PEMReader.cs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using System.Collections.Generic;
  5. using System.Diagnostics;
  6. using System.IO;
  7. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1;
  8. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Pkcs;
  9. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Sec;
  10. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
  11. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X9;
  12. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto;
  13. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Generators;
  14. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
  15. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Pkcs;
  16. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security;
  17. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities;
  18. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Collections;
  19. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.Encoders;
  20. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities.IO.Pem;
  21. using Best.HTTP.SecureProtocol.Org.BouncyCastle.X509;
  22. namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.OpenSsl
  23. {
  24. /**
  25. * Class for reading OpenSSL PEM encoded streams containing
  26. * X509 certificates, PKCS8 encoded keys and PKCS7 objects.
  27. * <p>
  28. * In the case of PKCS7 objects the reader will return a CMS ContentInfo object. Keys and
  29. * Certificates will be returned using the appropriate java.security type.</p>
  30. */
  31. public class PemReader
  32. : Utilities.IO.Pem.PemReader
  33. {
  34. //private static readonly Dictionary<string, PemObjectParser> Parsers = new Dictionary<string, PemObjectParser>();
  35. static PemReader()
  36. {
  37. // Parsers.Add("CERTIFICATE REQUEST", new PKCS10CertificationRequestParser());
  38. // Parsers.Add("NEW CERTIFICATE REQUEST", new PKCS10CertificationRequestParser());
  39. // Parsers.Add("CERTIFICATE", new X509CertificateParser(provider));
  40. // Parsers.Add("X509 CERTIFICATE", new X509CertificateParser(provider));
  41. // Parsers.Add("X509 CRL", new X509CRLParser(provider));
  42. // Parsers.Add("PKCS7", new PKCS7Parser());
  43. // Parsers.Add("ATTRIBUTE CERTIFICATE", new X509AttributeCertificateParser());
  44. // Parsers.Add("EC PARAMETERS", new ECNamedCurveSpecParser());
  45. // Parsers.Add("PUBLIC KEY", new PublicKeyParser(provider));
  46. // Parsers.Add("RSA PUBLIC KEY", new RSAPublicKeyParser(provider));
  47. // Parsers.Add("RSA PRIVATE KEY", new RSAKeyPairParser(provider));
  48. // Parsers.Add("DSA PRIVATE KEY", new DSAKeyPairParser(provider));
  49. // Parsers.Add("EC PRIVATE KEY", new ECDSAKeyPairParser(provider));
  50. // Parsers.Add("ENCRYPTED PRIVATE KEY", new EncryptedPrivateKeyParser(provider));
  51. // Parsers.Add("PRIVATE KEY", new PrivateKeyParser(provider));
  52. }
  53. private readonly IPasswordFinder pFinder;
  54. /**
  55. * Create a new PemReader
  56. *
  57. * @param reader the Reader
  58. */
  59. public PemReader(
  60. TextReader reader)
  61. : this(reader, null)
  62. {
  63. }
  64. /**
  65. * Create a new PemReader with a password finder
  66. *
  67. * @param reader the Reader
  68. * @param pFinder the password finder
  69. */
  70. public PemReader(
  71. TextReader reader,
  72. IPasswordFinder pFinder)
  73. : base(reader)
  74. {
  75. this.pFinder = pFinder;
  76. }
  77. public object ReadObject()
  78. {
  79. PemObject obj = ReadPemObject();
  80. if (obj == null)
  81. return null;
  82. // TODO Follow Java build and map to parser objects?
  83. // if (parsers.Contains(obj.Type))
  84. // return ((PemObjectParser)parsers[obj.Type]).ParseObject(obj);
  85. if (Org.BouncyCastle.Utilities.Platform.EndsWith(obj.Type, "PRIVATE KEY"))
  86. return ReadPrivateKey(obj);
  87. switch (obj.Type)
  88. {
  89. case "PUBLIC KEY":
  90. return ReadPublicKey(obj);
  91. case "RSA PUBLIC KEY":
  92. return ReadRsaPublicKey(obj);
  93. case "CERTIFICATE REQUEST":
  94. case "NEW CERTIFICATE REQUEST":
  95. return ReadCertificateRequest(obj);
  96. case "CERTIFICATE":
  97. case "X509 CERTIFICATE":
  98. return ReadCertificate(obj);
  99. case "PKCS7":
  100. case "CMS":
  101. return ReadPkcs7(obj);
  102. case "X509 CRL":
  103. return ReadCrl(obj);
  104. case "ATTRIBUTE CERTIFICATE":
  105. return ReadAttributeCertificate(obj);
  106. // TODO Add back in when tests done, and return type issue resolved
  107. //case "EC PARAMETERS":
  108. // return ReadECParameters(obj);
  109. default:
  110. throw new IOException("unrecognised object: " + obj.Type);
  111. }
  112. }
  113. private AsymmetricKeyParameter ReadRsaPublicKey(PemObject pemObject)
  114. {
  115. RsaPublicKeyStructure rsaPubStructure = RsaPublicKeyStructure.GetInstance(
  116. Asn1Object.FromByteArray(pemObject.Content));
  117. return new RsaKeyParameters(
  118. false, // not private
  119. rsaPubStructure.Modulus,
  120. rsaPubStructure.PublicExponent);
  121. }
  122. private AsymmetricKeyParameter ReadPublicKey(PemObject pemObject)
  123. {
  124. return PublicKeyFactory.CreateKey(pemObject.Content);
  125. }
  126. /**
  127. * Reads in a X509Certificate.
  128. *
  129. * @return the X509Certificate
  130. * @throws IOException if an I/O error occured
  131. */
  132. private X509Certificate ReadCertificate(PemObject pemObject)
  133. {
  134. try
  135. {
  136. return new X509CertificateParser().ReadCertificate(pemObject.Content);
  137. }
  138. catch (Exception e)
  139. {
  140. throw new PemException("problem parsing cert: " + e.ToString());
  141. }
  142. }
  143. /**
  144. * Reads in a X509CRL.
  145. *
  146. * @return the X509Certificate
  147. * @throws IOException if an I/O error occured
  148. */
  149. private X509Crl ReadCrl(PemObject pemObject)
  150. {
  151. try
  152. {
  153. return new X509CrlParser().ReadCrl(pemObject.Content);
  154. }
  155. catch (Exception e)
  156. {
  157. throw new PemException("problem parsing cert: " + e.ToString());
  158. }
  159. }
  160. /**
  161. * Reads in a PKCS10 certification request.
  162. *
  163. * @return the certificate request.
  164. * @throws IOException if an I/O error occured
  165. */
  166. private Pkcs10CertificationRequest ReadCertificateRequest(PemObject pemObject)
  167. {
  168. try
  169. {
  170. return new Pkcs10CertificationRequest(pemObject.Content);
  171. }
  172. catch (Exception e)
  173. {
  174. throw new PemException("problem parsing cert: " + e.ToString());
  175. }
  176. }
  177. /**
  178. * Reads in a X509 Attribute Certificate.
  179. *
  180. * @return the X509 Attribute Certificate
  181. * @throws IOException if an I/O error occured
  182. */
  183. private X509V2AttributeCertificate ReadAttributeCertificate(PemObject pemObject)
  184. {
  185. return new X509V2AttributeCertificate(pemObject.Content);
  186. }
  187. /**
  188. * Reads in a PKCS7 object. This returns a ContentInfo object suitable for use with the CMS
  189. * API.
  190. *
  191. * @return the X509Certificate
  192. * @throws IOException if an I/O error occured
  193. */
  194. // TODO Consider returning Asn1.Pkcs.ContentInfo
  195. private Asn1.Cms.ContentInfo ReadPkcs7(PemObject pemObject)
  196. {
  197. try
  198. {
  199. return Asn1.Cms.ContentInfo.GetInstance(
  200. Asn1Object.FromByteArray(pemObject.Content));
  201. }
  202. catch (Exception e)
  203. {
  204. throw new PemException("problem parsing PKCS7 object: " + e.ToString());
  205. }
  206. }
  207. /**
  208. * Read a Key Pair
  209. */
  210. private object ReadPrivateKey(PemObject pemObject)
  211. {
  212. //
  213. // extract the key
  214. //
  215. Debug.Assert(Org.BouncyCastle.Utilities.Platform.EndsWith(pemObject.Type, "PRIVATE KEY"));
  216. string type = pemObject.Type.Substring(0, pemObject.Type.Length - "PRIVATE KEY".Length).Trim();
  217. byte[] keyBytes = pemObject.Content;
  218. var fields = new Dictionary<string, string>();
  219. foreach (PemHeader header in pemObject.Headers)
  220. {
  221. fields[header.Name] = header.Value;
  222. }
  223. string procType = CollectionUtilities.GetValueOrNull(fields, "Proc-Type");
  224. if (procType == "4,ENCRYPTED")
  225. {
  226. if (pFinder == null)
  227. throw new PasswordException("No password finder specified, but a password is required");
  228. char[] password = pFinder.GetPassword();
  229. if (password == null)
  230. throw new PasswordException("Password is null, but a password is required");
  231. if (!fields.TryGetValue("DEK-Info", out var dekInfo))
  232. throw new PemException("missing DEK-info");
  233. string[] tknz = dekInfo.Split(',');
  234. string dekAlgName = tknz[0].Trim();
  235. byte[] iv = Hex.Decode(tknz[1].Trim());
  236. keyBytes = PemUtilities.Crypt(false, keyBytes, password, dekAlgName, iv);
  237. }
  238. try
  239. {
  240. AsymmetricKeyParameter pubSpec, privSpec;
  241. Asn1Sequence seq = Asn1Sequence.GetInstance(keyBytes);
  242. switch (type)
  243. {
  244. case "RSA":
  245. {
  246. if (seq.Count != 9)
  247. throw new PemException("malformed sequence in RSA private key");
  248. RsaPrivateKeyStructure rsa = RsaPrivateKeyStructure.GetInstance(seq);
  249. pubSpec = new RsaKeyParameters(false, rsa.Modulus, rsa.PublicExponent);
  250. privSpec = new RsaPrivateCrtKeyParameters(
  251. rsa.Modulus, rsa.PublicExponent, rsa.PrivateExponent,
  252. rsa.Prime1, rsa.Prime2, rsa.Exponent1, rsa.Exponent2,
  253. rsa.Coefficient);
  254. break;
  255. }
  256. case "DSA":
  257. {
  258. if (seq.Count != 6)
  259. throw new PemException("malformed sequence in DSA private key");
  260. // TODO Create an ASN1 object somewhere for this?
  261. //DerInteger v = (DerInteger)seq[0];
  262. DerInteger p = (DerInteger)seq[1];
  263. DerInteger q = (DerInteger)seq[2];
  264. DerInteger g = (DerInteger)seq[3];
  265. DerInteger y = (DerInteger)seq[4];
  266. DerInteger x = (DerInteger)seq[5];
  267. DsaParameters parameters = new DsaParameters(p.Value, q.Value, g.Value);
  268. privSpec = new DsaPrivateKeyParameters(x.Value, parameters);
  269. pubSpec = new DsaPublicKeyParameters(y.Value, parameters);
  270. break;
  271. }
  272. case "EC":
  273. {
  274. ECPrivateKeyStructure pKey = ECPrivateKeyStructure.GetInstance(seq);
  275. AlgorithmIdentifier algId = new AlgorithmIdentifier(
  276. X9ObjectIdentifiers.IdECPublicKey, pKey.GetParameters());
  277. PrivateKeyInfo privInfo = new PrivateKeyInfo(algId, pKey.ToAsn1Object());
  278. // TODO Are the keys returned here ECDSA, as Java version forces?
  279. privSpec = PrivateKeyFactory.CreateKey(privInfo);
  280. DerBitString pubKey = pKey.GetPublicKey();
  281. if (pubKey != null)
  282. {
  283. SubjectPublicKeyInfo pubInfo = new SubjectPublicKeyInfo(algId, pubKey.GetBytes());
  284. // TODO Are the keys returned here ECDSA, as Java version forces?
  285. pubSpec = PublicKeyFactory.CreateKey(pubInfo);
  286. }
  287. else
  288. {
  289. pubSpec = ECKeyPairGenerator.GetCorrespondingPublicKey(
  290. (ECPrivateKeyParameters)privSpec);
  291. }
  292. break;
  293. }
  294. case "ENCRYPTED":
  295. {
  296. char[] password = pFinder.GetPassword();
  297. if (password == null)
  298. throw new PasswordException("Password is null, but a password is required");
  299. return PrivateKeyFactory.DecryptKey(password, EncryptedPrivateKeyInfo.GetInstance(seq));
  300. }
  301. case "":
  302. {
  303. return PrivateKeyFactory.CreateKey(PrivateKeyInfo.GetInstance(seq));
  304. }
  305. default:
  306. throw new ArgumentException("Unknown key type: " + type, "type");
  307. }
  308. return new AsymmetricCipherKeyPair(pubSpec, privSpec);
  309. }
  310. catch (IOException e)
  311. {
  312. throw e;
  313. }
  314. catch (Exception e)
  315. {
  316. throw new PemException(
  317. "problem creating " + type + " private key: " + e.ToString());
  318. }
  319. }
  320. // TODO Add an equivalent class for ECNamedCurveParameterSpec?
  321. //private ECNamedCurveParameterSpec ReadECParameters(
  322. // private X9ECParameters ReadECParameters(PemObject pemObject)
  323. // {
  324. // DerObjectIdentifier oid = (DerObjectIdentifier)Asn1Object.FromByteArray(pemObject.Content);
  325. //
  326. // //return ECNamedCurveTable.getParameterSpec(oid.Id);
  327. // return GetCurveParameters(oid.Id);
  328. // }
  329. private static X9ECParameters GetCurveParameters(string name)
  330. {
  331. X9ECParameters ecP = ECKeyPairGenerator.FindECCurveByName(name);
  332. if (ecP == null)
  333. throw new Exception("unknown curve name: " + name);
  334. return ecP;
  335. }
  336. }
  337. }
  338. #pragma warning restore
  339. #endif