Export (0) Print
Expand All

XmlDsigC14NTransform Class

Represents the C14N XML canonicalization transform for a digital signature as defined by the World Wide Web Consortium (W3C), without comments.

Namespace: System.Security.Cryptography.Xml
Assembly: System.Security (in system.security.dll)

public class XmlDsigC14NTransform : Transform
public class XmlDsigC14NTransform extends Transform
public class XmlDsigC14NTransform extends Transform

The XmlDsigC14NTransform class represents the C14N XML canonicalization transform that describes the canonical form of an XML document. This transform allows a signer to create a digest (used to create a digital signature) using the canonical form of an XML document. A recipient can then verify the XML digital signature using the same canonical form of the XML document with the same transform.

Use the XmlDsigC14NTransform class when you need to sign an XML document that does not contain comments.

Note that you cannot directly create a new instance of a canonicalization transform class. To specify a canonicalization transform, pass the Uniform Resource Identifier (URI) that describes the transform to the CanonicalizationMethod property, which is accessible from the SignedInfo property. To acquire a reference to the canonicalization transform, use the CanonicalizationMethodObject property, which is accessible from the SignedInfo property.

The URI that describes the XmlDsigC14NTransform class is defined by the XmlDsigC14NTransformUrl field and the XmlDsigCanonicalizationUrl field.

For more information about the C14N transform, see Sections 6.5 and 6.6.1 of the XMLDSIG specification, which is available from the World Wide Web Consortium (W3C) at www.w3.org/TR/xmldsig-core/. The canonicalization algorithm is defined in the W3C Canonical XML specification, which is available at www.w3.org/TR/xml-c14n.

This section contains two code examples. The first example demonstrates how to sign non-XML data using a detached signature. Example #1 creates a signature of www.microsoft.com in an XML file and then verifies the file. The second example demonstrates how to call members of the XmlDsigC14NTransform class.

Example #1

//
// This example signs a file specified by a URI 
// using a detached signature. It then verifies  
// the signed XML.
//

using System;
using System.Security.Cryptography;
using System.Security.Cryptography.Xml;
using System.Text;
using System.Xml;



class XMLDSIGDetached
{
	
    [STAThread]
    static void Main(string[] args)
    {
    // The URI to sign.
        string resourceToSign = "http://www.microsoft.com";
		
        // The name of the file to which to save the XML signature.
        string XmlFileName = "xmldsig.xml";

        try
        {

            // Generate a signing key.
            RSACryptoServiceProvider Key = new RSACryptoServiceProvider();

            Console.WriteLine("Signing: {0}", resourceToSign);

            // Sign the detached resourceand save the signature in an XML file.
            SignDetachedResource(resourceToSign, XmlFileName, Key);

            Console.WriteLine("XML signature was succesfully computed and saved to {0}.", XmlFileName);

            // Verify the signature of the signed XML.
            Console.WriteLine("Verifying signature...");

            //Verify the XML signature in the XML file.
            bool result = VerifyDetachedSignature(XmlFileName);

            // Display the results of the signature verification to 
            // the console.
            if(result)
            {
                Console.WriteLine("The XML signature is valid.");
            }
            else
            {
                Console.WriteLine("The XML signature is not valid.");
            }
        }
        catch(CryptographicException e)
        {
            Console.WriteLine(e.Message);

        }
		
    }

    // Sign an XML file and save the signature in a new file.
    public static void SignDetachedResource(string URIString, string XmlSigFileName, RSA Key)
    {
        // Create a SignedXml object.
        SignedXml signedXml = new SignedXml();

        // Assign the key to the SignedXml object.
        signedXml.SigningKey = Key;

        // Create a reference to be signed.
        Reference reference = new Reference();

        // Add the passed URI to the reference object.
        reference.Uri = URIString;
		
        // Add the reference to the SignedXml object.
        signedXml.AddReference(reference);

        // Add an RSAKeyValue KeyInfo (optional; helps recipient find key to validate).
        KeyInfo keyInfo = new KeyInfo();
        keyInfo.AddClause(new RSAKeyValue((RSA)Key));	
        signedXml.KeyInfo = keyInfo;

        // Compute the signature.
        signedXml.ComputeSignature();

        // Get the XML representation of the signature and save
        // it to an XmlElement object.
        XmlElement xmlDigitalSignature = signedXml.GetXml();

        // Save the signed XML document to a file specified
        // using the passed string.
        XmlTextWriter xmltw = new XmlTextWriter(XmlSigFileName, new UTF8Encoding(false));
        xmlDigitalSignature.WriteTo(xmltw);
        xmltw.Close();
    }
    // Verify the signature of an XML file and return the result.
    public static Boolean VerifyDetachedSignature(string XmlSigFileName)
    {	
        // Create a new XML document.
        XmlDocument xmlDocument = new XmlDocument();

        // Load the passed XML file into the document.
        xmlDocument.Load(XmlSigFileName);
	
        // Create a new SignedXMl object.
        SignedXml signedXml = new SignedXml();

        // Find the "Signature" node and create a new
        // XmlNodeList object.
        XmlNodeList nodeList = xmlDocument.GetElementsByTagName("Signature");

        // Load the signature node.
        signedXml.LoadXml((XmlElement)nodeList[0]);

        // Check the signature and return the result.
        return signedXml.CheckSignature();
    }
}

//
// This example signs a file specified by a URI 
// using a detached signature. It then verifies  
// the signed XML.
//
import System .* ;
import System.Security.Cryptography .* ;
import System.Security.Cryptography.Xml .* ;
import System.Text .* ;
import System.Xml .* ;

class XMLDSIGDetached
{
    /** @attribute STAThread()
     */
    public static void main(String[] args)
    {
        // The URI to sign.
        String resourceToSign = "http://www.microsoft.com";

        // The name of the file to which to save the XML signature.
        String xmlFileName = "xmldsig.xml";

        try {
            // Generate a signing key.
            RSACryptoServiceProvider key = new RSACryptoServiceProvider();

            Console.WriteLine("Signing: {0}", resourceToSign);

            // Sign the detached resourceand save the signature in an XML file.
            SignDetachedResource(resourceToSign, xmlFileName, key);
            Console.WriteLine("XML signature was succesfully computed " 
                + "and saved to {0}.", xmlFileName);

            // Verify the signature of the signed XML.
            Console.WriteLine("Verifying signature...");

            //Verify the XML signature in the XML file.
            boolean result = VerifyDetachedSignature(xmlFileName).booleanValue();

            // Display the results of the signature verification to 
            // the console.
            if (result) {
                Console.WriteLine("The XML signature is valid.");
            }
            else {
                Console.WriteLine("The XML signature is not valid.");
            }
        }
        catch (CryptographicException e) {
            Console.WriteLine(e.get_Message());
        }
    } //main

    // Sign an XML file and save the signature in a new file.
    public static void SignDetachedResource(String uriString, 
        String xmlSigFileName, RSA key)
    {
        // Create a SignedXml object.
        SignedXml signedXml = new SignedXml();

        // Assign the key to the SignedXml object.
        signedXml.set_SigningKey(key);

        // Create a reference to be signed.
        Reference reference = new Reference();

        // Add the passed URI to the reference object.
        reference.set_Uri(uriString);

        // Add a transformation if the URI is an XML file.
        if (uriString.EndsWith("xml")) {
            reference.AddTransform(new XmlDsigC14NTransform());
        }

        // Add the reference to the SignedXml object.
        signedXml.AddReference(reference);

        // Add an RSAKeyValue KeyInfo (optional; helps recipient 
        // find key to validate).
        KeyInfo keyInfo = new KeyInfo();

        keyInfo.AddClause(new RSAKeyValue(((RSA)(key))));
        signedXml.set_KeyInfo(keyInfo);

        // Compute the signature.
        signedXml.ComputeSignature();

        // Get the XML representation of the signature and save
        // it to an XmlElement object.
        XmlElement xmlDigitalSignature = signedXml.GetXml();

        // Save the signed XML document to a file specified
        // using the passed string.
        XmlTextWriter xmlTW = new XmlTextWriter(xmlSigFileName, 
            new UTF8Encoding(false));

        xmlDigitalSignature.WriteTo(xmlTW);
        xmlTW.Close();
    } //SignDetachedResource   

    // Verify the signature of an XML file and return the result.
    public static Boolean VerifyDetachedSignature(String xmlSigFileName)
    {
        // Create a new XML document.
        XmlDocument xmlDocument = new XmlDocument();

        // Load the passed XML file into the document.
        xmlDocument.Load(xmlSigFileName);

        // Create a new SignedXMl object.
        SignedXml signedXml = new SignedXml();

        // Find the "Signature" node and create a new
        // XmlNodeList object.
        XmlNodeList nodeList = xmlDocument.GetElementsByTagName("Signature");

        // Load the signature node.
        signedXml.LoadXml(((XmlElement)(nodeList.get_ItemOf(0))));

        // Check the signature and return the result.
        return new Boolean(signedXml.CheckSignature());
    } //VerifyDetachedSignature
} //XMLDSIGDetached

Example #2

using System;
using System.IO;
using System.Xml;
using System.Security.Cryptography;
using System.Security.Cryptography.Xml;
using System.Security.Cryptography.X509Certificates;

class Class1
{
    private static string Certificate =  "..\\..\\my509.cer";

    [STAThread]
    static void Main(string[] args)
    {
        // Encrypt an XML message
        XmlDocument productsXml = LoadProducts();
        ShowTransformProperties(productsXml);

        SignDocument(ref productsXml);
        ShowTransformProperties(productsXml);

        // Use XmlDsigC14NTransform to resolve a Uri.
        Uri baseUri = new Uri("http://www.contoso.com");
        string relativeUri = "xml";
        Uri absoluteUri = ResolveUris(baseUri, relativeUri);

        Console.WriteLine("This sample completed successfully; " +
            "press Enter to exit.");
        Console.ReadLine();
    }

    // Encrypt the text in the specified XmlDocument.
    private static void ShowTransformProperties(XmlDocument xmlDoc)
    {
        XmlDsigC14NTransform xmlTransform = 
            new XmlDsigC14NTransform(true);

        // Ensure the transform is using the appropriate algorithm.
        xmlTransform.Algorithm =
            SignedXml.XmlDsigExcC14NTransformUrl;

        // Retrieve the XML representation of the current transform.
        XmlElement xmlInTransform = xmlTransform.GetXml();

        Console.WriteLine("\nXml representation of the current transform: ");
        Console.WriteLine(xmlInTransform.OuterXml);

        // Retrieve the valid input types for the current transform.
        Type[] validInTypes = xmlTransform.InputTypes;

        // Verify the xmlTransform can accept the XMLDocument as an
        // input type.
        for (int i=0; i<validInTypes.Length; i++)
        {
            if (validInTypes[i] == xmlDoc.GetType())
            {
                // Load the document into the transfrom.
                xmlTransform.LoadInput(xmlDoc);

                XmlDsigC14NTransform secondTransform = 
                    new XmlDsigC14NTransform();

                string classDescription = secondTransform.ToString();

                // This call does not perform as expected.
                // This transform does not contain inner XML elements
                secondTransform.LoadInnerXml(xmlDoc.SelectNodes("//."));

                break;
            }
        }

        Type[] validOutTypes = xmlTransform.OutputTypes;

        for (int i=0; i<validOutTypes.Length;i++)
        {
            if (validOutTypes[i] == typeof(System.IO.Stream))
            {
                try 
                {
                    Type streamType = typeof(System.IO.Stream);
                    MemoryStream outputStream = (MemoryStream) 
                        xmlTransform.GetOutput(streamType);

                    // Read the CryptoStream into a stream reader.
                    StreamReader streamReader =
                        new StreamReader(outputStream);

                    // Read the stream into a string.
                    string outputMessage = streamReader.ReadToEnd();

                    // Close the streams.
                    outputStream.Close();
                    streamReader.Close();

                    // Display to the console the Xml before and after
                    // encryption.
                    Console.WriteLine("Encoding the following xml: " +
                        xmlDoc.OuterXml);
                    Console.WriteLine("Message encoded: " + outputMessage);
                }
                catch (Exception ex)
                {
                    Console.WriteLine("Unexpected exception caught: " +
                        ex.ToString());
                }

                break;
            }
            else
            {
                object outputObject = xmlTransform.GetOutput();
            }
        }
    }

    // Create an XML document describing various products.
    private static XmlDocument LoadProducts()
    {
        XmlDocument xmlDoc = new XmlDocument();

        string contosoProducts = "<PRODUCTS>";
        contosoProducts += "<PRODUCT><ID>123</ID>";
        contosoProducts += "<DESCRIPTION>Router</DESCRIPTION></PRODUCT>";
        contosoProducts += "<PRODUCT><ID>456</ID>";
        contosoProducts += "<DESCRIPTION>Keyboard</DESCRIPTION></PRODUCT>";

        // Include a comment to test the comments feature of the transform.
        contosoProducts += "<!--Comments are included in the transform-->";

        // Include the CDATA tag to test the transform results.
        contosoProducts += "<PARTNER_URL><![CDATA['http:\\\\www.contoso.com";
        contosoProducts += "\\partner.asp?h1=en&h2=cr']]></PARTNER_URL>";
        contosoProducts += "</PRODUCTS>";

        xmlDoc.LoadXml(contosoProducts);
        return xmlDoc;
    }

    // Create a signature and add it to the specified document.
    private static void SignDocument(ref XmlDocument xmlDoc)
    {
        // Generate a signing key.
        RSACryptoServiceProvider Key = new RSACryptoServiceProvider();

        // Create a SignedXml object.
        SignedXml signedXml = new SignedXml(xmlDoc);

        // Add the key to the SignedXml document. 
        signedXml.SigningKey = Key;

        // Create a reference to be signed.
        Reference reference = new Reference();
        reference.Uri = "";

        // Add an enveloped transformation to the reference.
        reference.AddTransform(new XmlDsigC14NTransform());

        // Add the reference to the SignedXml object.
        signedXml.AddReference(reference);

        try 
        {
            // Create a new KeyInfo object.
            KeyInfo keyInfo = new KeyInfo();

            // Load the X509 certificate.
            X509Certificate MSCert =
                X509Certificate.CreateFromCertFile(Certificate);

            // Load the certificate into a KeyInfoX509Data object
            // and add it to the KeyInfo object.
            keyInfo.AddClause(new KeyInfoX509Data(MSCert));

            // Add the KeyInfo object to the SignedXml object.
            signedXml.KeyInfo = keyInfo;
        }
        catch (FileNotFoundException)
        {
            Console.WriteLine("Unable to locate the following file: " + 
                Certificate);
        }
        catch (CryptographicException ex)
        {
            Console.WriteLine("Unexpected exception caught whild creating " +
                "the certificate:" + ex.ToString());
        }

        // Compute the signature.
        signedXml.ComputeSignature();

        // Add the signature branch to the original tree so it is enveloped.
        xmlDoc.DocumentElement.AppendChild(signedXml.GetXml());
    }

    // Resolve the specified base and relative Uri's .
    private static Uri ResolveUris(Uri baseUri, string relativeUri)
    {
        XmlUrlResolver xmlResolver = new XmlUrlResolver();
        xmlResolver.Credentials = 
            System.Net.CredentialCache.DefaultCredentials;

        XmlDsigC14NTransform xmlTransform =
            new XmlDsigC14NTransform();
        xmlTransform.Resolver = xmlResolver;

        Uri absoluteUri = xmlResolver.ResolveUri(baseUri, relativeUri);

        if (absoluteUri != null)
        {
            Console.WriteLine(
                "\nResolved the base Uri and relative Uri to the following:");
            Console.WriteLine(absoluteUri.ToString());
        }
        else
        {
            Console.WriteLine(
                "Unable to resolve the base Uri and relative Uri");
        }
        return absoluteUri;
    }
}
//
// This sample produces the following output:
//
// Xml representation of the current transform:
// <Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" xmln
// s="http://www.w3.org/2000/09/xmldsig#" />
// Encoding the following xml: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Rou
// ter</DESCRIPTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESC
// RIPTION></PRODUCT><!--Comments are included in the transform--><PARTNER_URL
// ><![CDATA['http:\\www.contoso.com\partner.asp?h1=en&h2=cr']]></PARTNER_URL>
// </PRODUCTS>Message encoded: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Rou
// ter</DESCRIPTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESC
// RIPTION></PRODUCT><!--Comments are included in the transform--><PARTNER_URL
// >'http:\\www.contoso.com\partner.asp?h1=en&amp;h2=cr'</PARTNER_URL></PRODUC
// TS>

// Xml representation of the current transform:
// <Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" xmln
// s="http://www.w3.org/2000/09/xmldsig#" />
// Encoding the following xml: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Rou
// ter</DESCRIPTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESC
// RIPTION></PRODUCT><!--Comments are included in the transform--><PARTNER_URL
// ><![CDATA['http:\\www.contoso.com\partner.asp?h1=en&h2=cr']]></PARTNER_URL>
// <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><Canonica
// lizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" 
// /><SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /
// ><Reference URI=""><Transforms><Transform Algorithm="http://www.w3.org/TR/2
// 001/REC-xml-c14n-20010315" /></Transforms><DigestMethod Algorithm="http://w
// ww.w3.org/2000/09/xmldsig#sha1" /><DigestValue>BFN2s0/NA2NGgb/R0mvfnNM0Ito=
// </DigestValue></Reference></SignedInfo><SignatureValue>vSfZUG5xHuNxzOSEbQjN
// dtEt1D+O7I1LTJ13RrwLaJSfQPrdT/s8IeaA+idw2f2WGuGrdqMJUddpE4GxfK61HmPQ6S7lBG+
// +ND+YaUYf2AtTRs3SnToXQQrARa/pHVjsKxYHR/9tjy6maHBwxjgjFQABvYZu0gZHYRuXvvfxv0
// 8=</SignatureValue><KeyInfo><X509Data xmlns="http://www.w3.org/2000/09/xmld
// sig#"><X509Certificate>MIICCzCCAXSgAwIBAgIQ5eVQY8pRZ5xBF2WLkYPjijANBgkqhkiG
// 9w0BAQQFADAbMRkwFwYDVQQDExBHcmVnc0NlcnRpZmljYXRlMB4XDTAzMDkxNzIzMzU0N1oXDTM
// 5MTIzMTIzNTk1OVowGzEZMBcGA1UEAxMQR3JlZ3NDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG9w0BAQ
// EFAAOBjQAwgYkCgYEAmFJ4v7rS3BYTXgVW9PgBFfTYAcB/m9mOFCmUrrChcBpoEtu/tSESlNfEH
// pECIdqg9vUrCNSkY08HRn3ueNeBSnSpssWd8/XoOboWLh1nd+79Y5uZd1WOJI4s0XM0MegZgCoJ
// cEEhpxCd/HOPIQvEsbpN/DuFiovZLo+Ek3hHoxMCAwEAAaNQME4wTAYDVR0BBEUwQ4AQaCb19dl
// yf/zSxPVYQZY9AKEdMBsxGTAXBgNVBAMTEEdyZWdzQ2VydGlmaWNhdGWCEOXlUGPKUWecQRdli5
// GD44owDQYJKoZIhvcNAQEEBQADgYEAZuZaFDGDJogh7FuT0hfaMAVlRONv6wWVBJVV++eUo38Xu
// RfJ5nNJ0UnhiV2sEtLobYBPEIrNhuk8skdU0AHgx4ILiA4rR96ifWwxtrFQF+h+DL2ZB7xhwcOJ
// +Pa7IC4wIaEp/oBmmX+JHSzfQt6/If4ohwikfxfljKMyIcMlwl4=</X509Certificate></X50
// 9Data></KeyInfo></Signature></PRODUCTS>
//
// Message encoded: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Router</DESCRI
// PTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESCRIPTION></P
// RODUCT><!--Comments are included in the transform--><PARTNER_URL>'http:\\ww
// w.contoso.com\partner.asp?h1=en&amp;h2=cr'</PARTNER_URL><Signature><SignedI
// nfo><CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c1
// 4n-20010315"></CanonicalizationMethod><SignatureMethod Algorithm="http://ww
// w.w3.org/2000/09/xmldsig#rsa-sha1"></SignatureMethod><Reference URI=""><Tra
// nsforms><Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-200103
// 15"></Transform></Transforms><DigestMethod Algorithm="http://www.w3.org/200
// 0/09/xmldsig#sha1"></DigestMethod><DigestValue>BFN2s0/NA2NGgb/R0mvfnNM0Ito=
// </DigestValue></Reference></SignedInfo><SignatureValue>vSfZUG5xHuNxzOSEbQjN
// dtEt1D+O7I1LTJ13RrwLaJSfQPrdT/s8IeaA+idw2f2WGuGrdqMJUddpE4GxfK61HmPQ6S7lBG+
// +ND+YaUYf2AtTRs3SnToXQQrARa/pHVjsKxYHR/9tjy6maHBwxjgjFQABvYZu0gZHYRuXvvfxv0
// 8=</SignatureValue><KeyInfo><X509Data xmlns="http://www.w3.org/2000/09/xmld
// sig#"><X509Certificate>MIICCzCCAXSgAwIBAgIQ5eVQY8pRZ5xBF2WLkYPjijANBgkqhkiG
// 9w0BAQQFADAbMRkwFwYDVQQDExBHcmVnc0NlcnRpZmljYXRlMB4XDTAzMDkxNzIzMzU0N1oXDTM
// 5MTIzMTIzNTk1OVowGzEZMBcGA1UEAxMQR3JlZ3NDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG9w0BAQ
// EFAAOBjQAwgYkCgYEAmFJ4v7rS3BYTXgVW9PgBFfTYAcB/m9mOFCmUrrChcBpoEtu/tSESlNfEH
// pECIdqg9vUrCNSkY08HRn3ueNeBSnSpssWd8/XoOboWLh1nd+79Y5uZd1WOJI4s0XM0MegZgCoJ
// cEEhpxCd/HOPIQvEsbpN/DuFiovZLo+Ek3hHoxMCAwEAAaNQME4wTAYDVR0BBEUwQ4AQaCb19dl
// yf/zSxPVYQZY9AKEdMBsxGTAXBgNVBAMTEEdyZWdzQ2VydGlmaWNhdGWCEOXlUGPKUWecQRdli5
// GD44owDQYJKoZIhvcNAQEEBQADgYEAZuZaFDGDJogh7FuT0hfaMAVlRONv6wWVBJVV++eUo38Xu
// RfJ5nNJ0UnhiV2sEtLobYBPEIrNhuk8skdU0AHgx4ILiA4rR96ifWwxtrFQF+h+DL2ZB7xhwcOJ
// +Pa7IC4wIaEp/oBmmX+JHSzfQt6/If4ohwikfxfljKMyIcMlwl4=</X509Certificate></X50
// 9Data></KeyInfo></Signature></PRODUCTS>
//
// Resolved the base Uri and relative Uri to the following:
// http://www.contoso.com/xml
// This sample completed successfully; press Enter to exit.

import System.*;
import System.IO.*;
import System.Xml.*;
import System.Security.Cryptography.*;
import System.Security.Cryptography.Xml.*;
import System.Security.Cryptography.X509Certificates.*;

class Class1
{
    private static String Certificate = "..\\..\\my509.cer";

    /** @attribute STAThread()
     */
    public static void main(String[] args)
    {
        // Encrypt an XML message
        XmlDocument productsXml = LoadProducts();
        ShowTransformProperties(productsXml);

        SignDocument(productsXml);
        ShowTransformProperties(productsXml);
        // Use XmlDsigC14NTransform to resolve a Uri.
        Uri baseUri = new Uri("http://www.contoso.com");
        String relativeUri = "xml";
        Uri absoluteUri = ResolveUris(baseUri, relativeUri);

        Console.WriteLine("This sample completed successfully; " 
            + "press Enter to exit.");
        Console.ReadLine();
    } //main

    // Encrypt the text in the specified XmlDocument.
    private static void ShowTransformProperties(XmlDocument xmlDoc)
    {
        XmlDsigC14NTransform xmlTransform = new XmlDsigC14NTransform(true);

        // Ensure the transform is using the appropriate algorithm.
        xmlTransform.set_Algorithm(
            SignedXml.XmlDsigExcC14NTransformUrl);

        // Retrieve the XML representation of the current transform.
        XmlElement xmlInTransform = xmlTransform.GetXml();

        Console.WriteLine("\nXml representation of the current transform: ");
        Console.WriteLine(xmlInTransform.get_OuterXml());
        // Retrieve the valid input types for the current transform.
        Type validInTypes[] = xmlTransform.get_InputTypes();

        // Verify the xmlTransform can accept the XMLDocument as an
        // input type.
        for (int i = 0; i < validInTypes.get_Length(); i++) {
            if (validInTypes.get_Item(i).Equals(xmlDoc.GetType())) {
                // Load the document into the transfrom.
                xmlTransform.LoadInput(xmlDoc);

                XmlDsigC14NTransform secondTransform 
                    = new XmlDsigC14NTransform();

                String classDescription = secondTransform.ToString();

                // This call does not perform as expected.
                // This transform does not contain inner XML elements
                secondTransform.LoadInnerXml(xmlDoc.SelectNodes("//."));
                break;
            }
        }
        Type validOutTypes[] = xmlTransform.get_OutputTypes();
        for (int i = 0; i < validOutTypes.get_Length(); i++) {
            if (validOutTypes.get_Item(i).Equals(
                System.IO.Stream.class.ToType())) {
                try {
                    Type streamType = System.IO.Stream.class.ToType();
                    MemoryStream outputStream = (MemoryStream)xmlTransform.
                        GetOutput(streamType);

                    // Read the CryptoStream into a stream reader.
                    StreamReader streamReader = new StreamReader(outputStream);
                    // Read the stream into a string.
                    String outputMessage = streamReader.ReadToEnd();
                    // Close the streams.
                    outputStream.Close();
                    streamReader.Close();
                    // Display to the console the Xml before and after
                    // encryption.
                    Console.WriteLine("Encoding the following xml: " 
                        + xmlDoc.get_OuterXml());
                    Console.WriteLine("Message encoded: " + outputMessage);
                }
                catch (System.Exception ex) {
                    Console.WriteLine("Unexpected exception caught: " 
                        + ex.ToString());
                }
                break;
            }
            else {
                Object outputObject = xmlTransform.GetOutput();
            } 
        }
    } //ShowTransformProperties

    // Create an XML document describing various products.
    private static XmlDocument LoadProducts()
    {
        XmlDocument xmlDoc = new XmlDocument();

        String contosoProducts = "<PRODUCTS>";
        contosoProducts += "<PRODUCT><ID>123</ID>";
        contosoProducts += "<DESCRIPTION>Router</DESCRIPTION></PRODUCT>";
        contosoProducts += "<PRODUCT><ID>456</ID>";
        contosoProducts += "<DESCRIPTION>Keyboard</DESCRIPTION></PRODUCT>";
        // Include a comment to test the comments feature of the transform.
        contosoProducts += "<!--Comments are included in the transform-->";
        // Include the CDATA tag to test the transform results.
        contosoProducts += "<PARTNER_URL><![CDATA['http:\\\\www.contoso.com";
        contosoProducts += "\\partner.asp?h1=en&h2=cr']]></PARTNER_URL>";
        contosoProducts += "</PRODUCTS>";

        xmlDoc.LoadXml(contosoProducts);
        return xmlDoc;
    } //LoadProducts

    // Create a signature and add it to the specified document.
    private static void SignDocument(XmlDocument xmlDoc)
    {
        // Generate a signing key.
        RSACryptoServiceProvider key = new RSACryptoServiceProvider();
        // Create a SignedXml object.
        SignedXml signedXml = new SignedXml(xmlDoc);
        // Add the key to the SignedXml document. 
        signedXml.set_SigningKey(key);
        // Create a reference to be signed.
        Reference reference = new Reference();
        reference.set_Uri("");
        // Add an enveloped transformation to the reference.
        reference.AddTransform(new XmlDsigC14NTransform());
        // Add the reference to the SignedXml object.
        signedXml.AddReference(reference);

        try {
            // Create a new KeyInfo object.
            KeyInfo keyInfo = new KeyInfo();
            // Load the X509 certificate.
            X509Certificate MSCert = X509Certificate.
                CreateFromCertFile(Certificate);
            // Load the certificate into a KeyInfoX509Data object
            // and add it to the KeyInfo object.
            keyInfo.AddClause(new KeyInfoX509Data(MSCert));
            // Add the KeyInfo object to the SignedXml object.
            signedXml.set_KeyInfo(keyInfo);
        }
        catch (FileNotFoundException exp) {
            Console.WriteLine("Unable to locate the following file: " 
                + Certificate);
        }
        catch (CryptographicException ex) {
            Console.WriteLine("Unexpected exception caught whild creating " 
                + "the certificate:" + ex.ToString());
        }
        // Compute the signature.
        signedXml.ComputeSignature();
        // Add the signature branch to the original tree so it is enveloped.
        xmlDoc.get_DocumentElement().AppendChild(signedXml.GetXml());
    } //SignDocument

    // Resolve the specified base and relative Uri's .
    private static Uri ResolveUris(Uri baseUri, String relativeUri)
    {
        XmlUrlResolver xmlResolver = new XmlUrlResolver();
        xmlResolver.set_Credentials(System.Net.CredentialCache.
            get_DefaultCredentials());
        XmlDsigC14NTransform xmlTransform = new XmlDsigC14NTransform();
        xmlTransform.set_Resolver(xmlResolver);

        Uri absoluteUri = xmlResolver.ResolveUri(baseUri, relativeUri);

        if (absoluteUri != null) {
            Console.WriteLine("\nResolved the base Uri and relative "
                + "Uri to the following:");
            Console.WriteLine(absoluteUri.ToString());
        }
        else {
            Console.WriteLine("Unable to resolve the base "
                + "Uri and relative Uri");
        }
        return absoluteUri;
    } //ResolveUris
} //Class1
//
// This sample produces the following output:
//
// Xml representation of the current transform:
// <Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" xmln
// s="http://www.w3.org/2000/09/xmldsig#" />
// Encoding the following xml: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Rou
// ter</DESCRIPTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESC
// RIPTION></PRODUCT><!--Comments are included in the transform--><PARTNER_URL
// ><![CDATA['http:\\www.contoso.com\partner.asp?h1=en&h2=cr']]></PARTNER_URL>
// </PRODUCTS>Message encoded: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Rou
// ter</DESCRIPTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESC
// RIPTION></PRODUCT><!--Comments are included in the transform--><PARTNER_URL
// >'http:\\www.contoso.com\partner.asp?h1=en&amp;h2=cr'</PARTNER_URL></PRODUC
// TS>
// Xml representation of the current transform:
// <Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" xmln
// s="http://www.w3.org/2000/09/xmldsig#" />
// Encoding the following xml: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Rou
// ter</DESCRIPTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESC
// RIPTION></PRODUCT><!--Comments are included in the transform--><PARTNER_URL
// ><![CDATA['http:\\www.contoso.com\partner.asp?h1=en&h2=cr']]></PARTNER_URL>
// <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><Canonica
// lizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" 
// /><SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /
// ><Reference URI=""><Transforms><Transform Algorithm="http://www.w3.org/TR/2
// 001/REC-xml-c14n-20010315" /></Transforms><DigestMethod Algorithm="http://w
// ww.w3.org/2000/09/xmldsig#sha1" /><DigestValue>BFN2s0/NA2NGgb/R0mvfnNM0Ito=
// </DigestValue></Reference></SignedInfo><SignatureValue>vSfZUG5xHuNxzOSEbQjN
// dtEt1D+O7I1LTJ13RrwLaJSfQPrdT/s8IeaA+idw2f2WGuGrdqMJUddpE4GxfK61HmPQ6S7lBG+
// +ND+YaUYf2AtTRs3SnToXQQrARa/pHVjsKxYHR/9tjy6maHBwxjgjFQABvYZu0gZHYRuXvvfxv0
// 8=</SignatureValue><KeyInfo><X509Data xmlns="http://www.w3.org/2000/09/xmld
// sig#"><X509Certificate>MIICCzCCAXSgAwIBAgIQ5eVQY8pRZ5xBF2WLkYPjijANBgkqhkiG
// 9w0BAQQFADAbMRkwFwYDVQQDExBHcmVnc0NlcnRpZmljYXRlMB4XDTAzMDkxNzIzMzU0N1oXDTM
// 5MTIzMTIzNTk1OVowGzEZMBcGA1UEAxMQR3JlZ3NDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG9w0BAQ
// EFAAOBjQAwgYkCgYEAmFJ4v7rS3BYTXgVW9PgBFfTYAcB/m9mOFCmUrrChcBpoEtu/tSESlNfEH
// pECIdqg9vUrCNSkY08HRn3ueNeBSnSpssWd8/XoOboWLh1nd+79Y5uZd1WOJI4s0XM0MegZgCoJ
// cEEhpxCd/HOPIQvEsbpN/DuFiovZLo+Ek3hHoxMCAwEAAaNQME4wTAYDVR0BBEUwQ4AQaCb19dl
// yf/zSxPVYQZY9AKEdMBsxGTAXBgNVBAMTEEdyZWdzQ2VydGlmaWNhdGWCEOXlUGPKUWecQRdli5
// GD44owDQYJKoZIhvcNAQEEBQADgYEAZuZaFDGDJogh7FuT0hfaMAVlRONv6wWVBJVV++eUo38Xu
// RfJ5nNJ0UnhiV2sEtLobYBPEIrNhuk8skdU0AHgx4ILiA4rR96ifWwxtrFQF+h+DL2ZB7xhwcOJ
// +Pa7IC4wIaEp/oBmmX+JHSzfQt6/If4ohwikfxfljKMyIcMlwl4=</X509Certificate></X50
// 9Data></KeyInfo></Signature></PRODUCTS>
//
// Message encoded: <PRODUCTS><PRODUCT><ID>123</ID><DESCRIPTION>Router</DESCRI
// PTION></PRODUCT><PRODUCT><ID>456</ID><DESCRIPTION>Keyboard</DESCRIPTION></P
// RODUCT><!--Comments are included in the transform--><PARTNER_URL>'http:\\ww
// w.contoso.com\partner.asp?h1=en&amp;h2=cr'</PARTNER_URL><Signature><SignedI
// nfo><CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c1
// 4n-20010315"></CanonicalizationMethod><SignatureMethod Algorithm="http://ww
// w.w3.org/2000/09/xmldsig#rsa-sha1"></SignatureMethod><Reference URI=""><Tra
// nsforms><Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-200103
// 15"></Transform></Transforms><DigestMethod Algorithm="http://www.w3.org/200
// 0/09/xmldsig#sha1"></DigestMethod><DigestValue>BFN2s0/NA2NGgb/R0mvfnNM0Ito=
// </DigestValue></Reference></SignedInfo><SignatureValue>vSfZUG5xHuNxzOSEbQjN
// dtEt1D+O7I1LTJ13RrwLaJSfQPrdT/s8IeaA+idw2f2WGuGrdqMJUddpE4GxfK61HmPQ6S7lBG+
// +ND+YaUYf2AtTRs3SnToXQQrARa/pHVjsKxYHR/9tjy6maHBwxjgjFQABvYZu0gZHYRuXvvfxv0
// 8=</SignatureValue><KeyInfo><X509Data xmlns="http://www.w3.org/2000/09/xmld
// sig#"><X509Certificate>MIICCzCCAXSgAwIBAgIQ5eVQY8pRZ5xBF2WLkYPjijANBgkqhkiG
// 9w0BAQQFADAbMRkwFwYDVQQDExBHcmVnc0NlcnRpZmljYXRlMB4XDTAzMDkxNzIzMzU0N1oXDTM
// 5MTIzMTIzNTk1OVowGzEZMBcGA1UEAxMQR3JlZ3NDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG9w0BAQ
// EFAAOBjQAwgYkCgYEAmFJ4v7rS3BYTXgVW9PgBFfTYAcB/m9mOFCmUrrChcBpoEtu/tSESlNfEH
// pECIdqg9vUrCNSkY08HRn3ueNeBSnSpssWd8/XoOboWLh1nd+79Y5uZd1WOJI4s0XM0MegZgCoJ
// cEEhpxCd/HOPIQvEsbpN/DuFiovZLo+Ek3hHoxMCAwEAAaNQME4wTAYDVR0BBEUwQ4AQaCb19dl
// yf/zSxPVYQZY9AKEdMBsxGTAXBgNVBAMTEEdyZWdzQ2VydGlmaWNhdGWCEOXlUGPKUWecQRdli5
// GD44owDQYJKoZIhvcNAQEEBQADgYEAZuZaFDGDJogh7FuT0hfaMAVlRONv6wWVBJVV++eUo38Xu
// RfJ5nNJ0UnhiV2sEtLobYBPEIrNhuk8skdU0AHgx4ILiA4rR96ifWwxtrFQF+h+DL2ZB7xhwcOJ
// +Pa7IC4wIaEp/oBmmX+JHSzfQt6/If4ohwikfxfljKMyIcMlwl4=</X509Certificate></X50
// 9Data></KeyInfo></Signature></PRODUCTS>
//
// Resolved the base Uri and relative Uri to the following:
// http://www.contoso.com/xml
// This sample completed successfully; press Enter to exit.

Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.

Windows 98, Windows 2000 SP4, Windows Millennium Edition, Windows Server 2003, Windows XP Media Center Edition, Windows XP Professional x64 Edition, Windows XP SP2, Windows XP Starter Edition

The .NET Framework does not support all versions of every platform. For a list of the supported versions, see System Requirements.

.NET Framework

Supported in: 2.0, 1.1, 1.0

Community Additions

ADD
Show:
© 2014 Microsoft