BcTlsRawKeyCertificate.cs 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511
  1. #if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR)
  2. #pragma warning disable
  3. using System;
  4. using System.IO;
  5. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1;
  6. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.Cmp;
  7. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Asn1.X509;
  8. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto;
  9. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Engines;
  10. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Parameters;
  11. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Crypto.Signers;
  12. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Math;
  13. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Security;
  14. using Best.HTTP.SecureProtocol.Org.BouncyCastle.Utilities;
  15. namespace Best.HTTP.SecureProtocol.Org.BouncyCastle.Tls.Crypto.Impl.BC
  16. {
  17. /// <summary>Implementation class for a single X.509 certificate based on the BC light-weight API.</summary>
  18. public class BcTlsRawKeyCertificate
  19. : TlsCertificate
  20. {
  21. protected readonly BcTlsCrypto m_crypto;
  22. protected readonly SubjectPublicKeyInfo m_keyInfo;
  23. protected DHPublicKeyParameters m_pubKeyDH = null;
  24. protected ECPublicKeyParameters m_pubKeyEC = null;
  25. protected Ed25519PublicKeyParameters m_pubKeyEd25519 = null;
  26. protected Ed448PublicKeyParameters m_pubKeyEd448 = null;
  27. protected RsaKeyParameters m_pubKeyRsa = null;
  28. /// <exception cref="IOException"/>
  29. public BcTlsRawKeyCertificate(BcTlsCrypto crypto, byte[] encoding)
  30. : this(crypto, SubjectPublicKeyInfo.GetInstance(encoding))
  31. {
  32. }
  33. public BcTlsRawKeyCertificate(BcTlsCrypto crypto, SubjectPublicKeyInfo keyInfo)
  34. {
  35. m_crypto = crypto;
  36. m_keyInfo = keyInfo;
  37. }
  38. public virtual SubjectPublicKeyInfo SubjectPublicKeyInfo => m_keyInfo;
  39. /// <exception cref="IOException"/>
  40. public virtual TlsEncryptor CreateEncryptor(int tlsCertificateRole)
  41. {
  42. ValidateKeyUsage(KeyUsage.KeyEncipherment);
  43. switch (tlsCertificateRole)
  44. {
  45. case TlsCertificateRole.RsaEncryption:
  46. {
  47. this.m_pubKeyRsa = GetPubKeyRsa();
  48. return new BcTlsRsaEncryptor(m_crypto, m_pubKeyRsa);
  49. }
  50. // TODO[gmssl]
  51. //case TlsCertificateRole.Sm2Encryption:
  52. //{
  53. // this.m_pubKeyEC = GetPubKeyEC();
  54. // return new BcTlsSM2Encryptor(m_crypto, m_pubKeyEC);
  55. //}
  56. }
  57. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  58. }
  59. /// <exception cref="IOException"/>
  60. public virtual TlsVerifier CreateVerifier(short signatureAlgorithm)
  61. {
  62. switch (signatureAlgorithm)
  63. {
  64. case SignatureAlgorithm.ed25519:
  65. case SignatureAlgorithm.ed448:
  66. {
  67. int signatureScheme = SignatureScheme.From(HashAlgorithm.Intrinsic, signatureAlgorithm);
  68. Tls13Verifier tls13Verifier = CreateVerifier(signatureScheme);
  69. return new LegacyTls13Verifier(signatureScheme, tls13Verifier);
  70. }
  71. }
  72. ValidateKeyUsage(KeyUsage.DigitalSignature);
  73. switch (signatureAlgorithm)
  74. {
  75. case SignatureAlgorithm.dsa:
  76. return new BcTlsDsaVerifier(m_crypto, GetPubKeyDss());
  77. case SignatureAlgorithm.ecdsa:
  78. return new BcTlsECDsaVerifier(m_crypto, GetPubKeyEC());
  79. case SignatureAlgorithm.rsa:
  80. {
  81. ValidateRsa_Pkcs1();
  82. return new BcTlsRsaVerifier(m_crypto, GetPubKeyRsa());
  83. }
  84. case SignatureAlgorithm.rsa_pss_pss_sha256:
  85. case SignatureAlgorithm.rsa_pss_pss_sha384:
  86. case SignatureAlgorithm.rsa_pss_pss_sha512:
  87. {
  88. ValidateRsa_Pss_Pss(signatureAlgorithm);
  89. int signatureScheme = SignatureScheme.From(HashAlgorithm.Intrinsic, signatureAlgorithm);
  90. return new BcTlsRsaPssVerifier(m_crypto, GetPubKeyRsa(), signatureScheme);
  91. }
  92. case SignatureAlgorithm.rsa_pss_rsae_sha256:
  93. case SignatureAlgorithm.rsa_pss_rsae_sha384:
  94. case SignatureAlgorithm.rsa_pss_rsae_sha512:
  95. {
  96. ValidateRsa_Pss_Rsae();
  97. int signatureScheme = SignatureScheme.From(HashAlgorithm.Intrinsic, signatureAlgorithm);
  98. return new BcTlsRsaPssVerifier(m_crypto, GetPubKeyRsa(), signatureScheme);
  99. }
  100. default:
  101. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  102. }
  103. }
  104. /// <exception cref="IOException"/>
  105. public virtual Tls13Verifier CreateVerifier(int signatureScheme)
  106. {
  107. ValidateKeyUsage(KeyUsage.DigitalSignature);
  108. switch (signatureScheme)
  109. {
  110. case SignatureScheme.ecdsa_brainpoolP256r1tls13_sha256:
  111. case SignatureScheme.ecdsa_brainpoolP384r1tls13_sha384:
  112. case SignatureScheme.ecdsa_brainpoolP512r1tls13_sha512:
  113. case SignatureScheme.ecdsa_secp256r1_sha256:
  114. case SignatureScheme.ecdsa_secp384r1_sha384:
  115. case SignatureScheme.ecdsa_secp521r1_sha512:
  116. case SignatureScheme.ecdsa_sha1:
  117. {
  118. int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme);
  119. IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
  120. ISigner verifier = new DsaDigestSigner(new ECDsaSigner(), digest);
  121. verifier.Init(false, GetPubKeyEC());
  122. return new BcTls13Verifier(verifier);
  123. }
  124. case SignatureScheme.ed25519:
  125. {
  126. Ed25519Signer verifier = new Ed25519Signer();
  127. verifier.Init(false, GetPubKeyEd25519());
  128. return new BcTls13Verifier(verifier);
  129. }
  130. case SignatureScheme.ed448:
  131. {
  132. Ed448Signer verifier = new Ed448Signer(TlsUtilities.EmptyBytes);
  133. verifier.Init(false, GetPubKeyEd448());
  134. return new BcTls13Verifier(verifier);
  135. }
  136. case SignatureScheme.rsa_pkcs1_sha1:
  137. case SignatureScheme.rsa_pkcs1_sha256:
  138. case SignatureScheme.rsa_pkcs1_sha384:
  139. case SignatureScheme.rsa_pkcs1_sha512:
  140. {
  141. ValidateRsa_Pkcs1();
  142. int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme);
  143. IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
  144. RsaDigestSigner verifier = new RsaDigestSigner(digest,
  145. TlsCryptoUtilities.GetOidForHash(cryptoHashAlgorithm));
  146. verifier.Init(false, GetPubKeyRsa());
  147. return new BcTls13Verifier(verifier);
  148. }
  149. case SignatureScheme.rsa_pss_pss_sha256:
  150. case SignatureScheme.rsa_pss_pss_sha384:
  151. case SignatureScheme.rsa_pss_pss_sha512:
  152. {
  153. ValidateRsa_Pss_Pss(SignatureScheme.GetSignatureAlgorithm(signatureScheme));
  154. int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme);
  155. IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
  156. PssSigner verifier = new PssSigner(new RsaEngine(), digest, digest.GetDigestSize());
  157. verifier.Init(false, GetPubKeyRsa());
  158. return new BcTls13Verifier(verifier);
  159. }
  160. case SignatureScheme.rsa_pss_rsae_sha256:
  161. case SignatureScheme.rsa_pss_rsae_sha384:
  162. case SignatureScheme.rsa_pss_rsae_sha512:
  163. {
  164. ValidateRsa_Pss_Rsae();
  165. int cryptoHashAlgorithm = SignatureScheme.GetCryptoHashAlgorithm(signatureScheme);
  166. IDigest digest = m_crypto.CreateDigest(cryptoHashAlgorithm);
  167. PssSigner verifier = new PssSigner(new RsaEngine(), digest, digest.GetDigestSize());
  168. verifier.Init(false, GetPubKeyRsa());
  169. return new BcTls13Verifier(verifier);
  170. }
  171. // TODO[RFC 8998]
  172. //case SignatureScheme.sm2sig_sm3:
  173. //{
  174. // ParametersWithID parametersWithID = new ParametersWithID(GetPubKeyEC(),
  175. // Strings.ToByteArray("TLSv1.3+GM+Cipher+Suite"));
  176. // SM2Signer verifier = new SM2Signer();
  177. // verifier.Init(false, parametersWithID);
  178. // return new BcTls13Verifier(verifier);
  179. //}
  180. default:
  181. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  182. }
  183. }
  184. /// <exception cref="IOException"/>
  185. public virtual byte[] GetEncoded()
  186. {
  187. return m_keyInfo.GetEncoded(Asn1Encodable.Der);
  188. }
  189. /// <exception cref="IOException"/>
  190. public virtual byte[] GetExtension(DerObjectIdentifier extensionOid)
  191. {
  192. return null;
  193. }
  194. public virtual BigInteger SerialNumber => null;
  195. public virtual string SigAlgOid => null;
  196. public virtual Asn1Encodable GetSigAlgParams() => null;
  197. /// <exception cref="IOException"/>
  198. public virtual short GetLegacySignatureAlgorithm()
  199. {
  200. AsymmetricKeyParameter publicKey = GetPublicKey();
  201. if (publicKey.IsPrivate)
  202. throw new TlsFatalAlert(AlertDescription.internal_error);
  203. if (!SupportsKeyUsage(KeyUsage.DigitalSignature))
  204. return -1;
  205. /*
  206. * RFC 5246 7.4.6. Client Certificate
  207. */
  208. /*
  209. * RSA public key; the certificate MUST allow the key to be used for signing with the
  210. * signature scheme and hash algorithm that will be employed in the certificate verify
  211. * message.
  212. */
  213. if (publicKey is RsaKeyParameters)
  214. return SignatureAlgorithm.rsa;
  215. /*
  216. * DSA public key; the certificate MUST allow the key to be used for signing with the
  217. * hash algorithm that will be employed in the certificate verify message.
  218. */
  219. if (publicKey is DsaPublicKeyParameters)
  220. return SignatureAlgorithm.dsa;
  221. /*
  222. * ECDSA-capable public key; the certificate MUST allow the key to be used for signing
  223. * with the hash algorithm that will be employed in the certificate verify message; the
  224. * public key MUST use a curve and point format supported by the server.
  225. */
  226. if (publicKey is ECPublicKeyParameters)
  227. {
  228. // TODO Check the curve and point format
  229. return SignatureAlgorithm.ecdsa;
  230. }
  231. return -1;
  232. }
  233. /// <exception cref="IOException"/>
  234. public virtual DHPublicKeyParameters GetPubKeyDH()
  235. {
  236. try
  237. {
  238. return (DHPublicKeyParameters)GetPublicKey();
  239. }
  240. catch (InvalidCastException e)
  241. {
  242. throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
  243. }
  244. }
  245. /// <exception cref="IOException"/>
  246. public virtual DsaPublicKeyParameters GetPubKeyDss()
  247. {
  248. try
  249. {
  250. return (DsaPublicKeyParameters)GetPublicKey();
  251. }
  252. catch (InvalidCastException e)
  253. {
  254. throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
  255. }
  256. }
  257. /// <exception cref="IOException"/>
  258. public virtual ECPublicKeyParameters GetPubKeyEC()
  259. {
  260. try
  261. {
  262. return (ECPublicKeyParameters)GetPublicKey();
  263. }
  264. catch (InvalidCastException e)
  265. {
  266. throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
  267. }
  268. }
  269. /// <exception cref="IOException"/>
  270. public virtual Ed25519PublicKeyParameters GetPubKeyEd25519()
  271. {
  272. try
  273. {
  274. return (Ed25519PublicKeyParameters)GetPublicKey();
  275. }
  276. catch (InvalidCastException e)
  277. {
  278. throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
  279. }
  280. }
  281. /// <exception cref="IOException"/>
  282. public virtual Ed448PublicKeyParameters GetPubKeyEd448()
  283. {
  284. try
  285. {
  286. return (Ed448PublicKeyParameters)GetPublicKey();
  287. }
  288. catch (InvalidCastException e)
  289. {
  290. throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
  291. }
  292. }
  293. /// <exception cref="IOException"/>
  294. public virtual RsaKeyParameters GetPubKeyRsa()
  295. {
  296. try
  297. {
  298. return (RsaKeyParameters)GetPublicKey();
  299. }
  300. catch (InvalidCastException e)
  301. {
  302. throw new TlsFatalAlert(AlertDescription.certificate_unknown, e);
  303. }
  304. }
  305. /// <exception cref="IOException"/>
  306. public virtual bool SupportsSignatureAlgorithm(short signatureAlgorithm)
  307. {
  308. return SupportsSignatureAlgorithm(signatureAlgorithm, KeyUsage.DigitalSignature);
  309. }
  310. /// <exception cref="IOException"/>
  311. public virtual bool SupportsSignatureAlgorithmCA(short signatureAlgorithm)
  312. {
  313. return SupportsSignatureAlgorithm(signatureAlgorithm, KeyUsage.KeyCertSign);
  314. }
  315. /// <exception cref="IOException"/>
  316. public virtual TlsCertificate CheckUsageInRole(int tlsCertificateRole)
  317. {
  318. switch (tlsCertificateRole)
  319. {
  320. case TlsCertificateRole.DH:
  321. {
  322. ValidateKeyUsage(KeyUsage.KeyAgreement);
  323. this.m_pubKeyDH = GetPubKeyDH();
  324. return this;
  325. }
  326. case TlsCertificateRole.ECDH:
  327. {
  328. ValidateKeyUsage(KeyUsage.KeyAgreement);
  329. this.m_pubKeyEC = GetPubKeyEC();
  330. return this;
  331. }
  332. }
  333. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  334. }
  335. /// <exception cref="IOException"/>
  336. protected virtual AsymmetricKeyParameter GetPublicKey()
  337. {
  338. try
  339. {
  340. return PublicKeyFactory.CreateKey(m_keyInfo);
  341. }
  342. catch (Exception e)
  343. {
  344. throw new TlsFatalAlert(AlertDescription.unsupported_certificate, e);
  345. }
  346. }
  347. protected virtual bool SupportsKeyUsage(int keyUsageBits)
  348. {
  349. return true;
  350. }
  351. protected virtual bool SupportsRsa_Pkcs1()
  352. {
  353. AlgorithmIdentifier pubKeyAlgID = m_keyInfo.AlgorithmID;
  354. return RsaUtilities.SupportsPkcs1(pubKeyAlgID);
  355. }
  356. protected virtual bool SupportsRsa_Pss_Pss(short signatureAlgorithm)
  357. {
  358. AlgorithmIdentifier pubKeyAlgID = m_keyInfo.AlgorithmID;
  359. return RsaUtilities.SupportsPss_Pss(signatureAlgorithm, pubKeyAlgID);
  360. }
  361. protected virtual bool SupportsRsa_Pss_Rsae()
  362. {
  363. AlgorithmIdentifier pubKeyAlgID = m_keyInfo.AlgorithmID;
  364. return RsaUtilities.SupportsPss_Rsae(pubKeyAlgID);
  365. }
  366. /// <exception cref="IOException"/>
  367. protected virtual bool SupportsSignatureAlgorithm(short signatureAlgorithm, int keyUsage)
  368. {
  369. if (!SupportsKeyUsage(keyUsage))
  370. return false;
  371. AsymmetricKeyParameter publicKey = GetPublicKey();
  372. switch (signatureAlgorithm)
  373. {
  374. case SignatureAlgorithm.rsa:
  375. return SupportsRsa_Pkcs1()
  376. && publicKey is RsaKeyParameters;
  377. case SignatureAlgorithm.dsa:
  378. return publicKey is DsaPublicKeyParameters;
  379. case SignatureAlgorithm.ecdsa:
  380. case SignatureAlgorithm.ecdsa_brainpoolP256r1tls13_sha256:
  381. case SignatureAlgorithm.ecdsa_brainpoolP384r1tls13_sha384:
  382. case SignatureAlgorithm.ecdsa_brainpoolP512r1tls13_sha512:
  383. return publicKey is ECPublicKeyParameters;
  384. case SignatureAlgorithm.ed25519:
  385. return publicKey is Ed25519PublicKeyParameters;
  386. case SignatureAlgorithm.ed448:
  387. return publicKey is Ed448PublicKeyParameters;
  388. case SignatureAlgorithm.rsa_pss_rsae_sha256:
  389. case SignatureAlgorithm.rsa_pss_rsae_sha384:
  390. case SignatureAlgorithm.rsa_pss_rsae_sha512:
  391. return SupportsRsa_Pss_Rsae()
  392. && publicKey is RsaKeyParameters;
  393. case SignatureAlgorithm.rsa_pss_pss_sha256:
  394. case SignatureAlgorithm.rsa_pss_pss_sha384:
  395. case SignatureAlgorithm.rsa_pss_pss_sha512:
  396. return SupportsRsa_Pss_Pss(signatureAlgorithm)
  397. && publicKey is RsaKeyParameters;
  398. default:
  399. return false;
  400. }
  401. }
  402. /// <exception cref="IOException"/>
  403. public virtual void ValidateKeyUsage(int keyUsageBits)
  404. {
  405. if (!SupportsKeyUsage(keyUsageBits))
  406. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  407. }
  408. /// <exception cref="IOException"/>
  409. protected virtual void ValidateRsa_Pkcs1()
  410. {
  411. if (!SupportsRsa_Pkcs1())
  412. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  413. }
  414. /// <exception cref="IOException"/>
  415. protected virtual void ValidateRsa_Pss_Pss(short signatureAlgorithm)
  416. {
  417. if (!SupportsRsa_Pss_Pss(signatureAlgorithm))
  418. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  419. }
  420. /// <exception cref="IOException"/>
  421. protected virtual void ValidateRsa_Pss_Rsae()
  422. {
  423. if (!SupportsRsa_Pss_Rsae())
  424. throw new TlsFatalAlert(AlertDescription.certificate_unknown);
  425. }
  426. }
  427. }
  428. #pragma warning restore
  429. #endif