python - 如何在 Python 中使用 Xades-EPES 标准进行签名?

标签 python cryptography lib

我找到了 Xades Signature for Python GitHub。我的计划是将 Xades-EPES 签名应用于 XML 文件。根据 GitHub 的工作,它能够执行此过程,但我无法运行。

test_xades.py 有两种方法。当我尝试运行它时收到一条错误消息。好吧,问题是我不确定该库是否可以签署 Xades-EPES 或如何实现它。

先感谢您

代码 :

import unittest
from datetime import datetime
from os import path

from OpenSSL import crypto

import xmlsig
from xades import XAdESContext, template, utils, ObjectIdentifier
from xades.policy import GenericPolicyId, ImpliedPolicy
from basex import parse_xml, BASE_DIR 

class TestXadesSignature(unittest.TestCase):
    def test_verify(self):
        root = parse_xml('data/sample.xml')
        sign = root.xpath(
            '//ds:Signature', namespaces={'ds': xmlsig.constants.DSigNs}
        )[0]
        ctx = XAdESContext()
        ctx.verify(sign)

    def test_sign(self):
        root = parse_xml('data/unsigned-sample.xml')
        sign = root.xpath(
            '//ds:Signature', namespaces={'ds': xmlsig.constants.DSigNs}
        )[0]
        policy = GenericPolicyId(
            'http://www.facturae.es/politica_de_firma_formato_facturae/'
            'politica_de_firma_formato_facturae_v3_1.pdf',
            u"Politica de Firma FacturaE v3.1",
            xmlsig.constants.TransformSha1
        )
        ctx = XAdESContext(policy)
        with open(path.join(BASE_DIR, "data/keyStore.p12"), "rb") as key_file:
            ctx.load_pkcs12(crypto.load_pkcs12(key_file.read()))
        ctx.sign(sign)
        ctx.verify(sign)

    def test_create(self):
        root = parse_xml('data/free-sample.xml')
        signature = xmlsig.template.create(
            xmlsig.constants.TransformInclC14N,
            xmlsig.constants.TransformRsaSha1,
            "Signature"
        )
        signature_id = utils.get_unique_id()
        ref = xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha1, uri="", name="REF"
        )
        xmlsig.template.add_transform(ref, xmlsig.constants.TransformEnveloped)
        xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha1, uri="#KI"
        )
        xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha1, uri="#" + signature_id
        )
        ki = xmlsig.template.ensure_key_info(signature, name='KI')
        data = xmlsig.template.add_x509_data(ki)
        xmlsig.template.x509_data_add_certificate(data)
        serial = xmlsig.template.x509_data_add_issuer_serial(data)
        xmlsig.template.x509_issuer_serial_add_issuer_name(serial)
        xmlsig.template.x509_issuer_serial_add_serial_number(serial)
        xmlsig.template.add_key_value(ki)
        qualifying = template.create_qualifying_properties(
            signature, name=utils.get_unique_id()
        )
        props = template.create_signed_properties(
            qualifying, name=signature_id
        )
        template.add_claimed_role(props, "Supp2")
        template.add_production_place(props, city='Madrid')
        template.add_production_place(
            props, state='BCN', postal_code='08000', country='ES')
        template.add_claimed_role(props, "Supp")
        policy = GenericPolicyId(
            'http://www.facturae.es/politica_de_firma_formato_facturae/'
            'politica_de_firma_formato_facturae_v3_1.pdf',
            u"Politica de Firma FacturaE v3.1",
            xmlsig.constants.TransformSha1
        )
        root.append(signature)
        ctx = XAdESContext(policy)
        with open(path.join(BASE_DIR, "data/keyStore.p12"), "rb") as key_file:
            ctx.load_pkcs12(crypto.load_pkcs12(key_file.read()))
        ctx.sign(signature)
        ctx.verify(signature)

    def test_create_2(self):
        root = parse_xml('data/free-sample.xml')
        signature = xmlsig.template.create(
            xmlsig.constants.TransformInclC14N,
            xmlsig.constants.TransformRsaSha1,
            "Signature"
        )
        ref = xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha1, uri="", name="R1"
        )
        xmlsig.template.add_transform(ref, xmlsig.constants.TransformEnveloped)
        xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha1, uri="#KI", name="RKI"
        )
        ki = xmlsig.template.ensure_key_info(signature, name='KI')
        data = xmlsig.template.add_x509_data(ki)
        xmlsig.template.x509_data_add_certificate(data)
        serial = xmlsig.template.x509_data_add_issuer_serial(data)
        xmlsig.template.x509_issuer_serial_add_issuer_name(serial)
        xmlsig.template.x509_issuer_serial_add_serial_number(serial)
        xmlsig.template.add_key_value(ki)
        qualifying = template.create_qualifying_properties(signature)
        utils.ensure_id(qualifying)
        utils.ensure_id(qualifying)
        props = template.create_signed_properties(
            qualifying, datetime=datetime.now()
        )
        template.add_claimed_role(props, "Supp")
        signed_do = template.ensure_signed_data_object_properties(props)
        template.add_data_object_format(
            signed_do,
            "#R1",
            identifier=ObjectIdentifier("Idenfitier0", "Description")
        )
        template.add_commitment_type_indication(
            signed_do,
            ObjectIdentifier("Idenfitier0", "Description"),
            qualifiers_type=["Tipo"]
        )

        template.add_commitment_type_indication(
            signed_do,
            ObjectIdentifier("Idenfitier1", references=["#R1"]),
            references=["#R1"]
        )
        template.add_data_object_format(
            signed_do,
            "#RKI",
            description="Desc",
            mime_type="application/xml",
            encoding='UTF-8'
        )
        root.append(signature)
        ctx = XAdESContext(ImpliedPolicy(xmlsig.constants.TransformSha1))
        with open(path.join(BASE_DIR, "data/keyStore.p12"), "rb") as key_file:
            ctx.load_pkcs12(crypto.load_pkcs12(key_file.read()))
        ctx.sign(signature)
        from lxml import etree
        print(etree.tostring(root))
        ctx.verify(signature)

x= TestXadesSignature()
x.test_create()
x.test_create_2()

追溯 :

Exception has occurred: StopIteration
    exception: no description
      File "/home/sergio/Escritorio/PROYECTOSMAY2018/haciendaPython/src/lxml/lxml.etree.pyx", line 2821, in lxml.etree._ElementMatchIterator.__next__ (src/lxml/lxml.etree.c:75265)
      File "/home/sergio/Escritorio/PROYECTOSMAY2018/haciendaPython/haciendaCode/pythoncorella/test/test_xades.py", line 50, in test_create
        xmlsig.template.add_transform(ref, xmlsig.constants.TransformEnveloped)
      File "/home/sergio/Escritorio/PROYECTOSMAY2018/haciendaPython/haciendaCode/pythoncorella/test/test_xades.py", line 150, in <module>
        x.test_create()
      File "/usr/lib/python3.6/runpy.py", line 85, in _run_code
        exec(code, run_globals)
      File "/usr/lib/python3.6/runpy.py", line 96, in _run_module_code
        mod_name, mod_spec, pkg_name, script_name)
      File "/usr/lib/python3.6/runpy.py", line 263, in run_path
        pkg_name=pkg_name, script_name=fname)

最佳答案

使用这个进口

import xmlsig
from lxml import etree
from OpenSSL import crypto
from xades import XAdESContext, template, utils
from xades.policy import GenericPolicyId
全局是这个
POLICY_ENDPOINT = "politicadefirma/v2/politicadefirmav2.pdf"
SIGN_POLICY = f"http://facturaelectronica.dian.gov.co/{POLICY_ENDPOINT}"
CERTICAMARA_PFX = os.environ.get(
    'CERTICAMARA_PFX',
    '/path/to/certificate.pfx')
  • 你需要解析你要签名的xml文件parsed_file = etree.parse(file_path).getroot()
  • 使用相应的转换内容创建签名模板
    signature = xmlsig.template.create(
        xmlsig.constants.TransformInclC14N,
        xmlsig.constants.TransformRsaSha256,
        "Signature",
    )
    
    
  • 创建一个 uuid 和对签名的引用
  •     signature_id = utils.get_unique_id()
        ref = xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha256, uri="", name="REF"
        )
    
  • 为签名引用创建转换
  •     xmlsig.template.add_transform(ref, xmlsig.constants.TransformEnveloped)
    
  • 添加其他引用
  •    xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha256, uri="#" + signature_id
        )
    
       xmlsig.template.add_reference(
            signature, xmlsig.constants.TransformSha256, uri="#" + signature_id
        )
    
  • 添加将要合并证书的部分
  •     ki = xmlsig.template.ensure_key_info(signature, name="KI")
        data = xmlsig.template.add_x509_data(ki)
        xmlsig.template.x509_data_add_certificate(data)
        serial = xmlsig.template.x509_data_add_issuer_serial(data)
        xmlsig.template.x509_issuer_serial_add_issuer_name(serial)
        xmlsig.template.x509_issuer_serial_add_serial_number(serial)
        xmlsig.template.add_key_value(ki)
        qualifying = template.create_qualifying_properties(
            signature, name=utils.get_unique_id(), etsi='xades'
        )
    
  • 添加签名中的任何其他数据
  •     props = template.create_signed_properties(qualifying, name=signature_id)
        # Additional data for signature
        template.add_claimed_role(props, "Supp2")
        template.add_production_place(props, city="Bogotá Colombia")
        template.add_production_place(
            props, state="BCN", postal_code="08000", country="CO"
        )
        template.add_claimed_role(props, "SNE")
    
  • 添加政策信息
  •     policy = GenericPolicyId(
            SIGN_POLICY,
            u"Política de firma para facturas"
            " electrónicas de la República de Colombia",
            xmlsig.constants.TransformSha256,
        )
    
  • 将签名附加到解析的文档
  •    parsed_file.append(signature)
    
  • 打开 .pfx 或 .pem,这必须同时包含 key 和证书
  •    with open(CERTICAMARA_ANDES_PFX, "rb") as key_file:
            certificate = crypto.load_pkcs12(key_file.read(), 'filepassword')
    
  • 将证书和策略添加到 ctx 以在下一步中签名
  •     ctx = XAdESContext(
            policy,
            certificate.get_certificate().to_cryptography(),
        )
    
  • 将证书加载到 ctx 并执行签名
  •    ctx.load_pkcs12(certificate)
       ctx.sign(signature)
    
  • 将签名移动到所需位置,您可以更改以适合您的浇注。
  •     parsed_file[0][position][0].append(signature) 
    
  • 创建新的 xml 签名文件
  •     et = etree.ElementTree(parsed_file)
        
        nfs_name = 'Name of the signed file'
        et.write(nfs_name, pretty_print=True,
                 encoding='utf-8', xml_declaration=True)
    
    我用这个做我国内的一个电子发票签收项目,考虑到源代码Enric Tobella比包领先。使用源代码,您可以添加多个证书,而软件包只允许您使用一个,这是我发现的唯一区别。

    关于python - 如何在 Python 中使用 Xades-EPES 标准进行签名?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/55769855/

    相关文章:

    python - 如何在 python 中用百替换列表中的所有零?

    python - ffmpeg 无法检测文件,而 os 可以

    javascript - 在浏览器中的 Node 和 CryptoJS 之间使用 AES 加密时出现问题

    .net - 使用 Rijndael.Create() 而不是 new RijndaelManaged() 是否安全

    flutter - PS256 在 Flutter/Dart 中签名

    c++ - 如何将库 curlpp 添加到 C++ 项目

    PHP 严格标准 : Only variables should be passed by reference in . lib

    python - 为什么 Tkinter Canvas 要求 4 个额外的宽度和高度像素?

    python - 12 月至 1 月的平均日期

    c - 防止外部调用 lib 文件内的函数