using System; using System.Security.Cryptography; using System.Security.Cryptography.Pkcs; using System.Security.Cryptography.X509Certificates; namespace System.Security.Cryptography.Pkcs { public sealed class Rfc3161TimestampRequest { public bool HasExtensions { get { throw new PlatformNotSupportedException (); } } public Oid HashAlgorithmId { get { throw new PlatformNotSupportedException (); } } public Oid RequestedPolicyId { get { throw new PlatformNotSupportedException (); } } public bool RequestSignerCertificate { get { throw new PlatformNotSupportedException (); } } public int Version { get { throw new PlatformNotSupportedException (); } } internal Rfc3161TimestampRequest () { throw new PlatformNotSupportedException (); } /// /// /// /// /// /// public static Rfc3161TimestampRequest CreateFromData (ReadOnlySpan data, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { throw new PlatformNotSupportedException (); } /// /// /// /// /// /// public static Rfc3161TimestampRequest CreateFromHash (ReadOnlyMemory hash, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { throw new PlatformNotSupportedException (); } /// Create a timestamp request using a pre-computed hash value. /// The pre-computed hash value to be timestamped. /// The Object Identifier (OID) for the hash algorithm that produced . /// The Object Identifier (OID) for a timestamp policy the Timestamp Authority (TSA) should use, or to express no preference. /// An optional nonce (number used once) to uniquely identify this request to pair it with the response. The value is interpreted as an unsigned big-endian integer and may be normalized to the encoding format. /// /// to indicate the Timestamp Authority (TSA) must include the signing certificate in the issued timestamp token; otherwise, . /// RFC3161 extensions to present with the request. /// An representing the chosen values. public static Rfc3161TimestampRequest CreateFromHash (ReadOnlyMemory hash, Oid hashAlgorithmId, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { throw new PlatformNotSupportedException (); } /// /// /// /// /// /// public static Rfc3161TimestampRequest CreateFromSignerInfo (SignerInfo signerInfo, HashAlgorithmName hashAlgorithm, Oid requestedPolicyId = null, ReadOnlyMemory? nonce = default(ReadOnlyMemory?), bool requestSignerCertificates = false, X509ExtensionCollection extensions = null) { throw new PlatformNotSupportedException (); } public byte[] Encode () { throw new PlatformNotSupportedException (); } public X509ExtensionCollection GetExtensions () { throw new PlatformNotSupportedException (); } public ReadOnlyMemory GetMessageHash () { throw new PlatformNotSupportedException (); } public ReadOnlyMemory? GetNonce () { throw new PlatformNotSupportedException (); } /// /// public Rfc3161TimestampToken ProcessResponse (ReadOnlyMemory responseBytes, out int bytesConsumed) { throw new PlatformNotSupportedException (); } /// /// /// public static bool TryDecode (ReadOnlyMemory encodedBytes, out Rfc3161TimestampRequest request, out int bytesConsumed) { throw new PlatformNotSupportedException (); } /// /// public bool TryEncode (Span destination, out int bytesWritten) { throw new PlatformNotSupportedException (); } } }