Merge pull request #309 from i59/patch-1
[mono.git] / mcs / class / System.ServiceModel / Mono.Security.Protocol.Tls / HttpsClientStream.cs
1 //
2 // HttpsClientStream.cs: Glue between HttpWebRequest and SslClientStream to
3 //      reduce reflection usage.
4 //
5 // Author:
6 //      Sebastien Pouliot  <sebastien@ximian.com>
7 //
8 // Copyright (C) 2004-2007 Novell, Inc. (http://www.novell.com)
9 //
10 // Permission is hereby granted, free of charge, to any person obtaining
11 // a copy of this software and associated documentation files (the
12 // "Software"), to deal in the Software without restriction, including
13 // without limitation the rights to use, copy, modify, merge, publish,
14 // distribute, sublicense, and/or sell copies of the Software, and to
15 // permit persons to whom the Software is furnished to do so, subject to
16 // the following conditions:
17 // 
18 // The above copyright notice and this permission notice shall be
19 // included in all copies or substantial portions of the Software.
20 // 
21 // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
22 // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
23 // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
24 // NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
25 // LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
26 // OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
27 // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
28 //
29
30 using System;
31 using System.IO;
32 using System.Net;
33 using System.Security.Cryptography;
34 using System.Security.Cryptography.X509Certificates;
35 using SNS = System.Net.Security;
36 using SNCX = System.Security.Cryptography.X509Certificates;
37
38 namespace Mono.Security.Protocol.Tls {
39
40         // Note: DO NOT REUSE this class - instead use SslClientStream
41
42         internal class HttpsClientStream : SslClientStream {
43
44                 private HttpWebRequest _request;
45                 private int _status;
46
47                 public HttpsClientStream (Stream stream, X509CertificateCollection clientCertificates,
48                                         HttpWebRequest request, byte [] buffer)
49                         : base (stream, request.Address.Host, false, (Mono.Security.Protocol.Tls.SecurityProtocolType)
50                                 ServicePointManager.SecurityProtocol, clientCertificates)
51                 {
52                         // this constructor permit access to the WebRequest to call
53                         // ICertificatePolicy.CheckValidationResult
54                         _request = request;
55                         _status = 0;
56                         if (buffer != null)
57                                 InputBuffer.Write (buffer, 0, buffer.Length);
58                         // also saved from reflection
59                         base.CheckCertRevocationStatus = ServicePointManager.CheckCertificateRevocationList;
60                         ClientCertSelection += delegate (X509CertificateCollection clientCerts, X509Certificate serverCertificate,
61                                 string targetHost, X509CertificateCollection serverRequestedCertificates) {
62                                 return ((clientCerts == null) || (clientCerts.Count == 0)) ? null : clientCerts [0];
63                         };
64                         PrivateKeySelection += delegate (X509Certificate certificate, string targetHost) {
65                                 X509Certificate2 cert = (certificate as X509Certificate2);
66                                 return (cert == null) ? null : cert.PrivateKey;
67                         };
68                }
69
70                 public bool TrustFailure {
71                         get { 
72                                 switch (_status) {
73                                 case -2146762486: // CERT_E_CHAINING            0x800B010A
74                                 case -2146762487: // CERT_E_UNTRUSTEDROOT       0x800B0109
75                                         return true;
76                                 default:
77                                         return false;
78                                 }
79                         }
80                 }
81
82                 internal override bool RaiseServerCertificateValidation (X509Certificate certificate, int[] certificateErrors)
83                 {
84                         bool failed = (certificateErrors.Length > 0);
85                         // only one problem can be reported by this interface
86                         _status = ((failed) ? certificateErrors [0] : 0);
87
88 #pragma warning disable 618
89                         if (ServicePointManager.CertificatePolicy != null) {
90                                 ServicePoint sp = _request.ServicePoint;
91                                 bool res = ServicePointManager.CertificatePolicy.CheckValidationResult (sp, certificate, _request, _status);
92                                 if (!res)
93                                         return false;
94                                 failed = true;
95                         }
96 #pragma warning restore 618
97                         if (HaveRemoteValidation2Callback)
98                                 return failed; // The validation already tried the 2.0 callback 
99  
100                         SNS.RemoteCertificateValidationCallback cb = ServicePointManager.ServerCertificateValidationCallback;
101                         if (cb != null) {
102                                 SNS.SslPolicyErrors ssl_errors = 0;
103                                 foreach (int i in certificateErrors) {
104                                         if (i == (int)-2146762490) // TODO: is this what happens when the purpose is wrong?
105                                                 ssl_errors |= SNS.SslPolicyErrors.RemoteCertificateNotAvailable;
106                                         else if (i == (int) -2146762481)
107                                                 ssl_errors |= SNS.SslPolicyErrors.RemoteCertificateNameMismatch;
108                                         else
109                                                 ssl_errors |= SNS.SslPolicyErrors.RemoteCertificateChainErrors;
110                                 }
111                                 SNCX.X509Certificate2 cert2 = new SNCX.X509Certificate2 (certificate.GetRawCertData ());
112                                 SNCX.X509Chain chain = new SNCX.X509Chain ();
113                                 if (!chain.Build (cert2))
114                                         ssl_errors |= SNS.SslPolicyErrors.RemoteCertificateChainErrors;
115                                 return cb (_request, cert2, chain, ssl_errors);
116                         }
117                         return failed;
118                 }
119         }
120 }