitiesCAKey_cryptoClient.SignData(SignatureAlgorithm.ES256, this._input);
                return signResult.Signature;


            }
            catch (Exception ex)
            {

                throw ex;
            }

            return null;
        }

        public bool VerifySignature(byte[] signature)
        {
            return false;
        }

        public void Reset() { }

        public string AlgorithmName => "SHA-256withECDSA";
    }

    public object AlgorithmDetails => new AlgorithmIdentifier(X9ObjectIdentifiers.ECDsaWithSha256, DerNull.Instance);
}
Run Code Online (Sandbox Code Playgroud)

然后我将证书转换并写入文件:

 //convert to windows type 2 and get Base64 
 X509Certificate2 cert2 = new X509Certificate2(DotNetUtilities.ToX509Certificate(cert));
 byte[] encoded = cert2.GetRawCertData();
 string certOutString = Convert.ToBase64String(encoded);
 System.IO.File.WriteAllBytes(@"test-signed2.cer", encoded); //-this is good!
Run Code Online (Sandbox Code Playgroud)

我究竟做错了什么?也许从 X/Y 构建 ECCurve 还不够?

谢谢!

Wut*_*ode 2

问题在于 Key Vault 返回的签名采用“原始”(64 字节)格式,其中前 32 个为R,后 32 个为S。为了使其在 bouncycastle 中工作,您的GenerateSignature方法需要以 ASN.1 格式的字节数组返回它,该数组最终将在 70 到 72 字节之间。

您可以在网上查看这实际上意味着什么,但您会想要:

  1. 为结果创建一个新的字节数组
  2. 将 Key Vault 的输出拆分为两个初始 32 位数组:RS
  3. 如果RS数组的第 0 个元素具有高 MSB,则需要在相应数组的开头之前插入 0(否则不执行任何操作,数组保持 32 字节长)。
  4. 构建必要的 ASN.1 标头(像下面所示手动构建,或者 bouncycastle 可能具有一些库功能来创建 ASN.1 消息)。所以最后,输出字节数组应该包含
0x30
one byte containing the length of the rest of the array*
0x02
a byte containing the length of the R array (either 32 or 33 depending on if + or -)
0x02
a byte containing the length of the S array (either 32 or 33 depending on if + or -)
the entire S array

Run Code Online (Sandbox Code Playgroud)
  1. 返回这个数组作为输出GenerateSignature

* 因此整个长度将是 R 的长度 + S 的长度 + 4 个标头字节(R 长度、R 标头、S 长度、S 标头)

我已经使用云服务返回的我自己的密钥测试了这种方法,该密钥还返回 64 字节 R+S 响应,并且它有效。