SignedCms is not available in .NET Core 1.0 or 1.1; nor will it be in 2.0. (Edit: it will be available in the upcoming 2.1 release).
If you only care about writing data (which is much easier than reading it) you could implement a limited form of it using just RSA.SignData.
SignedCms produces a DER encoded CMS signed-data value (RFC 5652, section 5), which is
SignedData ::= SEQUENCE {
version CMSVersion,
digestAlgorithms DigestAlgorithmIdentifiers,
encapContentInfo EncapsulatedContentInfo,
certificates [0] IMPLICIT CertificateSet OPTIONAL,
crls [1] IMPLICIT RevocationInfoChoices OPTIONAL,
signerInfos SignerInfos
}
DigestAlgorithmIdentifiers ::= SET OF DigestAlgorithmIdentifier
SignerInfos ::= SET OF SignerInfo
In order to write one you'll need to understand how to write data according to the Distinguished Encoding Rules (DER), which is ITU-T X.690 (though it builds a lot on ASN.1, and makes references to ASN.1, which is ITU-T X.680).
Imagine you wanted to sign "Hello" with SHA-2-256 / RSA+SHA-2-256. Of course, we don't have strings in cryptography, so this is the byte sequence 48 65 6C 6C 6F
.
// SEQUENCE (SignedData)
30 xa [ya [za]]
// INTEGER (Version=1)
02 01 01
// SET (OF DigestAlgorithmIdentifier (digestAlgorithms))
31 xb [yb [zb]]
// SEQUENCE (DigestAlgorithmIdentifier ::= AlgorithmIdentifier)
30 xc [yc [zc]]
// OBJECT IDENTIFIER (2.16.840.1.101.3.4.2.1 == SHA-2-256)
06 09 60 86 48 01 65 03 04 02 01
// SEQUENCE (EncapsulatedContentInfo)
30 xd [yd [zd]]
// OBJECT IDENTIFIER (1.2.840.113549.1.7.1 == pkcs7-data)
06 09 2A 86 48 86 F7 0D 01 07 01
// CONTEXT SPECIFIC 0 - CONSTRUCTED
A0 xe [ye [ze]]
// OCTET STRING (the data goes here)
04 05 48 65 6C 6C 6F // "Hello"
// CONTEXT SPECIFIC 0 - CONSTRUCTED (CertificateSet (certificates))
A0 xf [yf [zf]]
[cert.RawData goes here, which is already DER encoded]
[do you have an intermediate you want to share?
okay, write intermediate.RawData here; repeat]
// skip the crls.
// SET (OF SignerInfo (singerInfos))
31 xg [yg [zg]]
// SEQUENCE (SignerInfo)
30 xh [yh [zh]]
// INTEGER (Version=1)
02 01 01
// SEQUENCE (IssuerAndSerialNumber)
30 xi [yi [zi]]
// SEQUENCE (Issuer)
[cert.IssuerName.RawData]
// OCTECT STRING (SerialNumber)
02 xj [yj [zj]]
[cert.GetSerialNumberBytes() (see note "j")]
// SEQUENCE (DigestAlgorithm (digestAlgorithm))
30 xk [yk [zk]]
// OBJECT IDENTIFIER (2.16.840.1.101.3.4.2.1 == SHA-2-256)
06 09 60 86 48 01 65 03 04 02 01
// skip signedAttrs
// SEQUENCE (DigestEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier)
30 xl [yl [zl]]
// OBJECT IDENTIFIER (1.2.840.113549.1.1.1 == rsaEncryption)
06 09 2A 86 48 86 F7 0D 01 01 01
// NULL (rsaEncryption says parameters must be explicit NULL)
05 00
// OCTECT STRING (signature)
04 xm [ym [zm]]
[rsa.SignData(
new byte[] { 0x48, 0x65, 0x6C, 0x6C, 0x6F },
HashAlgorithmName.SHA256,
RSASignaturePadding.Pkcs1)]
// skip unsignedAttrs
Now we're done and we can close off all the missing lengths. The signature size is a function of the RSA key. Let's assume it's a 2048-bit key, that makes a 2048-bit signature, or 256 bytes. 256 is 0x100, which is bigger than 0x7F, so we have to break it up into two length bytes and one length-length byte: So the "m" series of bytes is 80 01 00
.
The "l" series is complete, it contained 13 bytes, so 0D
(no y or z byte).
"k" is complete at 11 bytes (0B
).
"j" depends on how long the serial number is. My certificate has serial number 9B 5D E6 C1 51 26 A5 8B
, but you're not supposed to write it down as a negative number (first byte has the high bit set), so it needs a padding byte, making the content 00 9B 5D E6 C1 51 26 A5 8B
, and therefore the length 9 (09
).
"i" depends on the length of the issuer name. Mine came out to a 141 byte array (already DER encoded), plus our serial number (9 bytes + tag + length == 11 bytes) => 152 bytes (0x98). Since 0x98 is greater than 0x7F we have to length-prefix it: 81 98
.
Now "h" is done. (3 + (1 + 2 + 152) + (1 + 1 + 11) + (1 + 1 + 13) + (1 + 3 + 256) => 446 = 0x1BE => 82 01 BE
.
"g" is (1 + 3 + 446) => 450 = 0x1C2 82 01 C2
.
"f" is the sum of all the certs you encoded. Mine came out to 683 = 0x2AB (82 02 AB
)
"e" is 7 (07
)
"d" is 11 + (1 + 1 + 7) = 20 = 0x14 (14
)
"c" is 11 (0B
)
"b" is (1 + 1 + 11) = 13 (0D
)
"a" is 3 + (1 + 1 + 13) + (1 + 1 + 11) + (1 + 3 + 683) + (1 + 3 + 450) = 1172 = 0x494 (82 04 94
).
30 82 04 94 02 01 01 31 0D 30 0B 06 09 60 86 48
01 65 03 04 02 01 30 14 06 09 2A 86 48 86 F7 0D
01 07 01 A0 07 04 05 65 6C 6C 6F A0 82 02 AB ...
...cert.RawData...
31 82 01 C2 30 82 01 BE 02 01 01 30 81 98 ...
...cert.IssuerName.RawData...
02 09 00 9B 5D E6 C1 51 26 A5 8B 30 0B 06 09 60
86 48 01 65 03 04 02 01 30 0D 06 09 2A 86 48 86
F7 0D 01 01 01 05 00 04 80 01 00 ... signature ...
If you go this route, you'll be assisted by tools like openssl asn1parse -i -dump -inform DER < your.signed.cms
or ASN.1 Editor, or other such DER reader/rendering tools.