2016-04-12 13:19:31 -04:00
|
|
|
//
|
|
|
|
// X509Certificate2ImplMono
|
|
|
|
//
|
|
|
|
// Authors:
|
|
|
|
// Sebastien Pouliot <sebastien@xamarin.com>
|
|
|
|
// Martin Baulig <martin.baulig@xamarin.com>
|
|
|
|
//
|
|
|
|
// (C) 2003 Motus Technologies Inc. (http://www.motus.com)
|
|
|
|
// Copyright (C) 2004-2006 Novell Inc. (http://www.novell.com)
|
|
|
|
// Copyright (C) 2015-2016 Xamarin, Inc. (http://www.xamarin.com)
|
|
|
|
//
|
|
|
|
// Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
// a copy of this software and associated documentation files (the
|
|
|
|
// "Software"), to deal in the Software without restriction, including
|
|
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
// distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
// permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
// the following conditions:
|
|
|
|
//
|
|
|
|
// The above copyright notice and this permission notice shall be
|
|
|
|
// included in all copies or substantial portions of the Software.
|
|
|
|
//
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
//
|
|
|
|
|
|
|
|
#if SECURITY_DEP
|
|
|
|
|
|
|
|
#if MONO_SECURITY_ALIAS
|
|
|
|
extern alias MonoSecurity;
|
|
|
|
using MonoSecurity::Mono.Security;
|
|
|
|
using MonoSecurity::Mono.Security.Cryptography;
|
|
|
|
using MX = MonoSecurity::Mono.Security.X509;
|
|
|
|
#else
|
|
|
|
using Mono.Security;
|
|
|
|
using Mono.Security.Cryptography;
|
|
|
|
using MX = Mono.Security.X509;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
using System.IO;
|
|
|
|
using System.Text;
|
|
|
|
using System.Collections;
|
|
|
|
|
|
|
|
namespace System.Security.Cryptography.X509Certificates
|
|
|
|
{
|
|
|
|
internal class X509Certificate2ImplMono : X509Certificate2Impl
|
|
|
|
{
|
|
|
|
bool _archived;
|
|
|
|
X509ExtensionCollection _extensions;
|
|
|
|
string _serial;
|
|
|
|
PublicKey _publicKey;
|
|
|
|
X500DistinguishedName issuer_name;
|
|
|
|
X500DistinguishedName subject_name;
|
|
|
|
Oid signature_algorithm;
|
|
|
|
|
|
|
|
MX.X509Certificate _cert;
|
|
|
|
|
|
|
|
static string empty_error = Locale.GetText ("Certificate instance is empty.");
|
|
|
|
|
|
|
|
public override bool IsValid {
|
|
|
|
get {
|
|
|
|
return _cert != null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override IntPtr Handle {
|
|
|
|
get { return IntPtr.Zero; }
|
|
|
|
}
|
|
|
|
|
2016-04-28 08:44:23 -04:00
|
|
|
public override IntPtr GetNativeAppleCertificate ()
|
|
|
|
{
|
|
|
|
return IntPtr.Zero;
|
|
|
|
}
|
|
|
|
|
2016-04-12 13:19:31 -04:00
|
|
|
internal X509Certificate2ImplMono (MX.X509Certificate cert)
|
|
|
|
{
|
|
|
|
this._cert = cert;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override X509CertificateImpl Clone ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return new X509Certificate2ImplMono (_cert);
|
|
|
|
}
|
|
|
|
|
|
|
|
#region Implemented X509CertificateImpl members
|
|
|
|
|
|
|
|
public override string GetIssuerName (bool legacyV1Mode)
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
if (legacyV1Mode)
|
|
|
|
return _cert.IssuerName;
|
|
|
|
else
|
|
|
|
return MX.X501.ToString (_cert.GetIssuerName (), true, ", ", true);
|
|
|
|
}
|
|
|
|
|
|
|
|
public override string GetSubjectName (bool legacyV1Mode)
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
if (legacyV1Mode)
|
|
|
|
return _cert.SubjectName;
|
|
|
|
else
|
|
|
|
return MX.X501.ToString (_cert.GetSubjectName (), true, ", ", true);
|
|
|
|
}
|
|
|
|
|
|
|
|
public override byte[] GetRawCertData ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.RawData;
|
|
|
|
}
|
|
|
|
|
|
|
|
protected override byte[] GetCertHash (bool lazy)
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
SHA1 sha = SHA1.Create ();
|
|
|
|
return sha.ComputeHash (_cert.RawData);
|
|
|
|
}
|
|
|
|
|
|
|
|
public override DateTime GetValidFrom ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.ValidFrom;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override DateTime GetValidUntil ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.ValidUntil;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override bool Equals (X509CertificateImpl other, out bool result)
|
|
|
|
{
|
|
|
|
// Use default implementation
|
|
|
|
result = false;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override string GetKeyAlgorithm ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.KeyAlgorithm;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override byte[] GetKeyAlgorithmParameters ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.KeyAlgorithmParameters;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override byte[] GetPublicKey ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.PublicKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override byte[] GetSerialNumber ()
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
return _cert.SerialNumber;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override byte[] Export (X509ContentType contentType, byte[] password)
|
|
|
|
{
|
|
|
|
ThrowIfContextInvalid ();
|
|
|
|
|
|
|
|
switch (contentType) {
|
|
|
|
case X509ContentType.Cert:
|
|
|
|
return GetRawCertData ();
|
|
|
|
case X509ContentType.Pfx: // this includes Pkcs12
|
|
|
|
// TODO
|
|
|
|
throw new NotSupportedException ();
|
|
|
|
case X509ContentType.SerializedCert:
|
|
|
|
// TODO
|
|
|
|
throw new NotSupportedException ();
|
|
|
|
default:
|
|
|
|
string msg = Locale.GetText ("This certificate format '{0}' cannot be exported.", contentType);
|
|
|
|
throw new CryptographicException (msg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#endregion
|
|
|
|
|
|
|
|
// constructors
|
|
|
|
|
|
|
|
public X509Certificate2ImplMono ()
|
|
|
|
{
|
|
|
|
_cert = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// properties
|
|
|
|
|
|
|
|
public override bool Archived {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
return _archived;
|
|
|
|
}
|
|
|
|
set {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
_archived = value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override X509ExtensionCollection Extensions {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
if (_extensions == null)
|
|
|
|
_extensions = new X509ExtensionCollection (_cert);
|
|
|
|
return _extensions;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME - Could be more efficient
|
|
|
|
public override bool HasPrivateKey {
|
|
|
|
get { return PrivateKey != null; }
|
|
|
|
}
|
|
|
|
|
|
|
|
public override X500DistinguishedName IssuerName {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
if (issuer_name == null)
|
|
|
|
issuer_name = new X500DistinguishedName (_cert.GetIssuerName ().GetBytes ());
|
|
|
|
return issuer_name;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override AsymmetricAlgorithm PrivateKey {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
try {
|
|
|
|
if (_cert.RSA != null) {
|
|
|
|
RSACryptoServiceProvider rcsp = _cert.RSA as RSACryptoServiceProvider;
|
|
|
|
if (rcsp != null)
|
|
|
|
return rcsp.PublicOnly ? null : rcsp;
|
|
|
|
|
|
|
|
RSAManaged rsam = _cert.RSA as RSAManaged;
|
|
|
|
if (rsam != null)
|
|
|
|
return rsam.PublicOnly ? null : rsam;
|
|
|
|
|
|
|
|
_cert.RSA.ExportParameters (true);
|
|
|
|
return _cert.RSA;
|
|
|
|
} else if (_cert.DSA != null) {
|
|
|
|
DSACryptoServiceProvider dcsp = _cert.DSA as DSACryptoServiceProvider;
|
|
|
|
if (dcsp != null)
|
|
|
|
return dcsp.PublicOnly ? null : dcsp;
|
|
|
|
|
|
|
|
_cert.DSA.ExportParameters (true);
|
|
|
|
return _cert.DSA;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
set {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
|
|
|
|
// allow NULL so we can "forget" the key associated to the certificate
|
|
|
|
// e.g. in case we want to export it in another format (see bug #396620)
|
|
|
|
if (value == null) {
|
|
|
|
_cert.RSA = null;
|
|
|
|
_cert.DSA = null;
|
|
|
|
} else if (value is RSA)
|
|
|
|
_cert.RSA = (RSA) value;
|
|
|
|
else if (value is DSA)
|
|
|
|
_cert.DSA = (DSA) value;
|
|
|
|
else
|
|
|
|
throw new NotSupportedException ();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override PublicKey PublicKey {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
|
|
|
|
if (_publicKey == null) {
|
|
|
|
try {
|
|
|
|
_publicKey = new PublicKey (_cert);
|
|
|
|
}
|
|
|
|
catch (Exception e) {
|
|
|
|
string msg = Locale.GetText ("Unable to decode public key.");
|
|
|
|
throw new CryptographicException (msg, e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return _publicKey;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override Oid SignatureAlgorithm {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
|
|
|
|
if (signature_algorithm == null)
|
|
|
|
signature_algorithm = new Oid (_cert.SignatureAlgorithm);
|
|
|
|
return signature_algorithm;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override X500DistinguishedName SubjectName {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
|
|
|
|
if (subject_name == null)
|
|
|
|
subject_name = new X500DistinguishedName (_cert.GetSubjectName ().GetBytes ());
|
|
|
|
return subject_name;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override int Version {
|
|
|
|
get {
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
return _cert.Version;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// methods
|
|
|
|
|
|
|
|
[MonoTODO ("always return String.Empty for UpnName, DnsFromAlternativeName and UrlName")]
|
|
|
|
public override string GetNameInfo (X509NameType nameType, bool forIssuer)
|
|
|
|
{
|
|
|
|
switch (nameType) {
|
|
|
|
case X509NameType.SimpleName:
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
// return CN= or, if missing, the first part of the DN
|
|
|
|
ASN1 sn = forIssuer ? _cert.GetIssuerName () : _cert.GetSubjectName ();
|
|
|
|
ASN1 dn = Find (commonName, sn);
|
|
|
|
if (dn != null)
|
|
|
|
return GetValueAsString (dn);
|
|
|
|
if (sn.Count == 0)
|
|
|
|
return String.Empty;
|
|
|
|
ASN1 last_entry = sn [sn.Count - 1];
|
|
|
|
if (last_entry.Count == 0)
|
|
|
|
return String.Empty;
|
|
|
|
return GetValueAsString (last_entry [0]);
|
|
|
|
case X509NameType.EmailName:
|
|
|
|
// return the E= part of the DN (if present)
|
|
|
|
ASN1 e = Find (email, forIssuer ? _cert.GetIssuerName () : _cert.GetSubjectName ());
|
|
|
|
if (e != null)
|
|
|
|
return GetValueAsString (e);
|
|
|
|
return String.Empty;
|
|
|
|
case X509NameType.UpnName:
|
|
|
|
// FIXME - must find/create test case
|
|
|
|
return String.Empty;
|
|
|
|
case X509NameType.DnsName:
|
|
|
|
// return the CN= part of the DN (if present)
|
|
|
|
ASN1 cn = Find (commonName, forIssuer ? _cert.GetIssuerName () : _cert.GetSubjectName ());
|
|
|
|
if (cn != null)
|
|
|
|
return GetValueAsString (cn);
|
|
|
|
return String.Empty;
|
|
|
|
case X509NameType.DnsFromAlternativeName:
|
|
|
|
// FIXME - must find/create test case
|
|
|
|
return String.Empty;
|
|
|
|
case X509NameType.UrlName:
|
|
|
|
// FIXME - must find/create test case
|
|
|
|
return String.Empty;
|
|
|
|
default:
|
|
|
|
throw new ArgumentException ("nameType");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static byte[] commonName = { 0x55, 0x04, 0x03 };
|
|
|
|
static byte[] email = { 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x01 };
|
|
|
|
|
|
|
|
private ASN1 Find (byte[] oid, ASN1 dn)
|
|
|
|
{
|
|
|
|
if (dn.Count == 0)
|
|
|
|
return null;
|
|
|
|
|
|
|
|
// process SET
|
|
|
|
for (int i = 0; i < dn.Count; i++) {
|
|
|
|
ASN1 set = dn [i];
|
|
|
|
for (int j = 0; j < set.Count; j++) {
|
|
|
|
ASN1 pair = set [j];
|
|
|
|
if (pair.Count != 2)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
ASN1 poid = pair [0];
|
|
|
|
if (poid == null)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (poid.CompareValue (oid))
|
|
|
|
return pair;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
private string GetValueAsString (ASN1 pair)
|
|
|
|
{
|
|
|
|
if (pair.Count != 2)
|
|
|
|
return String.Empty;
|
|
|
|
|
|
|
|
ASN1 value = pair [1];
|
|
|
|
if ((value.Value == null) || (value.Length == 0))
|
|
|
|
return String.Empty;
|
|
|
|
|
|
|
|
if (value.Tag == 0x1E) {
|
|
|
|
// BMPSTRING
|
|
|
|
StringBuilder sb = new StringBuilder ();
|
|
|
|
for (int j = 1; j < value.Value.Length; j += 2)
|
|
|
|
sb.Append ((char)value.Value [j]);
|
|
|
|
return sb.ToString ();
|
|
|
|
} else {
|
|
|
|
return Encoding.UTF8.GetString (value.Value);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private MX.X509Certificate ImportPkcs12 (byte[] rawData, string password)
|
|
|
|
{
|
|
|
|
MX.PKCS12 pfx = null;
|
|
|
|
if (string.IsNullOrEmpty (password)) {
|
|
|
|
try {
|
|
|
|
// Support both unencrypted PKCS#12..
|
|
|
|
pfx = new MX.PKCS12 (rawData, (string)null);
|
|
|
|
} catch {
|
|
|
|
// ..and PKCS#12 encrypted with an empty password
|
|
|
|
pfx = new MX.PKCS12 (rawData, string.Empty);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pfx = new MX.PKCS12 (rawData, password);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pfx.Certificates.Count == 0) {
|
|
|
|
// no certificate was found
|
|
|
|
return null;
|
|
|
|
} else if (pfx.Keys.Count == 0) {
|
|
|
|
// no key were found - pick the first certificate
|
|
|
|
return pfx.Certificates [0];
|
|
|
|
} else {
|
|
|
|
// find the certificate that match the first key
|
|
|
|
MX.X509Certificate cert = null;
|
|
|
|
var keypair = (pfx.Keys [0] as AsymmetricAlgorithm);
|
|
|
|
string pubkey = keypair.ToXmlString (false);
|
|
|
|
foreach (var c in pfx.Certificates) {
|
|
|
|
if (((c.RSA != null) && (pubkey == c.RSA.ToXmlString (false))) ||
|
|
|
|
((c.DSA != null) && (pubkey == c.DSA.ToXmlString (false)))) {
|
|
|
|
cert = c;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (cert == null) {
|
|
|
|
cert = pfx.Certificates [0]; // no match, pick first certificate without keys
|
|
|
|
} else {
|
|
|
|
cert.RSA = (keypair as RSA);
|
|
|
|
cert.DSA = (keypair as DSA);
|
|
|
|
}
|
|
|
|
return cert;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
[MonoTODO ("missing KeyStorageFlags support")]
|
|
|
|
public override void Import (byte[] rawData, string password, X509KeyStorageFlags keyStorageFlags)
|
|
|
|
{
|
|
|
|
MX.X509Certificate cert = null;
|
|
|
|
if (password == null) {
|
|
|
|
try {
|
|
|
|
cert = new MX.X509Certificate (rawData);
|
|
|
|
}
|
|
|
|
catch (Exception e) {
|
|
|
|
try {
|
|
|
|
cert = ImportPkcs12 (rawData, null);
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
string msg = Locale.GetText ("Unable to decode certificate.");
|
|
|
|
// inner exception is the original (not second) exception
|
|
|
|
throw new CryptographicException (msg, e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// try PKCS#12
|
|
|
|
try {
|
|
|
|
cert = ImportPkcs12 (rawData, password);
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
// it's possible to supply a (unrequired/unusued) password
|
|
|
|
// fix bug #79028
|
|
|
|
cert = new MX.X509Certificate (rawData);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_cert = cert;
|
|
|
|
}
|
|
|
|
|
|
|
|
[MonoTODO ("X509ContentType.SerializedCert is not supported")]
|
|
|
|
public override byte[] Export (X509ContentType contentType, string password)
|
|
|
|
{
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
|
|
|
|
switch (contentType) {
|
|
|
|
case X509ContentType.Cert:
|
|
|
|
return _cert.RawData;
|
|
|
|
case X509ContentType.Pfx: // this includes Pkcs12
|
|
|
|
return ExportPkcs12 (password);
|
|
|
|
case X509ContentType.SerializedCert:
|
|
|
|
// TODO
|
|
|
|
throw new NotSupportedException ();
|
|
|
|
default:
|
|
|
|
string msg = Locale.GetText ("This certificate format '{0}' cannot be exported.", contentType);
|
|
|
|
throw new CryptographicException (msg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
byte[] ExportPkcs12 (string password)
|
|
|
|
{
|
|
|
|
var pfx = new MX.PKCS12 ();
|
|
|
|
try {
|
|
|
|
var attrs = new Hashtable ();
|
|
|
|
var localKeyId = new ArrayList ();
|
|
|
|
localKeyId.Add (new byte[] { 1, 0, 0, 0 });
|
|
|
|
attrs.Add (MX.PKCS9.localKeyId, localKeyId);
|
|
|
|
|
|
|
|
if (password != null)
|
|
|
|
pfx.Password = password;
|
|
|
|
pfx.AddCertificate (_cert, attrs);
|
|
|
|
var privateKey = PrivateKey;
|
|
|
|
if (privateKey != null)
|
|
|
|
pfx.AddPkcs8ShroudedKeyBag (privateKey, attrs);
|
|
|
|
return pfx.GetBytes ();
|
|
|
|
} finally {
|
|
|
|
pfx.Password = null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public override void Reset ()
|
|
|
|
{
|
|
|
|
_cert = null;
|
|
|
|
_archived = false;
|
|
|
|
_extensions = null;
|
|
|
|
_serial = null;
|
|
|
|
_publicKey = null;
|
|
|
|
issuer_name = null;
|
|
|
|
subject_name = null;
|
|
|
|
signature_algorithm = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override string ToString ()
|
|
|
|
{
|
|
|
|
if (_cert == null)
|
|
|
|
return "System.Security.Cryptography.X509Certificates.X509Certificate2";
|
|
|
|
|
|
|
|
return ToString (true);
|
|
|
|
}
|
|
|
|
|
|
|
|
public override string ToString (bool verbose)
|
|
|
|
{
|
|
|
|
if (_cert == null)
|
|
|
|
return "System.Security.Cryptography.X509Certificates.X509Certificate2";
|
|
|
|
|
|
|
|
string nl = Environment.NewLine;
|
|
|
|
StringBuilder sb = new StringBuilder ();
|
|
|
|
|
|
|
|
// the non-verbose X509Certificate2 == verbose X509Certificate
|
|
|
|
if (!verbose) {
|
|
|
|
sb.AppendFormat ("[Subject]{0} {1}{0}{0}", nl, GetSubjectName (false));
|
|
|
|
sb.AppendFormat ("[Issuer]{0} {1}{0}{0}", nl, GetIssuerName (false));
|
|
|
|
sb.AppendFormat ("[Not Before]{0} {1}{0}{0}", nl, GetValidFrom ().ToLocalTime ());
|
|
|
|
sb.AppendFormat ("[Not After]{0} {1}{0}{0}", nl, GetValidUntil ().ToLocalTime ());
|
|
|
|
sb.AppendFormat ("[Thumbprint]{0} {1}{0}", nl, X509Helper.ToHexString (GetCertHash ()));
|
|
|
|
sb.Append (nl);
|
|
|
|
return sb.ToString ();
|
|
|
|
}
|
|
|
|
|
|
|
|
sb.AppendFormat ("[Version]{0} V{1}{0}{0}", nl, Version);
|
|
|
|
sb.AppendFormat ("[Subject]{0} {1}{0}{0}", nl, GetSubjectName (false));
|
|
|
|
sb.AppendFormat ("[Issuer]{0} {1}{0}{0}", nl, GetIssuerName (false));
|
|
|
|
sb.AppendFormat ("[Serial Number]{0} {1}{0}{0}", nl, GetSerialNumber ());
|
|
|
|
sb.AppendFormat ("[Not Before]{0} {1}{0}{0}", nl, GetValidFrom ().ToLocalTime ());
|
|
|
|
sb.AppendFormat ("[Not After]{0} {1}{0}{0}", nl, GetValidUntil ().ToLocalTime ());
|
|
|
|
sb.AppendFormat ("[Thumbprint]{0} {1}{0}", nl, X509Helper.ToHexString (GetCertHash ()));
|
|
|
|
sb.AppendFormat ("[Signature Algorithm]{0} {1}({2}){0}{0}", nl, SignatureAlgorithm.FriendlyName,
|
|
|
|
SignatureAlgorithm.Value);
|
|
|
|
|
|
|
|
AsymmetricAlgorithm key = PublicKey.Key;
|
|
|
|
sb.AppendFormat ("[Public Key]{0} Algorithm: ", nl);
|
|
|
|
if (key is RSA)
|
|
|
|
sb.Append ("RSA");
|
|
|
|
else if (key is DSA)
|
|
|
|
sb.Append ("DSA");
|
|
|
|
else
|
|
|
|
sb.Append (key.ToString ());
|
|
|
|
sb.AppendFormat ("{0} Length: {1}{0} Key Blob: ", nl, key.KeySize);
|
|
|
|
AppendBuffer (sb, PublicKey.EncodedKeyValue.RawData);
|
|
|
|
sb.AppendFormat ("{0} Parameters: ", nl);
|
|
|
|
AppendBuffer (sb, PublicKey.EncodedParameters.RawData);
|
|
|
|
sb.Append (nl);
|
|
|
|
|
|
|
|
return sb.ToString ();
|
|
|
|
}
|
|
|
|
|
|
|
|
private static void AppendBuffer (StringBuilder sb, byte[] buffer)
|
|
|
|
{
|
|
|
|
if (buffer == null)
|
|
|
|
return;
|
|
|
|
for (int i=0; i < buffer.Length; i++) {
|
|
|
|
sb.Append (buffer [i].ToString ("x2"));
|
|
|
|
if (i < buffer.Length - 1)
|
|
|
|
sb.Append (" ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
[MonoTODO ("by default this depends on the incomplete X509Chain")]
|
|
|
|
public override bool Verify (X509Certificate2 thisCertificate)
|
|
|
|
{
|
|
|
|
if (_cert == null)
|
|
|
|
throw new CryptographicException (empty_error);
|
|
|
|
|
|
|
|
X509Chain chain = X509Chain.Create ();
|
|
|
|
if (!chain.Build (thisCertificate))
|
|
|
|
return false;
|
|
|
|
// TODO - check chain and other stuff ???
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static methods
|
|
|
|
|
|
|
|
private static byte[] signedData = new byte[] { 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x07, 0x02 };
|
|
|
|
|
|
|
|
[MonoTODO ("Detection limited to Cert, Pfx, Pkcs12, Pkcs7 and Unknown")]
|
|
|
|
public static X509ContentType GetCertContentType (byte[] rawData)
|
|
|
|
{
|
|
|
|
if ((rawData == null) || (rawData.Length == 0))
|
|
|
|
throw new ArgumentException ("rawData");
|
|
|
|
|
|
|
|
X509ContentType type = X509ContentType.Unknown;
|
|
|
|
try {
|
|
|
|
ASN1 data = new ASN1 (rawData);
|
|
|
|
if (data.Tag != 0x30) {
|
|
|
|
string msg = Locale.GetText ("Unable to decode certificate.");
|
|
|
|
throw new CryptographicException (msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data.Count == 0)
|
|
|
|
return type;
|
|
|
|
|
|
|
|
if (data.Count == 3) {
|
|
|
|
switch (data [0].Tag) {
|
|
|
|
case 0x30:
|
|
|
|
// SEQUENCE / SEQUENCE / BITSTRING
|
|
|
|
if ((data [1].Tag == 0x30) && (data [2].Tag == 0x03))
|
|
|
|
type = X509ContentType.Cert;
|
|
|
|
break;
|
|
|
|
case 0x02:
|
|
|
|
// INTEGER / SEQUENCE / SEQUENCE
|
|
|
|
if ((data [1].Tag == 0x30) && (data [2].Tag == 0x30))
|
|
|
|
type = X509ContentType.Pkcs12;
|
|
|
|
// note: Pfx == Pkcs12
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// check for PKCS#7 (count unknown but greater than 0)
|
|
|
|
// SEQUENCE / OID (signedData)
|
|
|
|
if ((data [0].Tag == 0x06) && data [0].CompareValue (signedData))
|
|
|
|
type = X509ContentType.Pkcs7;
|
|
|
|
}
|
|
|
|
catch (Exception e) {
|
|
|
|
string msg = Locale.GetText ("Unable to decode certificate.");
|
|
|
|
throw new CryptographicException (msg, e);
|
|
|
|
}
|
|
|
|
|
|
|
|
return type;
|
|
|
|
}
|
|
|
|
|
|
|
|
[MonoTODO ("Detection limited to Cert, Pfx, Pkcs12 and Unknown")]
|
|
|
|
public static X509ContentType GetCertContentType (string fileName)
|
|
|
|
{
|
|
|
|
if (fileName == null)
|
|
|
|
throw new ArgumentNullException ("fileName");
|
|
|
|
if (fileName.Length == 0)
|
|
|
|
throw new ArgumentException ("fileName");
|
|
|
|
|
|
|
|
byte[] data = File.ReadAllBytes (fileName);
|
|
|
|
return GetCertContentType (data);
|
|
|
|
}
|
|
|
|
|
|
|
|
// internal stuff because X509Certificate2 isn't complete enough
|
|
|
|
// (maybe X509Certificate3 will be better?)
|
|
|
|
|
|
|
|
internal MX.X509Certificate MonoCertificate {
|
|
|
|
get { return _cert; }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|