| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053 |
- #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
- #pragma warning disable
- using System;
- using System.Collections.Generic;
- using System.IO;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.IsisMtt;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Math;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Security;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.X509;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.X509.Extension;
- using BestHTTP.SecureProtocol.Org.BouncyCastle.X509.Store;
- namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Pkix
- {
- /// <summary>
- /// Summary description for PkixCertPathValidatorUtilities.
- /// </summary>
- internal static class PkixCertPathValidatorUtilities
- {
- private static readonly PkixCrlUtilities CrlUtilities = new PkixCrlUtilities();
- internal static readonly string ANY_POLICY = "2.5.29.32.0";
- internal static readonly string CRL_NUMBER = X509Extensions.CrlNumber.Id;
- /// <summary>
- /// key usage bits
- /// </summary>
- internal static readonly int KEY_CERT_SIGN = 5;
- internal static readonly int CRL_SIGN = 6;
- //internal static readonly string[] crlReasons = new string[]
- //{
- // "unspecified",
- // "keyCompromise",
- // "cACompromise",
- // "affiliationChanged",
- // "superseded",
- // "cessationOfOperation",
- // "certificateHold",
- // "unknown",
- // "removeFromCRL",
- // "privilegeWithdrawn",
- // "aACompromise"
- //};
- /// <summary>
- /// Search the given Set of TrustAnchor's for one that is the
- /// issuer of the given X509 certificate.
- /// </summary>
- /// <param name="cert">the X509 certificate</param>
- /// <param name="trustAnchors">a Set of TrustAnchor's</param>
- /// <returns>the <code>TrustAnchor</code> object if found or
- /// <code>null</code> if not.
- /// </returns>
- /// @exception
- internal static TrustAnchor FindTrustAnchor(X509Certificate cert, ISet<TrustAnchor> trustAnchors)
- {
- var iter = trustAnchors.GetEnumerator();
- TrustAnchor trust = null;
- AsymmetricKeyParameter trustPublicKey = null;
- Exception invalidKeyEx = null;
- X509CertStoreSelector certSelectX509 = new X509CertStoreSelector();
- try
- {
- certSelectX509.Subject = GetIssuerPrincipal(cert);
- }
- catch (IOException ex)
- {
- throw new Exception("Cannot set subject search criteria for trust anchor.", ex);
- }
- while (iter.MoveNext() && trust == null)
- {
- trust = iter.Current;
- if (trust.TrustedCert != null)
- {
- if (certSelectX509.Match(trust.TrustedCert))
- {
- trustPublicKey = trust.TrustedCert.GetPublicKey();
- }
- else
- {
- trust = null;
- }
- }
- else if (trust.CAName != null && trust.CAPublicKey != null)
- {
- try
- {
- X509Name certIssuer = GetIssuerPrincipal(cert);
- X509Name caName = new X509Name(trust.CAName);
- if (certIssuer.Equivalent(caName, true))
- {
- trustPublicKey = trust.CAPublicKey;
- }
- else
- {
- trust = null;
- }
- }
- catch (InvalidParameterException)
- {
- trust = null;
- }
- }
- else
- {
- trust = null;
- }
- if (trustPublicKey != null)
- {
- try
- {
- cert.Verify(trustPublicKey);
- }
- catch (Exception ex)
- {
- invalidKeyEx = ex;
- trust = null;
- }
- }
- }
- if (trust == null && invalidKeyEx != null)
- {
- throw new Exception("TrustAnchor found but certificate validation failed.", invalidKeyEx);
- }
- return trust;
- }
- internal static bool IsIssuerTrustAnchor(X509Certificate cert, ISet<TrustAnchor> trustAnchors)
- {
- try
- {
- return FindTrustAnchor(cert, trustAnchors) != null;
- }
- catch (Exception)
- {
- return false;
- }
- }
- internal static void AddAdditionalStoresFromAltNames(X509Certificate cert, PkixParameters pkixParams)
- {
- // if in the IssuerAltName extension an URI
- // is given, add an additinal X.509 store
- var issuerAltNames = cert.GetIssuerAlternativeNames();
- if (issuerAltNames != null)
- {
- foreach (var list in issuerAltNames)
- {
- // look for URI
- if (list.Count >= 2 && list[0].Equals(GeneralName.UniformResourceIdentifier))
- {
- string location = (string)list[1];
- AddAdditionalStoreFromLocation(location, pkixParams);
- }
- }
- }
- }
- internal static DateTime GetValidDate(PkixParameters paramsPKIX)
- {
- DateTime? validDate = paramsPKIX.Date;
- if (validDate == null)
- return DateTime.UtcNow;
- return validDate.Value;
- }
- /// <summary>
- /// Returns the issuer of an attribute certificate or certificate.
- /// </summary>
- /// <param name="obj">The attribute certificate or certificate.</param>
- /// <returns>The issuer as <code>X500Principal</code>.</returns>
- internal static X509Name GetIssuerPrincipal(object obj)
- {
- if (obj is X509Certificate cert)
- return cert.IssuerDN;
- if (obj is X509V2AttributeCertificate attrCert)
- return attrCert.Issuer.GetPrincipals()[0];
- throw new InvalidOperationException();
- }
- internal static X509Name GetIssuerPrincipal(X509V2AttributeCertificate attrCert)
- {
- return attrCert.Issuer.GetPrincipals()[0];
- }
- internal static X509Name GetIssuerPrincipal(X509Certificate cert)
- {
- return cert.IssuerDN;
- }
- internal static bool IsSelfIssued(
- X509Certificate cert)
- {
- return cert.SubjectDN.Equivalent(cert.IssuerDN, true);
- }
- internal static AlgorithmIdentifier GetAlgorithmIdentifier(
- AsymmetricKeyParameter key)
- {
- try
- {
- SubjectPublicKeyInfo info = SubjectPublicKeyInfoFactory.CreateSubjectPublicKeyInfo(key);
- return info.AlgorithmID;
- }
- catch (Exception e)
- {
- throw new PkixCertPathValidatorException("Subject public key cannot be decoded.", e);
- }
- }
- internal static bool IsAnyPolicy(ISet<string> policySet)
- {
- return policySet == null || policySet.Count < 1 || policySet.Contains(ANY_POLICY);
- }
- internal static void AddAdditionalStoreFromLocation(
- string location,
- PkixParameters pkixParams)
- {
- if (pkixParams.IsAdditionalLocationsEnabled)
- {
- try
- {
- if (Org.BouncyCastle.Utilities.Platform.StartsWith(location, "ldap://"))
- {
- // ldap://directory.d-trust.net/CN=D-TRUST
- // Qualified CA 2003 1:PN,O=D-Trust GmbH,C=DE
- // skip "ldap://"
- location = location.Substring(7);
- // after first / baseDN starts
- string url;//, baseDN;
- int slashPos = location.IndexOf('/');
- if (slashPos != -1)
- {
- url = "ldap://" + location.Substring(0, slashPos);
- // baseDN = location.Substring(slashPos);
- }
- else
- {
- url = "ldap://" + location;
- // baseDN = nsull;
- }
- throw new NotImplementedException("LDAP cert/CRL stores");
- // use all purpose parameters
- //X509LDAPCertStoreParameters ldapParams = new X509LDAPCertStoreParameters.Builder(
- // url, baseDN).build();
- //pkixParams.AddAdditionalStore(X509Store.getInstance(
- // "CERTIFICATE/LDAP", ldapParams));
- //pkixParams.AddAdditionalStore(X509Store.getInstance(
- // "CRL/LDAP", ldapParams));
- //pkixParams.AddAdditionalStore(X509Store.getInstance(
- // "ATTRIBUTECERTIFICATE/LDAP", ldapParams));
- //pkixParams.AddAdditionalStore(X509Store.getInstance(
- // "CERTIFICATEPAIR/LDAP", ldapParams));
- }
- }
- catch (Exception)
- {
- // cannot happen
- throw new Exception("Exception adding X.509 stores.");
- }
- }
- }
- private static BigInteger GetSerialNumber(
- object cert)
- {
- if (cert is X509Certificate)
- {
- return ((X509Certificate)cert).SerialNumber;
- }
- else
- {
- return ((X509V2AttributeCertificate)cert).SerialNumber;
- }
- }
- //
- // policy checking
- //
- internal static ISet<PolicyQualifierInfo> GetQualifierSet(Asn1Sequence qualifiers)
- {
- var pq = new HashSet<PolicyQualifierInfo>();
- if (qualifiers != null)
- {
- foreach (Asn1Encodable ae in qualifiers)
- {
- try
- {
- pq.Add(PolicyQualifierInfo.GetInstance(ae.ToAsn1Object()));
- }
- catch (IOException ex)
- {
- throw new PkixCertPathValidatorException("Policy qualifier info cannot be decoded.", ex);
- }
- }
- }
- return pq;
- }
- internal static PkixPolicyNode RemovePolicyNode(PkixPolicyNode validPolicyTree,
- IList<PkixPolicyNode>[] policyNodes, PkixPolicyNode _node)
- {
- PkixPolicyNode _parent = _node.Parent;
- if (validPolicyTree == null)
- {
- return null;
- }
- if (_parent == null)
- {
- for (int j = 0; j < policyNodes.Length; j++)
- {
- policyNodes[j] = new List<PkixPolicyNode>();
- }
- return null;
- }
- else
- {
- _parent.RemoveChild(_node);
- RemovePolicyNodeRecurse(policyNodes, _node);
- return validPolicyTree;
- }
- }
- private static void RemovePolicyNodeRecurse(IList<PkixPolicyNode>[] policyNodes, PkixPolicyNode _node)
- {
- policyNodes[_node.Depth].Remove(_node);
- if (_node.HasChildren)
- {
- foreach (PkixPolicyNode _child in _node.Children)
- {
- RemovePolicyNodeRecurse(policyNodes, _child);
- }
- }
- }
- internal static void PrepareNextCertB1(int i, IList<PkixPolicyNode>[] policyNodes, string id_p,
- IDictionary<string, ISet<string>> m_idp, X509Certificate cert)
- {
- foreach (var node in policyNodes[i])
- {
- if (node.ValidPolicy.Equals(id_p))
- {
- node.ExpectedPolicies = CollectionUtilities.GetValueOrNull(m_idp, id_p);
- return;
- }
- }
- foreach (var node in policyNodes[i])
- {
- if (ANY_POLICY.Equals(node.ValidPolicy))
- {
- Asn1Sequence policies;
- try
- {
- policies = Asn1Sequence.GetInstance(
- GetExtensionValue(cert, X509Extensions.CertificatePolicies));
- }
- catch (Exception e)
- {
- throw new Exception("Certificate policies cannot be decoded.", e);
- }
- ISet<PolicyQualifierInfo> pq = null;
- foreach (var policy in policies)
- {
- PolicyInformation pinfo;
- try
- {
- pinfo = PolicyInformation.GetInstance(policy);
- }
- catch (Exception ex)
- {
- throw new Exception("Policy information cannot be decoded.", ex);
- }
- if (ANY_POLICY.Equals(pinfo.PolicyIdentifier.Id))
- {
- try
- {
- pq = GetQualifierSet(pinfo.PolicyQualifiers);
- }
- catch (PkixCertPathValidatorException ex)
- {
- throw new PkixCertPathValidatorException(
- "Policy qualifier info set could not be built.", ex);
- }
- break;
- }
- }
- bool ci = false;
- var critExtOids = cert.GetCriticalExtensionOids();
- if (critExtOids != null)
- {
- ci = critExtOids.Contains(X509Extensions.CertificatePolicies.Id);
- }
- PkixPolicyNode p_node = node.Parent;
- if (ANY_POLICY.Equals(p_node.ValidPolicy))
- {
- PkixPolicyNode c_node = new PkixPolicyNode(new List<PkixPolicyNode>(), i,
- CollectionUtilities.GetValueOrNull(m_idp, id_p), p_node, pq, id_p, ci);
- p_node.AddChild(c_node);
- policyNodes[i].Add(c_node);
- }
- break;
- }
- }
- }
- internal static PkixPolicyNode PrepareNextCertB2(int i, IList<PkixPolicyNode>[] policyNodes, string id_p,
- PkixPolicyNode validPolicyTree)
- {
- int pos = 0;
- // Copy to avoid RemoveAt calls interfering with enumeration
- foreach (var node in new List<PkixPolicyNode>(policyNodes[i]))
- {
- if (!node.ValidPolicy.Equals(id_p))
- {
- ++pos;
- continue;
- }
- node.Parent.RemoveChild(node);
- policyNodes[i].RemoveAt(pos);
- for (int k = i - 1; k >= 0; k--)
- {
- var nodes = policyNodes[k];
- for (int l = 0; l < nodes.Count; l++)
- {
- var node2 = nodes[l];
- if (!node2.HasChildren)
- {
- validPolicyTree = RemovePolicyNode(validPolicyTree, policyNodes, node2);
- if (validPolicyTree == null)
- break;
- }
- }
- }
- }
- return validPolicyTree;
- }
- internal static void GetCertStatus(
- DateTime validDate,
- X509Crl crl,
- object cert,
- CertStatus certStatus)
- {
- X509Crl bcCRL;
- try
- {
- bcCRL = new X509Crl(CertificateList.GetInstance((Asn1Sequence)Asn1Sequence.FromByteArray(crl.GetEncoded())));
- }
- catch (Exception exception)
- {
- throw new Exception("X509Crl could not be created.", exception);
- }
- X509CrlEntry crl_entry = (X509CrlEntry)bcCRL.GetRevokedCertificate(GetSerialNumber(cert));
- if (crl_entry == null)
- return;
- X509Name issuer = GetIssuerPrincipal(cert);
- if (!issuer.Equivalent(crl_entry.GetCertificateIssuer(), true)
- && !issuer.Equivalent(crl.IssuerDN, true))
- {
- return;
- }
- int reasonCodeValue = CrlReason.Unspecified;
- if (crl_entry.HasExtensions)
- {
- try
- {
- Asn1Object extValue = GetExtensionValue(crl_entry, X509Extensions.ReasonCode);
- DerEnumerated reasonCode = DerEnumerated.GetInstance(extValue);
- if (null != reasonCode)
- {
- reasonCodeValue = reasonCode.IntValueExact;
- }
- }
- catch (Exception e)
- {
- throw new Exception("Reason code CRL entry extension could not be decoded.", e);
- }
- }
- DateTime revocationDate = crl_entry.RevocationDate;
- if (validDate.Ticks < revocationDate.Ticks)
- {
- switch (reasonCodeValue)
- {
- case CrlReason.Unspecified:
- case CrlReason.KeyCompromise:
- case CrlReason.CACompromise:
- case CrlReason.AACompromise:
- break;
- default:
- return;
- }
- }
- // (i) or (j)
- certStatus.Status = reasonCodeValue;
- certStatus.RevocationDate = revocationDate;
- }
- /**
- * Return the next working key inheriting DSA parameters if necessary.
- * <p>
- * This methods inherits DSA parameters from the indexed certificate or
- * previous certificates in the certificate chain to the returned
- * <code>PublicKey</code>. The list is searched upwards, meaning the end
- * certificate is at position 0 and previous certificates are following.
- * </p>
- * <p>
- * If the indexed certificate does not contain a DSA key this method simply
- * returns the public key. If the DSA key already contains DSA parameters
- * the key is also only returned.
- * </p>
- *
- * @param certs The certification path.
- * @param index The index of the certificate which contains the public key
- * which should be extended with DSA parameters.
- * @return The public key of the certificate in list position
- * <code>index</code> extended with DSA parameters if applicable.
- * @throws Exception if DSA parameters cannot be inherited.
- */
- internal static AsymmetricKeyParameter GetNextWorkingKey(IList<X509Certificate> certs, int index)
- {
- X509Certificate cert = certs[index];
- AsymmetricKeyParameter pubKey = cert.GetPublicKey();
- if (!(pubKey is DsaPublicKeyParameters))
- return pubKey;
- DsaPublicKeyParameters dsaPubKey = (DsaPublicKeyParameters)pubKey;
- if (dsaPubKey.Parameters != null)
- return dsaPubKey;
- for (int i = index + 1; i < certs.Count; i++)
- {
- X509Certificate parentCert = certs[i];
- pubKey = parentCert.GetPublicKey();
- if (!(pubKey is DsaPublicKeyParameters))
- {
- throw new PkixCertPathValidatorException(
- "DSA parameters cannot be inherited from previous certificate.");
- }
- DsaPublicKeyParameters prevDSAPubKey = (DsaPublicKeyParameters)pubKey;
- if (prevDSAPubKey.Parameters == null)
- continue;
- DsaParameters dsaParams = prevDSAPubKey.Parameters;
- try
- {
- return new DsaPublicKeyParameters(dsaPubKey.Y, dsaParams);
- }
- catch (Exception exception)
- {
- throw new Exception(exception.Message);
- }
- }
- throw new PkixCertPathValidatorException("DSA parameters cannot be inherited from previous certificate.");
- }
- internal static DateTime GetValidCertDateFromValidityModel(
- PkixParameters paramsPkix,
- PkixCertPath certPath,
- int index)
- {
- if (paramsPkix.ValidityModel != PkixParameters.ChainValidityModel)
- {
- return GetValidDate(paramsPkix);
- }
- // if end cert use given signing/encryption/... time
- if (index <= 0)
- {
- return GetValidDate(paramsPkix);
- // else use time when previous cert was created
- }
- var cert = certPath.Certificates[index - 1];
- if (index - 1 == 0)
- {
- Asn1GeneralizedTime dateOfCertgen;
- try
- {
- Asn1OctetString extVal = cert.GetExtensionValue(IsisMttObjectIdentifiers.IdIsisMttATDateOfCertGen);
- dateOfCertgen = Asn1GeneralizedTime.GetInstance(extVal);
- }
- catch (ArgumentException)
- {
- throw new Exception(
- "Date of cert gen extension could not be read.");
- }
- if (dateOfCertgen != null)
- {
- try
- {
- return dateOfCertgen.ToDateTime();
- }
- catch (ArgumentException e)
- {
- throw new Exception(
- "Date from date of cert gen extension could not be parsed.",
- e);
- }
- }
- }
- return cert.NotBefore;
- }
- /**
- * Add the CRL issuers from the cRLIssuer field of the distribution point or
- * from the certificate if not given to the issuer criterion of the
- * <code>selector</code>.
- * <p>
- * The <code>issuerPrincipals</code> are a collection with a single
- * <code>X500Principal</code> for <code>X509Certificate</code>s. For
- * {@link X509AttributeCertificate}s the issuer may contain more than one
- * <code>X500Principal</code>.
- * </p>
- *
- * @param dp The distribution point.
- * @param issuerPrincipals The issuers of the certificate or attribute
- * certificate which contains the distribution point.
- * @param selector The CRL selector.
- * @param pkixParams The PKIX parameters containing the cert stores.
- * @throws Exception if an exception occurs while processing.
- * @throws ClassCastException if <code>issuerPrincipals</code> does not
- * contain only <code>X500Principal</code>s.
- */
- internal static void GetCrlIssuersFromDistributionPoint(
- DistributionPoint dp,
- ICollection<X509Name> issuerPrincipals,
- X509CrlStoreSelector selector,
- PkixParameters pkixParams)
- {
- var issuers = new List<X509Name>();
- // indirect CRL
- if (dp.CrlIssuer != null)
- {
- GeneralName[] genNames = dp.CrlIssuer.GetNames();
- // look for a DN
- for (int j = 0; j < genNames.Length; j++)
- {
- if (genNames[j].TagNo == GeneralName.DirectoryName)
- {
- try
- {
- issuers.Add(X509Name.GetInstance(genNames[j].Name.ToAsn1Object()));
- }
- catch (IOException e)
- {
- throw new Exception("CRL issuer information from distribution point cannot be decoded.", e);
- }
- }
- }
- }
- else
- {
- /*
- * certificate issuer is CRL issuer, distributionPoint field MUST be
- * present.
- */
- if (dp.DistributionPointName == null)
- {
- throw new Exception(
- "CRL issuer is omitted from distribution point but no distributionPoint field present.");
- }
- // add and check issuer principals
- issuers.AddRange(issuerPrincipals);
- }
- // TODO: is not found although this should correctly add the rel name. selector of Sun is buggy here or PKI test case is invalid
- // distributionPoint
- // if (dp.getDistributionPoint() != null)
- // {
- // // look for nameRelativeToCRLIssuer
- // if (dp.getDistributionPoint().getType() == DistributionPointName.NAME_RELATIVE_TO_CRL_ISSUER)
- // {
- // // append fragment to issuer, only one
- // // issuer can be there, if this is given
- // if (issuers.size() != 1)
- // {
- // throw new AnnotatedException(
- // "nameRelativeToCRLIssuer field is given but more than one CRL issuer is given.");
- // }
- // DEREncodable relName = dp.getDistributionPoint().getName();
- // Iterator it = issuers.iterator();
- // List issuersTemp = new ArrayList(issuers.size());
- // while (it.hasNext())
- // {
- // Enumeration e = null;
- // try
- // {
- // e = ASN1Sequence.getInstance(
- // new ASN1InputStream(((X500Principal) it.next())
- // .getEncoded()).readObject()).getObjects();
- // }
- // catch (IOException ex)
- // {
- // throw new AnnotatedException(
- // "Cannot decode CRL issuer information.", ex);
- // }
- // ASN1EncodableVector v = new ASN1EncodableVector();
- // while (e.hasMoreElements())
- // {
- // v.add((DEREncodable) e.nextElement());
- // }
- // v.add(relName);
- // issuersTemp.add(new X500Principal(new DERSequence(v)
- // .getDEREncoded()));
- // }
- // issuers.clear();
- // issuers.addAll(issuersTemp);
- // }
- // }
- selector.Issuers = issuers;
- }
- /**
- * Fetches complete CRLs according to RFC 3280.
- *
- * @param dp The distribution point for which the complete CRL
- * @param cert The <code>X509Certificate</code> or
- * {@link org.bouncycastle.x509.X509AttributeCertificate} for
- * which the CRL should be searched.
- * @param currentDate The date for which the delta CRLs must be valid.
- * @param paramsPKIX The extended PKIX parameters.
- * @return A <code>Set</code> of <code>X509CRL</code>s with complete
- * CRLs.
- * @throws Exception if an exception occurs while picking the CRLs
- * or no CRLs are found.
- */
- internal static ISet<X509Crl> GetCompleteCrls(DistributionPoint dp, object certObj, DateTime currentDate,
- PkixParameters paramsPKIX)
- {
- var certObjIssuer = GetIssuerPrincipal(certObj);
- X509CrlStoreSelector crlselect = new X509CrlStoreSelector();
- try
- {
- var issuers = new HashSet<X509Name>();
- issuers.Add(certObjIssuer);
- GetCrlIssuersFromDistributionPoint(dp, issuers, crlselect, paramsPKIX);
- }
- catch (Exception e)
- {
- throw new Exception("Could not get issuer information from distribution point.", e);
- }
- {
- if (certObj is X509Certificate cert)
- {
- crlselect.CertificateChecking = cert;
- }
- else if (certObj is X509V2AttributeCertificate attrCert)
- {
- crlselect.AttrCertChecking = attrCert;
- }
- }
- crlselect.CompleteCrlEnabled = true;
- ISet<X509Crl> crls = CrlUtilities.FindCrls(crlselect, paramsPKIX, currentDate);
- if (crls.Count < 1)
- throw new Exception("No CRLs found for issuer \"" + certObjIssuer + "\"");
- return crls;
- }
- /**
- * Fetches delta CRLs according to RFC 3280 section 5.2.4.
- *
- * @param currentDate The date for which the delta CRLs must be valid.
- * @param paramsPKIX The extended PKIX parameters.
- * @param completeCRL The complete CRL the delta CRL is for.
- * @return A <code>Set</code> of <code>X509CRL</code>s with delta CRLs.
- * @throws Exception if an exception occurs while picking the delta
- * CRLs.
- */
- internal static ISet<X509Crl> GetDeltaCrls(
- DateTime currentDate,
- PkixParameters paramsPKIX,
- X509Crl completeCRL)
- {
- X509CrlStoreSelector deltaSelect = new X509CrlStoreSelector();
- // 5.2.4 (a)
- try
- {
- var deltaSelectIssuer = new List<X509Name>();
- deltaSelectIssuer.Add(completeCRL.IssuerDN);
- deltaSelect.Issuers = deltaSelectIssuer;
- }
- catch (IOException e)
- {
- throw new Exception("Cannot extract issuer from CRL.", e);
- }
- BigInteger completeCRLNumber = null;
- try
- {
- Asn1Object asn1Object = GetExtensionValue(completeCRL, X509Extensions.CrlNumber);
- if (asn1Object != null)
- {
- completeCRLNumber = CrlNumber.GetInstance(asn1Object).PositiveValue;
- }
- }
- catch (Exception e)
- {
- throw new Exception(
- "CRL number extension could not be extracted from CRL.", e);
- }
- // 5.2.4 (b)
- byte[] idp = null;
- try
- {
- Asn1Object obj = GetExtensionValue(completeCRL, X509Extensions.IssuingDistributionPoint);
- if (obj != null)
- {
- idp = obj.GetDerEncoded();
- }
- }
- catch (Exception e)
- {
- throw new Exception(
- "Issuing distribution point extension value could not be read.",
- e);
- }
- // 5.2.4 (d)
- deltaSelect.MinCrlNumber = (completeCRLNumber == null)
- ? null
- : completeCRLNumber.Add(BigInteger.One);
- deltaSelect.IssuingDistributionPoint = idp;
- deltaSelect.IssuingDistributionPointEnabled = true;
- // 5.2.4 (c)
- deltaSelect.MaxBaseCrlNumber = completeCRLNumber;
- // find delta CRLs
- ISet<X509Crl> temp = CrlUtilities.FindCrls(deltaSelect, paramsPKIX, currentDate);
- var result = new HashSet<X509Crl>();
- foreach (X509Crl crl in temp)
- {
- if (IsDeltaCrl(crl))
- {
- result.Add(crl);
- }
- }
- return result;
- }
- private static bool IsDeltaCrl(X509Crl crl)
- {
- var critical = crl.GetCriticalExtensionOids();
- return critical.Contains(X509Extensions.DeltaCrlIndicator.Id);
- }
- internal static void AddAdditionalStoresFromCrlDistributionPoint(
- CrlDistPoint crldp,
- PkixParameters pkixParams)
- {
- if (crldp != null)
- {
- DistributionPoint[] dps = null;
- try
- {
- dps = crldp.GetDistributionPoints();
- }
- catch (Exception e)
- {
- throw new Exception(
- "Distribution points could not be read.", e);
- }
- for (int i = 0; i < dps.Length; i++)
- {
- DistributionPointName dpn = dps[i].DistributionPointName;
- // look for URIs in fullName
- if (dpn != null)
- {
- if (dpn.PointType == DistributionPointName.FullName)
- {
- GeneralName[] genNames = GeneralNames.GetInstance(
- dpn.Name).GetNames();
- // look for an URI
- for (int j = 0; j < genNames.Length; j++)
- {
- if (genNames[j].TagNo == GeneralName.UniformResourceIdentifier)
- {
- string location = DerIA5String.GetInstance(genNames[j].Name).GetString();
- AddAdditionalStoreFromLocation(location, pkixParams);
- }
- }
- }
- }
- }
- }
- }
- internal static bool ProcessCertD1i(int index, IList<PkixPolicyNode>[] policyNodes, DerObjectIdentifier pOid,
- ISet<PolicyQualifierInfo> pq)
- {
- foreach (var node in policyNodes[index - 1])
- {
- if (node.ExpectedPolicies.Contains(pOid.Id))
- {
- var childExpectedPolicies = new HashSet<string>();
- childExpectedPolicies.Add(pOid.Id);
- var child = new PkixPolicyNode(new List<PkixPolicyNode>(), index, childExpectedPolicies, node, pq,
- pOid.Id, false);
- node.AddChild(child);
- policyNodes[index].Add(child);
- return true;
- }
- }
- return false;
- }
- internal static void ProcessCertD1ii(int index, IList<PkixPolicyNode>[] policyNodes,
- DerObjectIdentifier _poid, ISet<PolicyQualifierInfo> _pq)
- {
- foreach (var _node in policyNodes[index - 1])
- {
- if (ANY_POLICY.Equals(_node.ValidPolicy))
- {
- var _childExpectedPolicies = new HashSet<string>();
- _childExpectedPolicies.Add(_poid.Id);
- var _child = new PkixPolicyNode(new List<PkixPolicyNode>(), index, _childExpectedPolicies, _node,
- _pq, _poid.Id, false);
- _node.AddChild(_child);
- policyNodes[index].Add(_child);
- return;
- }
- }
- }
- /**
- * Find the issuer certificates of a given certificate.
- *
- * @param cert
- * The certificate for which an issuer should be found.
- * @param pkixParams
- * @return A <code>Collection</code> object containing the issuer
- * <code>X509Certificate</code>s. Never <code>null</code>.
- *
- * @exception Exception
- * if an error occurs.
- */
- internal static HashSet<X509Certificate> FindIssuerCerts(
- X509Certificate cert,
- PkixBuilderParameters pkixParams)
- {
- X509CertStoreSelector certSelector = new X509CertStoreSelector();
- try
- {
- certSelector.Subject = cert.IssuerDN;
- }
- catch (IOException ex)
- {
- throw new Exception(
- "Subject criteria for certificate selector to find issuer certificate could not be set.", ex);
- }
- var certs = new HashSet<X509Certificate>();
- try
- {
- CollectionUtilities.CollectMatches(certs, certSelector, pkixParams.GetStoresCert());
- }
- catch (Exception e)
- {
- throw new Exception("Issuer certificate cannot be searched.", e);
- }
- return certs;
- }
- internal static Asn1Object GetExtensionValue(IX509Extension extensions, DerObjectIdentifier oid)
- {
- return X509ExtensionUtilities.FromExtensionValue(extensions, oid);
- }
- }
- }
- #pragma warning restore
- #endif
|