using System;
using System.Security.Cryptography;
using System.Security.Cryptography.Pkcs;
using System.Security.Cryptography.X509Certificates;
namespace System.Security.Cryptography.Pkcs {
public sealed class Rfc3161TimestampRequest {
public bool HasExtensions {
get {
throw new PlatformNotSupportedException ();
}
}
public Oid HashAlgorithmId {
get {
throw new PlatformNotSupportedException ();
}
}
public Oid RequestedPolicyId {
get {
throw new PlatformNotSupportedException ();
}
}
public bool RequestSignerCertificate {
get {
throw new PlatformNotSupportedException ();
}
}
public int Version {
get {
throw new PlatformNotSupportedException ();
}
}
internal Rfc3161TimestampRequest () {
throw new PlatformNotSupportedException ();
}
///
///
///
///
///
///
public static Rfc3161TimestampRequest CreateFromData (ReadOnlySpan data, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) {
throw new PlatformNotSupportedException ();
}
///
///
///
///
///
///
public static Rfc3161TimestampRequest CreateFromHash (ReadOnlyMemory hash, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) {
throw new PlatformNotSupportedException ();
}
/// Create a timestamp request using a pre-computed hash value.
/// The pre-computed hash value to be timestamped.
/// The Object Identifier (OID) for the hash algorithm that produced .
/// The Object Identifier (OID) for a timestamp policy the Timestamp Authority (TSA) should use, or to express no preference.
/// An optional nonce (number used once) to uniquely identify this request to pair it with the response. The value is interpreted as an unsigned big-endian integer and may be normalized to the encoding format.
///
/// to indicate the Timestamp Authority (TSA) must include the signing certificate in the issued timestamp token; otherwise, .
/// RFC3161 extensions to present with the request.
/// An representing the chosen values.
public static Rfc3161TimestampRequest CreateFromHash (ReadOnlyMemory hash, Oid hashAlgorithmId, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) {
throw new PlatformNotSupportedException ();
}
///
///
///
///
///
///
public static Rfc3161TimestampRequest CreateFromSignerInfo (SignerInfo signerInfo, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) {
throw new PlatformNotSupportedException ();
}
public byte[] Encode () {
throw new PlatformNotSupportedException ();
}
public X509ExtensionCollection GetExtensions () {
throw new PlatformNotSupportedException ();
}
public ReadOnlyMemory GetMessageHash () {
throw new PlatformNotSupportedException ();
}
public ReadOnlyMemory? GetNonce () {
throw new PlatformNotSupportedException ();
}
///
///
public Rfc3161TimestampToken ProcessResponse (ReadOnlyMemory responseBytes, out int bytesConsumed) {
throw new PlatformNotSupportedException ();
}
///
///
///
public static bool TryDecode (ReadOnlyMemory encodedBytes, out Rfc3161TimestampRequest request, out int bytesConsumed) {
throw new PlatformNotSupportedException ();
}
///
///
public bool TryEncode (Span destination, out int bytesWritten) {
throw new PlatformNotSupportedException ();
}
}
}