2003-03-15 Sebastien Pouliot <spouliot@videotron.ca>
authorSebastien Pouliot <sebastien@ximian.com>
Sun, 16 Mar 2003 00:41:01 +0000 (00:41 -0000)
committerSebastien Pouliot <sebastien@ximian.com>
Sun, 16 Mar 2003 00:41:01 +0000 (00:41 -0000)
* PrivateKey.cs: New. Class to load or create PVK (PriVate Key)
files (a Microsoft specific file format for private keys).

2003-03-06  Sebastien Pouliot  <spouliot@videotron.ca>

* SoftwarePublisherCertificate.cs: New. Class to load or create
SPC files (which are PKCS#7 files containing only certificates
and CRL).

svn path=/trunk/mcs/; revision=12573

mcs/class/Mono.Security/Mono.Security.Authenticode/ChangeLog
mcs/class/Mono.Security/Mono.Security.Authenticode/PrivateKey.cs [new file with mode: 0644]

index b7b0e1b28daae67adec3d92b710254d5f7d73f6c..246ee77e8454e65a644dec0837751da182cb40cd 100644 (file)
@@ -1,3 +1,8 @@
+2003-03-15  Sebastien Pouliot  <spouliot@videotron.ca>
+
+       * PrivateKey.cs: New. Class to load or create PVK (PriVate Key)
+       files (a Microsoft specific file format for private keys).
+
 2003-03-06  Sebastien Pouliot  <spouliot@videotron.ca>
 
        * SoftwarePublisherCertificate.cs: New. Class to load or create
diff --git a/mcs/class/Mono.Security/Mono.Security.Authenticode/PrivateKey.cs b/mcs/class/Mono.Security/Mono.Security.Authenticode/PrivateKey.cs
new file mode 100644 (file)
index 0000000..35ccb82
--- /dev/null
@@ -0,0 +1,216 @@
+//
+// PrivateKey.cs - Private Key (PVK) Format Implementation
+//
+// Author:
+//     Sebastien Pouliot (spouliot@motus.com)
+//
+// (C) 2003 Motus Technologies Inc. (http://www.motus.com)
+//
+
+using System;
+using System.IO;
+using System.Security.Cryptography;
+using System.Text;
+
+using Mono.Security.Cryptography;
+
+namespace Mono.Security.Authenticode {
+
+       // References:
+       // a.   http://www.drh-consultancy.demon.co.uk/pvk.html
+
+       public class PrivateKey {
+
+               private const uint magic = 0xb0b5f11e;
+
+               private bool encrypted;
+               private RSA rsa;
+               private bool weak;
+               private int keyType;
+
+               public PrivateKey () 
+               {
+                       keyType = 2;    // required for MS makecert !!!
+               }
+
+               public PrivateKey (byte[] data, string password) 
+               {
+                       Decode (data, password);
+               }
+
+               public bool Encrypted {
+                       get { return encrypted; }
+               }
+
+               public int KeyType {
+                       get { return keyType; }
+                       set { keyType = value; }
+               }
+
+               public RSA RSA {
+                       get { return rsa; }
+                       set { rsa = value; }
+               }
+
+               public bool Weak {
+                       get { return ((encrypted) ? weak : true); }
+                       set { weak = value; }
+               }
+
+               private byte[] DeriveKey (byte[] salt, string password) 
+               {
+                       byte[] pwd = Encoding.ASCII.GetBytes (password);
+                       SHA1 sha1 = SHA1.Create ();
+                       sha1.TransformBlock (salt, 0, salt.Length, salt, 0);
+                       sha1.TransformFinalBlock (pwd, 0, pwd.Length);
+                       byte[] key = new byte [16];
+                       Array.Copy (sha1.Hash, 0, key, 0, 16);
+                       sha1.Clear ();
+                       Array.Clear (pwd, 0, pwd.Length);
+                       return key;     
+               }
+
+               private bool Decode (byte[] pvk, string password) 
+               {
+                       // DWORD magic
+                       if (BitConverter.ToUInt32 (pvk, 0) != magic)
+                               return false;
+                       // DWORD reserved
+                       if (BitConverter.ToUInt32 (pvk, 4) != 0x0)
+                               return false;
+                       // DWORD keytype
+                       keyType = BitConverter.ToInt32 (pvk, 8);
+                       // DWORD encrypted
+                       encrypted = (BitConverter.ToUInt32 (pvk, 12) == 1);
+                       // DWORD saltlen
+                       int saltlen = BitConverter.ToInt32 (pvk, 16);
+                       // DWORD keylen
+                       int keylen = BitConverter.ToInt32 (pvk, 20);
+                       byte[] keypair = new byte [keylen];
+                       Array.Copy (pvk, 24 + saltlen, keypair, 0, keylen);
+                       // read salt (if present)
+                       if (saltlen > 0) {
+                               if (password == null)
+                                       return false;
+
+                               byte[] salt = new byte [saltlen];
+                               Array.Copy (pvk, 24, salt, 0, saltlen);
+                               // first try with full (128) bits
+                               byte[] key = DeriveKey (salt, password);
+                               // decrypt in place and try this
+                               RC4 rc4 = RC4.Create ();
+                               ICryptoTransform dec = rc4.CreateDecryptor (key, null);
+                               int x = 24 + salt.Length + 8;
+                               dec.TransformBlock (keypair, 8, keypair.Length - 8, keypair, 8);
+                               rsa = CryptoConvert.FromCapiPrivateKeyBlob (keypair);
+                               if (rsa == null) {
+                                       weak = true;
+                                       // second change using weak crypto
+                                       Array.Copy (pvk, 24 + saltlen, keypair, 0, keylen);
+                                       // truncate the key to 40 bits
+                                       Array.Clear (key, 5, 11);
+                                       // decrypt
+                                       RC4 rc4b = RC4.Create ();
+                                       dec = rc4b.CreateDecryptor (key, null);
+                                       dec.TransformBlock (keypair, 8, keypair.Length - 8, keypair, 8);
+                                       rsa = CryptoConvert.FromCapiPrivateKeyBlob (keypair);
+                               }
+                               else
+                                       weak = false;
+                               Array.Clear (key, 0, key.Length);
+                       }
+                       else  {
+                               weak = true;
+                               // read unencrypted keypair
+                               rsa = CryptoConvert.FromCapiPrivateKeyBlob (keypair);
+                               Array.Clear (keypair, 0, keypair.Length);
+                       }
+
+                       // zeroize pvk (which could contain the unencrypted private key)
+                       Array.Clear (pvk, 0, pvk.Length);
+                       
+                       return (rsa != null);
+               }
+
+               public void Save (string filename) 
+               {
+                       Save (filename, null);
+               }
+
+               public void Save (string filename, string password) 
+               {
+                       byte[] blob = null;
+                       FileStream fs = File.Open (filename, FileMode.Create, FileAccess.Write);
+                       try {
+                               // header
+                               byte[] empty = new byte [4];
+                               byte[] data = BitConverter.GetBytes (magic);
+                               fs.Write (data, 0, 4);  // magic
+                               fs.Write (empty, 0, 4); // reserved
+                               data = BitConverter.GetBytes (keyType);
+                               fs.Write (data, 0, 4);  // key type
+
+                               encrypted = (password != null);
+                               blob = CryptoConvert.ToCapiPrivateKeyBlob (rsa);
+                               if (encrypted) {
+                                       data = BitConverter.GetBytes (1);
+                                       fs.Write (data, 0, 4);  // encrypted
+                                       data = BitConverter.GetBytes (16);
+                                       fs.Write (data, 0, 4);  // saltlen
+                                       data = BitConverter.GetBytes (blob.Length);
+                                       fs.Write (data, 0, 4);          // keylen
+
+                                       byte[] salt = new byte [16];
+                                       RC4 rc4 = RC4.Create ();
+                                       byte[] key = null;
+                                       try {
+                                               // generate new salt (16 bytes)
+                                               RandomNumberGenerator rng = RandomNumberGenerator.Create ();
+                                               rng.GetBytes (salt);
+                                               fs.Write (salt, 0, salt.Length);
+                                               key = DeriveKey (salt, password);
+                                               if (Weak)
+                                                       Array.Clear (key, 5, 11);
+                                               ICryptoTransform enc = rc4.CreateEncryptor (key, null);
+                                               // we don't encrypt the header part of the BLOB
+                                               enc.TransformBlock (blob, 8, blob.Length - 8, blob, 8);
+                                       }
+                                       finally {
+                                               Array.Clear (salt, 0, salt.Length);
+                                               Array.Clear (key, 0, key.Length);
+                                               rc4.Clear ();
+                                       }
+                               }
+                               else {
+                                       fs.Write (empty, 0, 4); // encrypted
+                                       fs.Write (empty, 0, 4); // saltlen
+                                       data = BitConverter.GetBytes (blob.Length);
+                                       fs.Write (data, 0, 4);          // keylen
+                               }
+               
+                               fs.Write (blob, 0, blob.Length);
+                       }
+                       finally {
+                               // BLOB may include an uncrypted keypair
+                               Array.Clear (blob, 0, blob.Length);
+                               fs.Close ();
+                       }
+               }
+
+               static public PrivateKey CreateFromFile (string filename) 
+               {
+                       return CreateFromFile (filename, null);
+               }
+
+               static public PrivateKey CreateFromFile (string filename, string password) 
+               {
+                       FileStream fs = File.Open (filename, FileMode.Open, FileAccess.Read, FileShare.Read);
+                       byte[] pvk = new byte [fs.Length];
+                       fs.Read (pvk, 0, pvk.Length);
+                       fs.Close ();
+
+                       return new PrivateKey (pvk, password);
+               }
+
+       }
+}