2 // X509Certificate.cs: Handles X.509 certificates.
5 // Sebastien Pouliot <sebastien@ximian.com>
7 // (C) 2002, 2003 Motus Technologies Inc. (http://www.motus.com)
8 // Copyright (C) 2004-2006 Novell, Inc (http://www.novell.com)
10 // Permission is hereby granted, free of charge, to any person obtaining
11 // a copy of this software and associated documentation files (the
12 // "Software"), to deal in the Software without restriction, including
13 // without limitation the rights to use, copy, modify, merge, publish,
14 // distribute, sublicense, and/or sell copies of the Software, and to
15 // permit persons to whom the Software is furnished to do so, subject to
16 // the following conditions:
18 // The above copyright notice and this permission notice shall be
19 // included in all copies or substantial portions of the Software.
21 // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
22 // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
23 // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
24 // NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
25 // LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
26 // OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
27 // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
31 using System.Runtime.InteropServices;
32 using System.Security.Permissions;
36 using Mono.Security.Authenticode;
37 using Mono.Security.X509;
40 using System.Runtime.Serialization;
43 namespace System.Security.Cryptography.X509Certificates {
46 // a. Internet X.509 Public Key Infrastructure Certificate and CRL Profile
47 // http://www.ietf.org/rfc/rfc3280.txt
49 // LAMESPEC: the MSDN docs always talks about X509v3 certificates
50 // and/or Authenticode certs. However this class works with older
51 // X509v1 certificates and non-authenticode (code signing) certs.
54 public partial class X509Certificate : IDeserializationCallback, ISerializable {
56 public class X509Certificate {
58 // typedef struct _CERT_CONTEXT {
59 // DWORD dwCertEncodingType;
60 // BYTE *pbCertEncoded;
61 // DWORD cbCertEncoded;
62 // PCERT_INFO pCertInfo;
63 // HCERTSTORE hCertStore;
64 // } CERT_CONTEXT, *PCERT_CONTEXT;
65 // typedef const CERT_CONTEXT *PCCERT_CONTEXT;
66 [StructLayout (LayoutKind.Sequential)]
67 internal struct CertificateContext {
68 public UInt32 dwCertEncodingType;
69 public IntPtr pbCertEncoded;
70 public UInt32 cbCertEncoded;
71 public IntPtr pCertInfo;
72 public IntPtr hCertStore;
74 // NOTE: We only define the CryptoAPI structure (from WINCRYPT.H)
75 // so we don't create any dependencies on Windows DLL in corlib
77 private Mono.Security.X509.X509Certificate x509;
78 private bool hideDates;
79 private byte[] cachedCertificateHash;
81 // almost every byte[] returning function has a string equivalent
82 // sadly the BitConverter insert dash between bytes :-(
83 private string tostr (byte[] data)
86 StringBuilder sb = new StringBuilder ();
87 for (int i = 0; i < data.Length; i++)
88 sb.Append (data[i].ToString ("X2"));
89 return sb.ToString ();
97 public static X509Certificate CreateFromCertFile (string filename)
99 byte[] data = Load (filename);
100 return new X509Certificate (data);
103 [MonoTODO ("Incomplete - minimal validation in this version")]
104 public static X509Certificate CreateFromSignedFile (string filename)
107 AuthenticodeDeformatter a = new AuthenticodeDeformatter (filename);
108 if (a.SigningCertificate != null) {
110 // before 2.0 the signing certificate is returned only if the signature is valid
112 string msg = String.Format (Locale.GetText (
113 "Invalid digital signature on {0}, reason #{1}."),
115 throw new COMException (msg);
118 return new X509Certificate (a.SigningCertificate.RawData);
121 catch (SecurityException) {
122 // don't wrap SecurityException into a COMException
125 catch (Exception e) {
126 string msg = Locale.GetText ("Couldn't extract digital signature from {0}.", filename);
127 throw new COMException (msg, e);
130 throw new CryptographicException (Locale.GetText ("{0} isn't signed.", filename));
132 // if no signature is present return an empty certificate
133 byte[] cert = null; // must not confuse compiler about null ;)
134 return new X509Certificate (cert);
140 // special constructor for Publisher (and related classes).
141 // Dates strings are null
142 internal X509Certificate (byte[] data, bool dates)
146 Import (data, (string)null, X509KeyStorageFlags.DefaultKeySet);
148 x509 = new Mono.Security.X509.X509Certificate (data);
154 public X509Certificate (byte[] data) : this (data, true)
158 public X509Certificate (IntPtr handle)
161 if (handle == IntPtr.Zero)
162 throw new ArgumentException ("Invalid handle.");
164 InitFromHandle (handle);
167 [SecurityPermission (SecurityAction.Demand, UnmanagedCode = true)]
168 private void InitFromHandle (IntPtr handle)
170 if (handle != IntPtr.Zero) {
171 // both Marshal.PtrToStructure and Marshal.Copy use LinkDemand (so they will always success from here)
172 CertificateContext cc = (CertificateContext) Marshal.PtrToStructure (handle, typeof (CertificateContext));
173 byte[] data = new byte [cc.cbCertEncoded];
174 Marshal.Copy (cc.pbCertEncoded, data, 0, (int)cc.cbCertEncoded);
175 x509 = new Mono.Security.X509.X509Certificate (data);
177 // for 1.x IntPtr.Zero results in an "empty" certificate instance
180 public X509Certificate (System.Security.Cryptography.X509Certificates.X509Certificate cert)
184 throw new ArgumentNullException ("cert");
188 byte[] data = cert.GetRawCertData ();
190 x509 = new Mono.Security.X509.X509Certificate (data);
198 public virtual bool Equals (System.Security.Cryptography.X509Certificates.X509Certificate cert)
203 if (cert.x509 == null) {
207 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
209 return (x509 == null);
213 byte[] raw = cert.x509.RawData;
217 if (x509.RawData == null)
219 if (raw.Length == x509.RawData.Length) {
220 for (int i = 0; i < raw.Length; i++) {
221 if (raw[i] != x509.RawData [i])
224 // well no choice must be equals!
231 return ((x509 == null) || (x509.RawData == null));
234 // LAMESPEC: This is the equivalent of the "thumbprint" that can be seen
235 // in the certificate viewer of Windows. This is ALWAYS the SHA1 hash of
236 // the certificate (i.e. it has nothing to do with the actual hash
237 // algorithm used to sign the certificate).
238 public virtual byte[] GetCertHash ()
242 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
244 // we'll hash the cert only once and only if required
245 if ((cachedCertificateHash == null) && (x509 != null)) {
246 SHA1 sha = SHA1.Create ();
247 cachedCertificateHash = sha.ComputeHash (x509.RawData);
249 return cachedCertificateHash;
252 public virtual string GetCertHashString ()
254 // must call GetCertHash (not variable) or optimization wont work
255 return tostr (GetCertHash ());
258 // strangly there are no DateTime returning function
259 public virtual string GetEffectiveDateString ()
265 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
267 return x509.ValidFrom.ToString ();
269 // LAMESPEC: Microsoft returns the local time from Pacific Time (GMT-8)
270 // BUG: This will not be corrected in Framework 1.1 and also affect WSE 1.0
271 return x509.ValidFrom.ToUniversalTime ().AddHours (-8).ToString ();
275 // strangly there are no DateTime returning function
276 public virtual string GetExpirationDateString ()
282 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
284 return x509.ValidUntil.ToString ();
286 // LAMESPEC: Microsoft returns the local time from Pacific Time (GMT-8)
287 // BUG: This will not be corrected in Framework 1.1 and also affect WSE 1.0
288 return x509.ValidUntil.ToUniversalTime ().AddHours (-8).ToString ();
292 // well maybe someday there'll be support for PGP or SPKI ?
293 public virtual string GetFormat ()
295 return "X509"; // DO NOT TRANSLATE
298 public override int GetHashCode ()
304 // the cert hash may not be (yet) calculated
305 if (cachedCertificateHash == null)
308 // return the integer of the first 4 bytes of the cert hash
309 if ((cachedCertificateHash != null) && (cachedCertificateHash.Length >= 4))
310 return ((cachedCertificateHash[0] << 24) |(cachedCertificateHash[1] << 16) |
311 (cachedCertificateHash[2] << 8) | cachedCertificateHash[3]);
317 [Obsolete ("Use the Issuer property.")]
319 public virtual string GetIssuerName ()
323 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
325 return x509.IssuerName;
328 public virtual string GetKeyAlgorithm ()
332 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
334 return x509.KeyAlgorithm;
337 public virtual byte[] GetKeyAlgorithmParameters ()
341 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
343 byte[] kap = x509.KeyAlgorithmParameters;
345 throw new CryptographicException (Locale.GetText ("Parameters not part of the certificate"));
349 return x509.KeyAlgorithmParameters;
353 public virtual string GetKeyAlgorithmParametersString ()
355 return tostr (GetKeyAlgorithmParameters ());
359 [Obsolete ("Use the Subject property.")]
361 public virtual string GetName ()
365 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
367 return x509.SubjectName;
370 public virtual byte[] GetPublicKey ()
374 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
376 return x509.PublicKey;
379 public virtual string GetPublicKeyString ()
381 return tostr (GetPublicKey ());
384 public virtual byte[] GetRawCertData ()
388 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
391 return ((x509 != null) ? x509.RawData : null);
395 public virtual string GetRawCertDataString ()
399 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
400 return tostr (x509.RawData);
402 return ((x509 != null) ? tostr (x509.RawData) : null);
406 public virtual byte[] GetSerialNumber ()
410 throw new CryptographicException (Locale.GetText ("Certificate instance is empty."));
412 return x509.SerialNumber;
415 public virtual string GetSerialNumberString ()
417 byte[] sn = GetSerialNumber ();
424 // to please corcompare ;-)
425 public override string ToString ()
427 return base.ToString ();
430 public virtual string ToString (bool details)
432 if (!details || (x509 == null))
433 return base.ToString ();
435 string nl = Environment.NewLine;
436 StringBuilder sb = new StringBuilder ();
438 sb.AppendFormat ("[Subject]{0} {1}{0}{0}", nl, Subject);
439 sb.AppendFormat ("[Issuer]{0} {1}{0}{0}", nl, Issuer);
440 sb.AppendFormat ("[Not Before]{0} {1}{0}{0}", nl, GetEffectiveDateString ());
441 sb.AppendFormat ("[Not After]{0} {1}{0}{0}", nl, GetExpirationDateString ());
442 sb.AppendFormat ("[Thumbprint]{0} {1}{0}", nl, GetCertHashString ());
444 sb.Append ("CERTIFICATE:");
446 sb.Append ("\tFormat: ");
447 sb.Append (GetFormat ());
448 if (x509.SubjectName != null) {
450 sb.Append ("\tName: ");
451 sb.Append (GetName ());
453 if (x509.IssuerName != null) {
455 sb.Append ("\tIssuing CA: ");
456 sb.Append (GetIssuerName ());
458 if (x509.SignatureAlgorithm != null) {
460 sb.Append ("\tKey Algorithm: ");
461 sb.Append (GetKeyAlgorithm ());
463 if (x509.SerialNumber != null) {
465 sb.Append ("\tSerial Number: ");
466 sb.Append (GetSerialNumberString ());
468 // Note: Algorithm is not spelled right as the actual
469 // MS implementation (we do exactly the same for the
470 // comparison in the unit tests)
471 if (x509.KeyAlgorithmParameters != null) {
473 sb.Append ("\tKey Alogrithm Parameters: ");
474 sb.Append (GetKeyAlgorithmParametersString ());
476 if (x509.PublicKey != null) {
478 sb.Append ("\tPublic Key: ");
479 sb.Append (GetPublicKeyString ());
484 return sb.ToString ();
487 private static byte[] Load (string fileName)
490 using (FileStream fs = File.OpenRead (fileName)) {
491 data = new byte [fs.Length];
492 fs.Read (data, 0, data.Length);