Java 尝试从证书获取签名时出现格式错误的内容异常

Java 尝试从证书获取签名时出现格式错误的内容异常,java,security,certificate,bouncycastle,sign,Java,Security,Certificate,Bouncycastle,Sign,我编写了以下代码,以使用我的证书存储中的证书验证文件的签名。但是当我试图获取它的签名并将其传递给SignedData方法时,我得到了以下异常 org.bouncycastle.cms.CMSException: Malformed content. at org.bouncycastle.cms.CMSUtils.readContentInfo(Unknown Source) at org.bouncycastle.cms.CMSUtils.readContentInfo(Unk

我编写了以下代码,以使用我的证书存储中的证书验证文件的签名。但是当我试图获取它的签名并将其传递给SignedData方法时,我得到了以下异常

org.bouncycastle.cms.CMSException: Malformed content.
    at org.bouncycastle.cms.CMSUtils.readContentInfo(Unknown Source)
    at org.bouncycastle.cms.CMSUtils.readContentInfo(Unknown Source)
    at org.bouncycastle.cms.CMSSignedData.<init>(Unknown Source)
    at VerifyFinal.main(VerifyFinal.java:65)
    at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
    at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
    at java.lang.reflect.Method.invoke(Method.java:483)
    at com.intellij.rt.execution.application.AppMain.main(AppMain.java:144)
Caused by: java.lang.IllegalArgumentException: unknown object in getInstance: org.bouncycastle.asn1.DERApplicationSpecific
    at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source)
    at org.bouncycastle.asn1.cms.ContentInfo.getInstance(Unknown Source)
    ... 9 more
如果你需要,下面是我如何签署文件

Security.addProvider(new BouncyCastleProvider());

            KeyStore msCertStore = KeyStore.getInstance("Windows-MY", "SunMSCAPI");
            msCertStore.load(null, null);
            X509Certificate cer = ((X509Certificate) msCertStore.getCertificate("Software View Certificate Authority"));
            PublicKey pubKey = cer.getPublicKey();

            byte[] sigToVerify = cer.getSignature();
            Signature signature = Signature.getInstance("SHA1WithRSA", "BC");
            signature.initVerify(pubKey);

            CMSSignedData cms = new CMSSignedData(cer.getSignature());
            Store store = cms.getCertificates();
            SignerInformationStore signers = cms.getSignerInfos();
            Collection c = signers.getSigners();
            Iterator it = c.iterator();
            while (it.hasNext()) {
                SignerInformation signer = (SignerInformation) it.next();
                Collection certCollection = store.getMatches(signer.getSID());
                Iterator certIt = certCollection.iterator();
                X509CertificateHolder certHolder = (X509CertificateHolder) certIt.next();
                X509Certificate cert = new JcaX509CertificateConverter().setProvider("BC").getCertificate(certHolder);
                if (signer.verify(new JcaSimpleSignerInfoVerifierBuilder().setProvider("BC").build(cert))) {
                    System.out.println("verified");
                }
            }

        } catch (Exception ex) {
            ex.printStackTrace();
        }
 File file = new File("G:\\Projects\\test.zip");
        fin = new FileInputStream(file);
        byte fileContent[] = new byte[(int) file.length()];


        Security.addProvider(new BouncyCastleProvider());

        KeyStore ks = KeyStore.getInstance(KEYSTORE_INSTANCE);
        ks.load(new FileInputStream(KEYSTORE_FILE), KEYSTORE_PWD.toCharArray());
        Key key = ks.getKey(KEYSTORE_ALIAS, KEYSTORE_PWD.toCharArray());

        //Sign
        PrivateKey privKey = (PrivateKey) key;
        Signature signature = Signature.getInstance("SHA1WithRSA", "BC");
        signature.initSign(privKey);
        signature.update(fileContent);

        //Build CMS
        X509Certificate cert = (X509Certificate) ks.getCertificate(KEYSTORE_ALIAS);
        List certList = new ArrayList();
        CMSTypedData msg = new CMSProcessableByteArray(signature.sign());
        certList.add(cert);
        Store certs = new JcaCertStore(certList);
        CMSSignedDataGenerator gen = new CMSSignedDataGenerator();
        ContentSigner sha1Signer = new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(privKey);
        gen.addSignerInfoGenerator(new JcaSignerInfoGeneratorBuilder(new JcaDigestCalculatorProviderBuilder().setProvider("BC").build()).build(sha1Signer, cert));
        gen.addCertificates(certs);
        CMSSignedData sigData = gen.generate(msg, true);

        BASE64Encoder encoder = new BASE64Encoder();

        String signedContent = encoder.encode((byte[]) sigData.getSignedContent().getContent());
        System.out.println("Signed content: " + signedContent + "\n");

        String envelopedData = encoder.encode(sigData.getEncoded());
        System.out.println("Enveloped data: " + envelopedData);
在VOLKERK发表评论后:

如何生成签名+数据文件:

public static void main(String[] args) throws Exception {

        // String text = "This is a message";

        // File file = new
        // File("C:\\Users\\mayooranM\\Desktop\\SignatureVerificationTest\\ProcessExplorer.zip");
        // fin = new FileInputStream(file);
        // byte fileContent[] = new byte[(int) file.length()];

        Path filepath = Paths.get("G:\\IntelliJTestProjects\\googleplaces.zip");
        byte[] fileContent = Files.readAllBytes(filepath);

        Security.addProvider(new BouncyCastleProvider());

        KeyStore ks = KeyStore.getInstance(KEYSTORE_INSTANCE);
        ks.load(new FileInputStream(KEYSTORE_FILE), KEYSTORE_PWD.toCharArray());
        Key key = ks.getKey(KEYSTORE_ALIAS, KEYSTORE_PWD.toCharArray());

        // Sign
        PrivateKey privKey = (PrivateKey) key;
        Signature signature = Signature.getInstance("SHA1WithRSA", "BC");
        signature.initSign(privKey);
        signature.update(fileContent);

        // Build CMS
        X509Certificate cert = (X509Certificate) ks.getCertificate(KEYSTORE_ALIAS);
        List certList = new ArrayList();
        CMSTypedData msg = new CMSProcessableByteArray(signature.sign());
        certList.add(cert);
        Store certs = new JcaCertStore(certList);
        CMSSignedDataGenerator gen = new CMSSignedDataGenerator();
        ContentSigner sha1Signer = new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(privKey);
        gen.addSignerInfoGenerator(
                new JcaSignerInfoGeneratorBuilder(new JcaDigestCalculatorProviderBuilder().setProvider("BC").build())
                        .build(sha1Signer, cert));
        gen.addCertificates(certs);
        CMSSignedData sigData = gen.generate(msg, true);

        BASE64Encoder encoder = new BASE64Encoder();

        String signedContent = encoder.encode((byte[]) sigData.getSignedContent().getContent());
        System.out.println("Signed content: " + signedContent + "\n");

        String envelopedData = encoder.encode(sigData.getEncoded());
        System.out.println("Enveloped data: " + envelopedData);

        FileOutputStream fos = new FileOutputStream(
                "G:\\IntelliJTestProjects\\SignedZip.zip");
        fos.write(envelopedData.getBytes());
        fos.close();

    }
我如何验证数据:

public static void main(String[] args) {
        try {
            Security.addProvider(new BouncyCastleProvider());

            Path path = Paths
                    .get("G:\\IntelliJTestProjects\\SignedZip.zip");
            byte[] signedContent = Files.readAllBytes(path);

            String output = new String(signedContent);

            System.out.println("output: " + output);

            CMSSignedData cms = new CMSSignedData(Base64.decode(signedContent));
            Store store = cms.getCertificates();
            SignerInformationStore signers = cms.getSignerInfos();
            Collection c = signers.getSigners();
            Iterator it = c.iterator();
            while (it.hasNext()) {
                SignerInformation signer = (SignerInformation) it.next();
                Collection certCollection = store.getMatches(signer.getSID());
                Iterator certIt = certCollection.iterator();
                X509CertificateHolder certHolder = (X509CertificateHolder) certIt.next();
                X509Certificate cert = new JcaX509CertificateConverter().setProvider("BC").getCertificate(certHolder);
                if (signer.verify(new JcaSimpleSignerInfoVerifierBuilder().setProvider("BC").build(cert))) {
                    System.out.println("verified");
                }
            }

            CMSProcessable origData = cms.getSignedContent() ;
            byte[] originalContent  = (byte[]) origData.getContent();

             ZipInputStream zipStream = new ZipInputStream(new ByteArrayInputStream(originalContent));
                ZipEntry entry = null;
                while ((entry = zipStream.getNextEntry()) != null) {

                    String entryName = entry.getName();

                    FileOutputStream out = new FileOutputStream(entryName);

                    byte[] byteBuff = new byte[4096];
                    int bytesRead = 0;
                    while ((bytesRead = zipStream.read(byteBuff)) != -1)
                    {
                        out.write(byteBuff, 0, bytesRead);
                    }

                    out.close();
                    zipStream.closeEntry();
                }
                zipStream.close();

        } catch (Exception ex) {
            ex.printStackTrace();
        }
    }
第一部分 让我们从代码的一些转换开始。(我想知道答案能持续多久……)
第一步:这里没什么进展;只需设置“框架”-正如您所看到的:是的,我正在运行/测试代码;-)

第二步:这可能是最难的;使代码看起来最不像您的代码的转换。慢慢来了解我在这里做什么。我想去掉一些不必要的东西(例如Base64编码器),并获得更精简的代码。这使得调试更加困难,因为我删除了大多数临时变量,“隐藏”在初始值设定项块中(doh,该特性的正确名称是什么?)

步骤4:将完整内容读入内存。对于大型输入文件,这可能不是一个好主意

private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {                
        CMSSignedDataGenerator gen = new CMSSignedDataGenerator() {
        ...
        };
        // see https://www.bouncycastle.org/docs/pkixdocs1.4/org/bouncycastle/cms/CMSProcessableFile.html
        CMSProcessableFile msg = new CMSProcessableFile(srcfile.toFile());
        CMSSignedData sigData = gen.generate(msg, true);
        // write raw data instead of base64
        target.write(sigData.getEncoded());
    }
步骤5:再次使用内存:
gen.generate(msg,true)
true
参数表示完整的msg包含在asn1结构中。当您调用
.getEncoded()
时,您会得到一个完整asn1结构的字节数组,也就是说,您的内存中又有了完整的文件。RAM很便宜,但我们还是尽量避免。还有另一台发电机,它似乎能提供我们所需要的。您不需要处理字节数组,而是给它一个OutputStream,它可以将结果写入其中,然后您可以得到OutputStream,您可以将内容写入其中:

private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {                
    CMSSignedDataStreamGenerator gen = new CMSSignedDataStreamGenerator() {
        {
            addSignerInfoGenerator(
                    new JcaSignerInfoGeneratorBuilder(
                            new JcaDigestCalculatorProviderBuilder().setProvider("BC").build()
                    ).build(
                            new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(creds.getPrivateKey()),
                            creds.getCertificate()
                    )
            );
            addCertificates(new JcaCertStore(new ArrayList<X509Certificate>() {
                {
                    add(creds.getCertificate());
                }
            }));
        }
    };
    try (OutputStream sigOut = gen.open(target, true)) {
        Files.copy(srcfile, sigOut);
    }
}
private static void createSignature(路径srcfile、X500PrivateCredential creds、FileOutputStream目标)引发异常{
CMSSignedDataStreamGenerator gen=新的CMSSignedDataStreamGenerator(){
{
地址信号发生器(
新JcaSignerInfoGeneratorBuilder(
新建JcaDigestCalculatorProviderBuilder().setProvider(“BC”).build()
).建造(
新的JcaContentSignerBuilder(“SHA1withRSA”).setProvider(“BC”).build(creds.getPrivateKey()),
creds.getCertificate()
)
);
addCertificates(新JcaCertStore(新ArrayList)(){
{
添加(creds.getCertificate());
}
}));
}
};
try(OutputStream sigOut=gen.open(target,true)){
文件。复制(srcfile,sigOut);
}
}
创建签名消息就到此为止。我将在另一个答案中发布验证部分-但必须为现实工作/谋生一段时间

编辑:可能还有空间发布完整/最终的示例类

public class SignedDataTest {

    private static final File KEYSTORE_FILE = new File("c:\\temp\\Software_View_Certificate_Authority.p12");
    private static final String KEYSTORE_TYPE = "pkcs12";
    private static final char[] KEYSTORE_PWD = "foobar".toCharArray();
    private static final String KEYSTORE_ALIAS = "Software View Certificate Authority";

    private static final Path CONTENT_SRC_PATH = Paths.get("c:\\temp\\Londo Buttons are melting.m4v");
    private static final Path CONTENT_TARGET_PATH = Paths.get("c:\\temp\\Londo Buttons are melting-retrieved.m4v");
    private static final Path SIGNEDDATA_TARGET_PATH = Paths.get("c:\\temp\\Londo Buttons are melting-retrieved.m4v.signed.pkcs7");

    public static void main(String[] args) throws Exception {
        Security.addProvider(new BouncyCastleProvider());
        doForth();
        //doBack();
    }

    private static void doForth() throws Exception {
        KeyStore ks = KeyStore.getInstance(KEYSTORE_TYPE, "BC");
        ks.load(new FileInputStream(KEYSTORE_FILE), KEYSTORE_PWD);
        X500PrivateCredential creds = new X500PrivateCredential(
                (X509Certificate) ks.getCertificate(KEYSTORE_ALIAS),
                (PrivateKey) ks.getKey(KEYSTORE_ALIAS, KEYSTORE_PWD)
        );
        createSignature(CONTENT_SRC_PATH, creds, new FileOutputStream(SIGNEDDATA_TARGET_PATH.toFile()));
    }

    private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {                
        CMSSignedDataStreamGenerator gen = new CMSSignedDataStreamGenerator() {
            {
                addSignerInfoGenerator(
                        new JcaSignerInfoGeneratorBuilder(
                                new JcaDigestCalculatorProviderBuilder().setProvider("BC").build()
                        ).build(
                                new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(creds.getPrivateKey()),
                                creds.getCertificate()
                        )
                );
                addCertificates(new JcaCertStore(new ArrayList<X509Certificate>() {
                    {
                        add(creds.getCertificate());
                    }
                }));
            }
        };
        try (OutputStream sigOut = gen.open(target, true)) {
            Files.copy(srcfile, sigOut);
        }
    }
}
公共类签名数据测试{
私有静态最终文件密钥库\文件=新文件(“c:\\temp\\Software\视图\证书\授权机构.p12”);
私有静态最终字符串KEYSTORE_TYPE=“pkcs12”;
私有静态final char[]KEYSTORE_PWD=“foobar”.toCharArray();
私有静态最终字符串KEYSTORE_ALIAS=“软件视图证书颁发机构”;
私有静态最终路径内容\u SRC\u Path=Paths.get(“c:\\temp\\Londo按钮正在熔化.m4v”);
私有静态最终路径内容\u目标\u路径=路径.get(“c:\\temp\\Londo按钮被检索到。m4v”);
私有静态最终路径SIGNEDDATA\u TARGET\u Path=Paths.get(“c:\\temp\\Londo按钮被检索。m4v.signed.pkcs7”);
公共静态void main(字符串[]args)引发异常{
addProvider(新的BouncyCastleProvider());
多福思();
//多巴克();
}
私有静态void doForth()引发异常{
KeyStore ks=KeyStore.getInstance(KeyStore_类型,“BC”);
加载(新文件输入流(KEYSTORE\u文件),KEYSTORE\u PWD);
X500私人凭证凭证=新X500私人凭证(
(X509Certificate)ks.getCertificate(密钥库别名),
(PrivateKey)ks.getKey(密钥库别名,密钥库密码)
);
createSignature(CONTENT_SRC_PATH,creds,newfileoutputstream(SIGNEDDATA_TARGET_PATH.toFile());
}
私有静态void createSignature(路径srcfile、X500私有凭据creds、FileOutputStream目标)引发异常{
CMSSignedDataStreamGenerator gen=新的CMSSignedDataStreamGenerator(){
{
地址信号发生器(
新JcaSignerInfoGeneratorBuilder(
新建JcaDigestCalculatorProviderBuilder().setProvider(“BC”).build()
).建造(
新的JcaContentSignerBuilder(“SHA1withRSA”).setProvider(“BC”).build(creds.getPrivateKey()),
creds.getCertificate()
)
);
addCertificates(新JcaCertStore(新ArrayList)(){
{
添加(creds.getCertificate());
}
}));
}
};
try(OutputStream sigOut=gen.open(target,true)){
文件。复制(srcfile,sigOut);
}
}
}
第1部分 让我们从代码的一些转换开始。(我想知道答案能持续多久……)
第一步:这里没什么进展;只需设置“框架”-正如您所看到的:是的,我正在运行/测试代码;-)

第二步:这可能是最难的;使代码看起来最不像您的代码的转换。慢慢来了解我在这里做什么。我想去掉一些不必要的东西(例如Base64编码器),并获得更精简的代码。这使得调试有点困难
private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {                
        CMSSignedDataGenerator gen = new CMSSignedDataGenerator() {
        ...
        };
        // see https://www.bouncycastle.org/docs/pkixdocs1.4/org/bouncycastle/cms/CMSProcessableFile.html
        CMSProcessableFile msg = new CMSProcessableFile(srcfile.toFile());
        CMSSignedData sigData = gen.generate(msg, true);
        // write raw data instead of base64
        target.write(sigData.getEncoded());
    }
private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {                
    CMSSignedDataStreamGenerator gen = new CMSSignedDataStreamGenerator() {
        {
            addSignerInfoGenerator(
                    new JcaSignerInfoGeneratorBuilder(
                            new JcaDigestCalculatorProviderBuilder().setProvider("BC").build()
                    ).build(
                            new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(creds.getPrivateKey()),
                            creds.getCertificate()
                    )
            );
            addCertificates(new JcaCertStore(new ArrayList<X509Certificate>() {
                {
                    add(creds.getCertificate());
                }
            }));
        }
    };
    try (OutputStream sigOut = gen.open(target, true)) {
        Files.copy(srcfile, sigOut);
    }
}
public class SignedDataTest {

    private static final File KEYSTORE_FILE = new File("c:\\temp\\Software_View_Certificate_Authority.p12");
    private static final String KEYSTORE_TYPE = "pkcs12";
    private static final char[] KEYSTORE_PWD = "foobar".toCharArray();
    private static final String KEYSTORE_ALIAS = "Software View Certificate Authority";

    private static final Path CONTENT_SRC_PATH = Paths.get("c:\\temp\\Londo Buttons are melting.m4v");
    private static final Path CONTENT_TARGET_PATH = Paths.get("c:\\temp\\Londo Buttons are melting-retrieved.m4v");
    private static final Path SIGNEDDATA_TARGET_PATH = Paths.get("c:\\temp\\Londo Buttons are melting-retrieved.m4v.signed.pkcs7");

    public static void main(String[] args) throws Exception {
        Security.addProvider(new BouncyCastleProvider());
        doForth();
        //doBack();
    }

    private static void doForth() throws Exception {
        KeyStore ks = KeyStore.getInstance(KEYSTORE_TYPE, "BC");
        ks.load(new FileInputStream(KEYSTORE_FILE), KEYSTORE_PWD);
        X500PrivateCredential creds = new X500PrivateCredential(
                (X509Certificate) ks.getCertificate(KEYSTORE_ALIAS),
                (PrivateKey) ks.getKey(KEYSTORE_ALIAS, KEYSTORE_PWD)
        );
        createSignature(CONTENT_SRC_PATH, creds, new FileOutputStream(SIGNEDDATA_TARGET_PATH.toFile()));
    }

    private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {                
        CMSSignedDataStreamGenerator gen = new CMSSignedDataStreamGenerator() {
            {
                addSignerInfoGenerator(
                        new JcaSignerInfoGeneratorBuilder(
                                new JcaDigestCalculatorProviderBuilder().setProvider("BC").build()
                        ).build(
                                new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(creds.getPrivateKey()),
                                creds.getCertificate()
                        )
                );
                addCertificates(new JcaCertStore(new ArrayList<X509Certificate>() {
                    {
                        add(creds.getCertificate());
                    }
                }));
            }
        };
        try (OutputStream sigOut = gen.open(target, true)) {
            Files.copy(srcfile, sigOut);
        }
    }
}
public class SignedDataTest {
  ... see Part 1

    private static void verify(Path signedFile, Path extractToFile) throws Exception {
        FileInputStream fis = new FileInputStream(signedFile.toFile());

        DigestCalculatorProvider build = new JcaDigestCalculatorProviderBuilder().setProvider("BC").build();
        CMSSignedDataParser sp = new CMSSignedDataParser(build, fis);

        // we have to read the whole stream sp.getSignedContent().getContentStream()
        // just copy it to the target file
        Files.copy(sp.getSignedContent().getContentStream(), extractToFile, StandardCopyOption.REPLACE_EXISTING);
        // now we can go on with the other stuff.....

        Store certStore = sp.getCertificates();
        // the examples create a new instance of this for each certificate. 
        // I don't think that's necessary, but you might want to look into that...
        JcaSimpleSignerInfoVerifierBuilder verifier = new JcaSimpleSignerInfoVerifierBuilder().setProvider("BC");

        for (Object objSigner : sp.getSignerInfos().getSigners()) {
            SignerInformation signer = (SignerInformation) objSigner;
            // as I understand it, there should be only one match ....but anyways....
            for (Object objMatch : certStore.getMatches(signer.getSID())) {
                X509CertificateHolder certHolder = (X509CertificateHolder) objMatch;
                System.out.print("verifying against " + certHolder.getSubject().toString());
                if (signer.verify(verifier.build(certHolder))) {
                    System.out.println(": verified");
                } else {
                    System.out.println(": no match");
                }
            }
        }
    }
}
public class SignedDataTest {

    private static final File KEYSTORE_FILE = new File("c:\\temp\\Software_View_Certificate_Authority.p12");
    private static final String KEYSTORE_TYPE = "pkcs12";
    private static final char[] KEYSTORE_PWD = "foobar".toCharArray();
    private static final String KEYSTORE_ALIAS = "Software View Certificate Authority";

    private static final Path CONTENT_SRC_PATH = Paths.get("c:\\temp\\test.txt");
    private static final Path CONTENT_TARGET_PATH = Paths.get("c:\\temp\\test-retrieved.txt");
    private static final Path SIGNEDDATA_TARGET_PATH = Paths.get("c:\\temp\\test.txt.signed.pkcs7");

    public static void main(String[] args) throws Exception {
        Security.addProvider(new BouncyCastleProvider());
        doForth();
        andBack();
    }

    private static void doForth() throws Exception {
        KeyStore ks = KeyStore.getInstance(KEYSTORE_TYPE, "BC");
        ks.load(new FileInputStream(KEYSTORE_FILE), KEYSTORE_PWD);
        X500PrivateCredential creds = new X500PrivateCredential(
                (X509Certificate) ks.getCertificate(KEYSTORE_ALIAS),
                (PrivateKey) ks.getKey(KEYSTORE_ALIAS, KEYSTORE_PWD)
        );
        createSignature(CONTENT_SRC_PATH, creds, new FileOutputStream(SIGNEDDATA_TARGET_PATH.toFile()));
    }

    private static void andBack() throws Exception {
        KeyStore msCertStore = KeyStore.getInstance("Windows-MY", "SunMSCAPI");
        msCertStore.load(null, null);
        SignerInformationVerifier verifier = new JcaSimpleSignerInfoVerifierBuilder().setProvider("SunMSCAPI")
                .build(((X509Certificate) msCertStore.getCertificate("Software View Certificate Authority")));
        verify(SIGNEDDATA_TARGET_PATH, CONTENT_TARGET_PATH, verifier);
    }

    private static void verify(Path signedFile, Path extractToFile, SignerInformationVerifier verifier) throws Exception {
        FileInputStream fis = new FileInputStream(signedFile.toFile());

        DigestCalculatorProvider build = new JcaDigestCalculatorProviderBuilder().setProvider("BC").build();
        CMSSignedDataParser sp = new CMSSignedDataParser(build, fis);

        // we have to read the whole stream sp.getSignedContent().getContentStream()
        // just copy it to the target file
        Files.copy(sp.getSignedContent().getContentStream(), extractToFile, StandardCopyOption.REPLACE_EXISTING);
        // now we can go on with the other stuff.....

        Store certStore = sp.getCertificates();
        // the examples create a new instance of this for each certificate. 
        // I don't think that's necessary, but you might want to look into that...

        for (Object objSigner : sp.getSignerInfos().getSigners()) {
            SignerInformation signer = (SignerInformation) objSigner;
            if (signer.verify(verifier)) {
                System.out.println("verified");
                // now(!) you want to keep the target content file
            } else {
                // actually a "org.bouncycastle.cms.CMSSignerDigestMismatchException: message-digest attribute value does not match calculated value"
                // exception will be thrown in case the contents has been altered
                // So, you will need a try-catch(-finally?) construct to delete the target contents file in such cases....
                System.out.println("no match");
            }
        }
    }

    private static void createSignature(Path srcfile, X500PrivateCredential creds, FileOutputStream target) throws Exception {
        CMSSignedDataStreamGenerator gen = new CMSSignedDataStreamGenerator() {
            {
                addSignerInfoGenerator(
                        new JcaSignerInfoGeneratorBuilder(
                                new JcaDigestCalculatorProviderBuilder().setProvider("BC").build()
                        ).build(
                                new JcaContentSignerBuilder("SHA1withRSA").setProvider("BC").build(creds.getPrivateKey()),
                                creds.getCertificate()
                        )
                );
                addCertificates(new JcaCertStore(new ArrayList<X509Certificate>() {
                    {
                        add(creds.getCertificate());
                    }
                }));
            }
        };
        try (OutputStream sigOut = gen.open(target, true)) {
            Files.copy(srcfile, sigOut);
        }
    }
}