IDataSealer Create(Level level, WebKey key) { if ((level & Level.T_Level) == Level.T_Level) { throw new NotSupportedException("This method can't create timestamps"); } return(new TripleWrapper( #if !NETFRAMEWORK _loggerFactory, #endif level, key, null)); }
IDataSealer CreateForTimemarkAuthority(Level level, WebKey key) { if ((level & Level.T_Level) != Level.T_Level) { throw new ArgumentException("This method should for a level that requires time marking"); } return(new TripleWrapper( #if !NETFRAMEWORK _loggerFactory, #endif level, key, null)); }
public static void InitializeClass(TestContext ctx) { //sign with generated key key = new WebKey(RSA.Create()); //Bob as decryption bobEtk = new EncryptionToken(File.ReadAllBytes("bob/bobs_public_key.etk")); //Bob (and Alice) used for decryption alice = new EHealthP12("alice/alices_private_key_store.p12", "test"); bob = new EHealthP12("bob/bobs_private_key_store.p12", "test"); //create a tsa (fedict in this case) tsa = new Rfc3161TimestampProvider(); }
IDataSealer Create(Level level, ITimestampProvider timestampProvider, WebKey key) { if (timestampProvider == null) { throw new ArgumentNullException("timestampProvider", "A time-stamp provider is required with this method"); } if ((level & Level.T_Level) != Level.T_Level) { throw new ArgumentException("This method should for a level that requires time stamping"); } return(new TripleWrapper( #if !NETFRAMEWORK _loggerFactory, #endif level, key, timestampProvider)); }
private void SetupKeys() { _rsa = new RSACryptoServiceProvider(2048); _rsaSecurityKey = new RsaSecurityKey(_rsa); _signingCredentials = new SigningCredentials(_rsaSecurityKey, "RS256"); var webkey = new WebKey { Kid = _rsaSecurityKey.KeyId ?? "AB", Kty = "RSA", Alg = "RSA256", Use = "sig", N = Convert.ToBase64String(_rsa.ExportParameters(false).Modulus), E = Convert.ToBase64String(_rsa.ExportParameters(false).Exponent) }; JsonWebKeyString = JsonConvert.SerializeObject(webkey); JsonWebKey = new JsonWebKey(JsonWebKeyString); }