public static void SignFile(X509Certificate2 cert, Uri timestampUrl, string path) { ResourceManager resources = new ResourceManager("Microsoft.Build.Tasks.Deployment.ManifestUtilities.Strings", typeof(SecurityUtilities).Module.Assembly); if (cert == null) { throw new ArgumentNullException("cert"); } if (string.IsNullOrEmpty(path)) { throw new ArgumentNullException("path"); } if (!File.Exists(path)) { throw new FileNotFoundException(string.Format(CultureInfo.InvariantCulture, resources.GetString("SecurityUtil.SignTargetNotFound"), new object[] { path }), path); } if (PathUtil.IsPEFile(path)) { if (!IsCertInStore(cert)) { throw new InvalidOperationException(resources.GetString("SignFile.CertNotInStore")); } SignPEFile(cert, timestampUrl, path, resources); } else { if (cert.PrivateKey.GetType() != typeof(RSACryptoServiceProvider)) { throw new ApplicationException(resources.GetString("SecurityUtil.OnlyRSACertsAreAllowed")); } try { XmlDocument manifestDom = new XmlDocument { PreserveWhitespace = true }; manifestDom.Load(path); System.Deployment.Internal.CodeSigning.SignedCmiManifest manifest = new System.Deployment.Internal.CodeSigning.SignedCmiManifest(manifestDom); System.Deployment.Internal.CodeSigning.CmiManifestSigner signer = new System.Deployment.Internal.CodeSigning.CmiManifestSigner(cert.PrivateKey, cert); if (timestampUrl == null) { manifest.Sign(signer); } else { manifest.Sign(signer, timestampUrl.ToString()); } manifestDom.Save(path); } catch (Exception exception) { int hRForException = Marshal.GetHRForException(exception); if ((hRForException != -2147012889) && (hRForException != -2147012867)) { throw new ApplicationException(exception.Message, exception); } throw new ApplicationException(resources.GetString("SecurityUtil.TimestampUrlNotFound"), exception); } } }
/// <summary> /// Obtains identity of the specified native assembly. /// File must be either a PE with an embedded xml manifest, or a stand-alone xml manifest file. /// Returns null if identity could not be obtained. /// </summary> /// <param name="path">The name of the file from which the identity is to be obtained.</param> /// <returns>The assembly identity of the specified file.</returns> public static AssemblyIdentity FromNativeAssembly(string path) { if (!File.Exists(path)) { return(null); } if (PathUtil.IsPEFile(path)) { Stream m = EmbeddedManifestReader.Read(path); if (m == null) { return(null); } return(FromManifest(m)); } return(FromManifest(path)); }
private static void SignFileInternal(X509Certificate2 cert, Uri timestampUrl, string path, bool targetFrameworkSupportsSha256, System.Resources.ResourceManager resources) { if (cert == null) { throw new ArgumentNullException("cert"); } if (String.IsNullOrEmpty(path)) { throw new ArgumentNullException("path"); } if (!File.Exists(path)) { throw new FileNotFoundException(String.Format(CultureInfo.InvariantCulture, resources.GetString("SecurityUtil.SignTargetNotFound"), path), path); } bool useSha256 = UseSha256Algorithm(cert) && targetFrameworkSupportsSha256; if (PathUtil.IsPEFile(path)) { if (IsCertInStore(cert)) { SignPEFile(cert, timestampUrl, path, resources, useSha256); } else { throw new InvalidOperationException(resources.GetString("SignFile.CertNotInStore")); } } else { if (cert.PrivateKey == null) { throw new InvalidOperationException(resources.GetString("SignFile.CertMissingPrivateKey")); } if (cert.PrivateKey.GetType() != typeof(RSACryptoServiceProvider)) { throw new ApplicationException(resources.GetString("SecurityUtil.OnlyRSACertsAreAllowed")); } try { XmlDocument doc = new XmlDocument(); doc.PreserveWhitespace = true; XmlReaderSettings xrSettings = new XmlReaderSettings(); xrSettings.DtdProcessing = DtdProcessing.Ignore; using (XmlReader xr = XmlReader.Create(path, xrSettings)) { doc.Load(xr); } SignedCmiManifest2 manifest = new SignedCmiManifest2(doc, useSha256); RSACryptoServiceProvider csp; if (useSha256) { csp = SignedCmiManifest2.GetFixedRSACryptoServiceProvider(cert.PrivateKey as RSACryptoServiceProvider, useSha256); } else { csp = cert.PrivateKey as RSACryptoServiceProvider; } CmiManifestSigner2 signer = new CmiManifestSigner2(csp, cert, useSha256); if (timestampUrl == null) { manifest.Sign(signer); } else { manifest.Sign(signer, timestampUrl.ToString()); } doc.Save(path); } catch (Exception ex) { int exceptionHR = System.Runtime.InteropServices.Marshal.GetHRForException(ex); if (exceptionHR == -2147012889 || exceptionHR == -2147012867) { throw new ApplicationException(resources.GetString("SecurityUtil.TimestampUrlNotFound"), ex); } throw new ApplicationException(ex.Message, ex); } } }
private static void SignFileInternal(X509Certificate2 cert, Uri timestampUrl, string path, bool targetFrameworkSupportsSha256, System.Resources.ResourceManager resources) { if (cert == null) { throw new ArgumentNullException(nameof(cert)); } if (String.IsNullOrEmpty(path)) { throw new ArgumentNullException(nameof(path)); } if (!FileSystems.Default.FileExists(path)) { throw new FileNotFoundException(String.Format(CultureInfo.InvariantCulture, resources.GetString("SecurityUtil.SignTargetNotFound"), path), path); } bool useSha256 = UseSha256Algorithm(cert) && targetFrameworkSupportsSha256; if (PathUtil.IsPEFile(path)) { if (IsCertInStore(cert)) { SignPEFile(cert, timestampUrl, path, resources, useSha256); } else { throw new InvalidOperationException(resources.GetString("SignFile.CertNotInStore")); } } else { using (RSA rsa = CngLightup.GetRSAPrivateKey(cert)) { if (rsa == null) { throw new ApplicationException(resources.GetString("SecurityUtil.OnlyRSACertsAreAllowed")); } try { var doc = new XmlDocument { PreserveWhitespace = true }; var xrSettings = new XmlReaderSettings { DtdProcessing = DtdProcessing.Ignore }; using (XmlReader xr = XmlReader.Create(path, xrSettings)) { doc.Load(xr); } var manifest = new SignedCmiManifest2(doc, useSha256); CmiManifestSigner2 signer; if (useSha256 && rsa is RSACryptoServiceProvider) { RSACryptoServiceProvider csp = SignedCmiManifest2.GetFixedRSACryptoServiceProvider(rsa as RSACryptoServiceProvider, useSha256); signer = new CmiManifestSigner2(csp, cert, useSha256); } else { signer = new CmiManifestSigner2(rsa, cert, useSha256); } if (timestampUrl == null) { manifest.Sign(signer); } else { manifest.Sign(signer, timestampUrl.ToString()); } doc.Save(path); } catch (Exception ex) { int exceptionHR = Marshal.GetHRForException(ex); if (exceptionHR == -2147012889 || exceptionHR == -2147012867) { throw new ApplicationException(resources.GetString("SecurityUtil.TimestampUrlNotFound"), ex); } throw new ApplicationException(ex.Message, ex); } } } }