This repository has been archived by the owner on Oct 5, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 32
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Replace
README.md
with a notice linking to the new location.
- Loading branch information
Showing
1 changed file
with
3 additions
and
58 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,60 +1,5 @@ | ||
# CMS [![PkgGoDev](https://pkg.go.dev/badge/github.com/github/ietf-cms?tab=doc)](https://pkg.go.dev/github.com/github/ietf-cms?tab=doc) [![Report card](https://goreportcard.com/badge/github.com/github/ietf-cms)](https://goreportcard.com/report/github.com/github/ietf-cms) | ||
# This project has moved | ||
|
||
[![Test Go](<https://github.com/github/ietf-cms/workflows/Test%20Go/badge.svg>)](https://github.com/github/ietf-cms/actions?query=workflow%3A%22Test+%28Go+1.x%22) | ||
`ietf-cms` is now part of the <https://github.com/github/smimesign> repository. | ||
|
||
[CMS (Cryptographic Message Syntax)](https://tools.ietf.org/html/rfc5652) is a syntax for signing, digesting, and encrypting arbitrary messages. It evolved from PKCS#7 and is the basis for higher level protocols such as S/MIME. This package implements the SignedData CMS content-type, allowing users to digitally sign data as well as verify data signed by others. | ||
|
||
## Signing and Verifying Data | ||
|
||
High level APIs are provided for signing a message with a certificate and key: | ||
|
||
```go | ||
msg := []byte("some data") | ||
cert, _ := x509.ParseCertificate(someCertificateData) | ||
key, _ := x509.ParseECPrivateKey(somePrivateKeyData) | ||
|
||
der, _ := cms.Sign(msg, []*x509.Certificate{cert}, key) | ||
|
||
//// | ||
/// At another time, in another place... | ||
// | ||
|
||
sd, _ := ParseSignedData(der) | ||
if err, _ := sd.Verify(x509.VerifyOptions{}); err != nil { | ||
panic(err) | ||
} | ||
``` | ||
|
||
By default, CMS SignedData includes the original message. High level APIs are also available for creating and verifying detached signatures: | ||
|
||
```go | ||
msg := []byte("some data") | ||
cert, _ := x509.ParseCertificate(someCertificateData) | ||
key, _ := x509.ParseECPrivateKey(somePrivateKeyData) | ||
|
||
der, _ := cms.SignDetached(msg, cert, key) | ||
|
||
//// | ||
/// At another time, in another place... | ||
// | ||
|
||
sd, _ := ParseSignedData(der) | ||
if err, _ := sd.VerifyDetached(msg, x509.VerifyOptions{}); err != nil { | ||
panic(err) | ||
} | ||
``` | ||
|
||
## Timestamping | ||
|
||
Because certificates expire and can be revoked, it is may be helpful to attach certified timestamps to signatures, proving that they existed at a given time. RFC3161 timestamps can be added to signatures like so: | ||
|
||
```go | ||
signedData, _ := NewSignedData([]byte("Hello, world!")) | ||
signedData.Sign(identity.Chain(), identity.PrivateKey) | ||
signedData.AddTimestamps("http://timestamp.digicert.com") | ||
|
||
derEncoded, _ := signedData.ToDER() | ||
io.Copy(os.Stdout, bytes.NewReader(derEncoded)) | ||
``` | ||
|
||
Verification functions implicitly verify timestamps as well. Without a timestamp, verification will fail if the certificate is no longer valid. | ||
Please update your dependencies from `github.com/github/ietf-cms` to [`github.com/github/smimesign/ietf-cms`](https://github.com/github/smimesign/tree/main/ietf-cms) |