public async Task <StatusMessage> RevokeCertificate(ILog log, ManagedCertificate managedCertificate) { // get current PFX, extract DER bytes try { var pkcs = new Org.BouncyCastle.Pkcs.Pkcs12Store(File.Open(managedCertificate.CertificatePath, FileMode.Open), "".ToCharArray()); var certAliases = pkcs.Aliases.GetEnumerator(); certAliases.MoveNext(); var certEntry = pkcs.GetCertificate(certAliases.Current.ToString()); var certificate = certEntry.Certificate; // revoke certificat var der = certificate.GetEncoded(); await _acme.RevokeCertificate(der, RevocationReason.Unspecified, null); } catch (Exception exp) { return(new StatusMessage { IsOK = false, Message = $"Failed to revoke certificate: {exp.Message}" }); } return(new StatusMessage { IsOK = true, Message = "Certificate revoked" }); }
public async Task <StatusMessage> RevokeCertificate(ILog log, ManagedCertificate managedCertificate) { try { var pkcs = new Org.BouncyCastle.Pkcs.Pkcs12Store(File.Open(managedCertificate.CertificatePath, FileMode.Open), "".ToCharArray()); var certAliases = pkcs.Aliases.GetEnumerator(); certAliases.MoveNext(); var certEntry = pkcs.GetCertificate(certAliases.Current.ToString()); var certificate = certEntry.Certificate; // revoke certificate var der = certificate.GetEncoded(); await _client.RevokeCertificateAsync(der, RevokeReason.Unspecified); return(new StatusMessage { IsOK = true, Message = $"Certificate revoke completed." }); } catch (Exception exp) { return(new StatusMessage { IsOK = false, Message = $"Failed to revoke certificate: {exp.Message}" }); } }
public string AddSignature(string PathSource, string PathTarget, string CertPath, string CertPass, int lx = 100, int ly = 100, int ux = 250, int uy = 150, int page = 1, bool Visible = true) { try { Org.BouncyCastle.Crypto.AsymmetricKeyParameter Akp = null; Org.BouncyCastle.X509.X509Certificate[] Chain = null; string alias = null; Org.BouncyCastle.Pkcs.Pkcs12Store pk12; pk12 = new Org.BouncyCastle.Pkcs.Pkcs12Store(new System.IO.FileStream(CertPath, System.IO.FileMode.Open, System.IO.FileAccess.Read), CertPass.ToCharArray()); IEnumerable aliases = pk12.Aliases; foreach (string aliasTemp in aliases) { alias = aliasTemp; if (pk12.IsKeyEntry(alias)) { break; } } Akp = pk12.GetKey(alias).Key; Org.BouncyCastle.Pkcs.X509CertificateEntry[] ce = pk12.GetCertificateChain(alias); Chain = new Org.BouncyCastle.X509.X509Certificate[ce.Length]; for (int k = 0; k < ce.Length; ++k) { Chain[k] = ce[k].Certificate; } iTextSharp.text.pdf.PdfReader reader = new iTextSharp.text.pdf.PdfReader(PathSource); iTextSharp.text.pdf.PdfStamper st = iTextSharp.text.pdf.PdfStamper.CreateSignature(reader, new System.IO.FileStream(PathTarget, System.IO.FileMode.Create, System.IO.FileAccess.Write), '\0', null, true); iTextSharp.text.pdf.PdfSignatureAppearance sap = st.SignatureAppearance; if (Visible == true) { page = (page <1 || page> reader.NumberOfPages) ? 1 : page; sap.SetVisibleSignature(new iTextSharp.text.Rectangle(lx, ly, ux, uy), page, null); } sap.CertificationLevel = iTextSharp.text.pdf.PdfSignatureAppearance.CERTIFIED_NO_CHANGES_ALLOWED; // digital signature - http://itextpdf.com/examples/iia.php?id=222 IExternalSignature es = new PrivateKeySignature(Akp, "SHA-256"); // "BC" MakeSignature.SignDetached(sap, es, new X509Certificate[] { pk12.GetCertificate(alias).Certificate }, null, null, null, 0, CryptoStandard.CMS); st.Close(); return(""); } catch (Exception e) { return(e.Message); } }
private (RsaPrivateCrtKeyParameters rsaPrivateKey, X509Certificate certificate) Extract(Stream stream, string password) { Org.BouncyCastle.Pkcs.Pkcs12Store p12Store = new Org.BouncyCastle.Pkcs.Pkcs12Store(stream, password.ToCharArray()); string keyEntryAlias = p12Store.Aliases.Cast <string>().FirstOrDefault(t => p12Store.IsKeyEntry(t)); Org.BouncyCastle.Pkcs.X509CertificateEntry x509CertEntry = p12Store.GetCertificate(keyEntryAlias); Org.BouncyCastle.Pkcs.AsymmetricKeyEntry keyEntry = p12Store.GetKey(keyEntryAlias); return(keyEntry.Key as RsaPrivateCrtKeyParameters, x509CertEntry.Certificate); }
public X509Crl GenerateCRL() { var coreCApkcs = new Org.BouncyCastle.Pkcs.Pkcs12Store( new FileStream(CAConfig.CoreCACertPath, FileMode.Open, FileAccess.Read), "".ToCharArray() ); string alias = System.Environment.MachineName; Org.BouncyCastle.X509.X509Certificate coreCaCert = coreCApkcs.GetCertificate(alias).Certificate; X509V2CrlGenerator crlGen = new X509V2CrlGenerator(); DateTime now = DateTime.UtcNow; crlGen.SetIssuerDN(coreCaCert.SubjectDN); crlGen.SetThisUpdate(now); crlGen.SetNextUpdate(now.AddMinutes(Constants.CRLNextUpdatedIntervalMinutes)); var revokedPubCerts = _dbContext.PublicCertificates.Where(p => p.IsRevoked); foreach (PublicCertificate pubCert in revokedPubCerts) { crlGen.AddCrlEntry( new Org.BouncyCastle.Math.BigInteger(pubCert.GetSerialNumber().SerialNrBytes), now, Org.BouncyCastle.Asn1.X509.CrlReason.KeyCompromise ); } crlGen.AddExtension( Org.BouncyCastle.Asn1.X509.X509Extensions.AuthorityKeyIdentifier, false, new Org.BouncyCastle.X509.Extension.AuthorityKeyIdentifierStructure( coreCaCert.GetPublicKey() ) ); X509Crl crl = crlGen.Generate( new Org.BouncyCastle.Crypto.Operators.Asn1SignatureFactory( "SHA512WITHRSA", coreCApkcs.GetKey(alias).Key ) ); _logger.LogInformation( string.Format( "Generated CRL at {0} valid for {1} minutes", now, Constants.CRLNextUpdatedIntervalMinutes ) ); return(crl); }
public static void Test() { string pfxLocation = @"D:\lol\certificate.pfx"; pfxLocation = @"D:\username\Desktop\DesktopArchiv\20180329_Desktop\CORMailService\CORMailService\CORMailService\CORMailService_TemporaryKey.pfx"; Org.BouncyCastle.Pkcs.Pkcs12Store store = null; using (System.IO.Stream pfxStream = System.IO.File.OpenRead(pfxLocation)) { store = new Org.BouncyCastle.Pkcs.Pkcs12Store(pfxStream, "".ToCharArray()); } System.Console.WriteLine(store); foreach (string alias in store.Aliases) { System.Console.WriteLine(alias); // https://7thzero.com/blog/bouncy-castle-convert-a-bouncycastle-asymmetrickeyentry-to-a-.ne if (store.IsKeyEntry((string)alias)) { Org.BouncyCastle.Pkcs.AsymmetricKeyEntry keyEntry = store.GetKey(alias); System.Console.WriteLine(keyEntry); AsymmetricKeyParameter privateKey = keyEntry.Key; System.Console.WriteLine(privateKey.IsPrivate); } // End if (store.IsKeyEntry((string)alias)) Org.BouncyCastle.Pkcs.X509CertificateEntry certEntry = store.GetCertificate(alias); Org.BouncyCastle.X509.X509Certificate cert = certEntry.Certificate; System.Console.WriteLine(cert); AsymmetricKeyParameter publicKey = cert.GetPublicKey(); System.Console.WriteLine(publicKey); // Org.BouncyCastle.Pkcs.X509CertificateEntry[] chain = store.GetCertificateChain(alias); // System.Security.Cryptography.X509Certificates.X509Certificate2 cert2 = new System.Security.Cryptography.X509Certificates.X509Certificate2(cert.GetEncoded()); // Org.BouncyCastle.Security.DotNetUtilities.ToX509Certificate(cert); System.Security.Cryptography.X509Certificates.X509Certificate2 cert2 = new System.Security.Cryptography.X509Certificates.X509Certificate2(pfxLocation); // cert2.PrivateKey = null; if (cert2.HasPrivateKey) { System.Console.WriteLine(cert2.PrivateKey); } } }
/// <summary> /// Imports certificates and private keys from the specified stream. /// </summary> /// <remarks> /// <para>Imports certificates and private keys from the specified pkcs12 stream.</para> /// </remarks> /// <param name="stream">The stream to import.</param> /// <param name="password">The password to unlock the stream.</param> /// <exception cref="System.ArgumentNullException"> /// <para><paramref name="stream"/> is <c>null</c>.</para> /// <para>-or-</para> /// <para><paramref name="password"/> is <c>null</c>.</para> /// </exception> /// <exception cref="System.IO.IOException"> /// An error occurred reading the stream. /// </exception> public void Import(System.IO.Stream stream, string password) { if (stream == null) { throw new System.ArgumentNullException(nameof(stream)); } if (password == null) { throw new System.ArgumentNullException(nameof(password)); } Org.BouncyCastle.Pkcs.Pkcs12Store pkcs12 = new Org.BouncyCastle.Pkcs.Pkcs12Store(stream, password.ToCharArray()); foreach (string alias in pkcs12.Aliases) { if (pkcs12.IsKeyEntry(alias)) { Org.BouncyCastle.Pkcs.X509CertificateEntry[] chain = pkcs12.GetCertificateChain(alias); Org.BouncyCastle.Pkcs.AsymmetricKeyEntry entry = pkcs12.GetKey(alias); for (int i = 0; i < chain.Length; i++) { if (unique.Add(chain[i].Certificate)) { certs.Add(chain[i].Certificate); } } if (entry.Key.IsPrivate) { keys.Add(chain[0].Certificate, entry.Key); } } else if (pkcs12.IsCertificateEntry(alias)) { Org.BouncyCastle.Pkcs.X509CertificateEntry entry = pkcs12.GetCertificate(alias); if (unique.Add(entry.Certificate)) { certs.Add(entry.Certificate); } } } }
private void importbutton_Click(object sender, EventArgs e) { OpenFileDialog opener = new OpenFileDialog(); opener.InitialDirectory = Environment.CurrentDirectory; opener.Filter = "公钥证书|*.cer|私钥证书|*.pfx"; opener.RestoreDirectory = true; opener.FilterIndex = 1; if (opener.ShowDialog() == DialogResult.OK) { var fname = opener.FileName; var cerin = File.OpenText(fname); var txtreader = cerin.ReadToEnd(); if (Path.GetExtension(fname) == ".cer") { certificate.Text = txtreader; txtreader = txtreader.Replace("-----BEGIN CERTIFICATE-----", ""); txtreader = txtreader.Replace("-----END CERTIFICATE-----", ""); txtreader = txtreader.Replace("\r\n", ""); var certb = Convert.FromBase64String(txtreader); var cholder = new X509CertificateParser(); bouncy = cholder.ReadCertificate(certb); cert = new System.Security.Cryptography.X509Certificates.X509Certificate2(certb); nametxt.Text = bouncy.IssuerDN.ToString(); pubtxt.Text = Convert.ToBase64String(cert.GetPublicKey()); //Subtxt.Text = cert.Subject; } else if (Path.GetExtension(fname) == ".pfx") { var pfxin = File.ReadAllBytes(fname); var store = new Org.BouncyCastle.Pkcs.Pkcs12Store(); var stream = new MemoryStream(pfxin); store.Load(stream, pswtxt.Text.ToCharArray()); foreach (string al in store.Aliases) { Castlekey = store.GetKey(al).Key; Castle = store.GetCertificate(al).Certificate; } } } }
public static X509Certificate2 OpenCertificate(string pfxPath, string contrasenia) { var ms = new MemoryStream(File.ReadAllBytes(pfxPath)); var st = new Org.BouncyCastle.Pkcs.Pkcs12Store(ms, contrasenia.ToCharArray()); var alias = st.Aliases.Cast <string>().FirstOrDefault(p => st.IsCertificateEntry(p)); var keyEntryX = st.GetCertificate(alias); var x509 = new X509Certificate2(DotNetUtilities.ToX509Certificate(keyEntryX.Certificate)); alias = st.Aliases.Cast <string>().FirstOrDefault(p => st.IsKeyEntry(p)); var keyEntry = st.GetKey(alias); var intermediateProvider = (RSACryptoServiceProvider)DotNetUtilities.ToRSA((Org.BouncyCastle.Crypto.Parameters.RsaPrivateCrtKeyParameters)keyEntry.Key); x509.PrivateKey = intermediateProvider; return(x509); }
} // End Sub WithMsPfx public static PfxData Read(string pfxFilePath, string password = "") { Org.BouncyCastle.Pkcs.Pkcs12Store store = null; using (System.IO.Stream pfxStream = System.IO.File.OpenRead(pfxFilePath)) { store = new Org.BouncyCastle.Pkcs.Pkcs12Store(pfxStream, password.ToCharArray()); } // System.Console.WriteLine(store); foreach (string alias in store.Aliases) { Org.BouncyCastle.Pkcs.X509CertificateEntry certEntry = store.GetCertificate(alias); Org.BouncyCastle.X509.X509Certificate cert = certEntry.Certificate; // Org.BouncyCastle.Crypto.AsymmetricKeyParameter publicKey = cert.GetPublicKey(); // System.Console.WriteLine(publicKey); // https://7thzero.com/blog/bouncy-castle-convert-a-bouncycastle-asymmetrickeyentry-to-a-.ne if (store.IsKeyEntry(alias)) { Org.BouncyCastle.Pkcs.AsymmetricKeyEntry keyEntry = store.GetKey(alias); Org.BouncyCastle.Crypto.AsymmetricKeyParameter privateKey = keyEntry.Key; if (privateKey.IsPrivate) { return new PfxData() { Certificate = cert, PrivateKey = privateKey } } ; } // End if (store.IsKeyEntry((string)alias)) } // Next alias return(null); } // End Sub Read
public static Org.BouncyCastle.X509.X509Certificate LoadPfx(string path, string password) { Org.BouncyCastle.X509.X509Certificate cert = null; Org.BouncyCastle.Pkcs.X509CertificateEntry ce = null; using (System.IO.FileStream fs = System.IO.File.Open(path, System.IO.FileMode.Open, System.IO.FileAccess.Read, System.IO.FileShare.Read)) { Org.BouncyCastle.Pkcs.Pkcs12Store store = new Org.BouncyCastle.Pkcs.Pkcs12Store(fs, password.ToCharArray()); foreach (string thisAlias in store.Aliases) { System.Console.WriteLine(thisAlias); ce = store.GetCertificate(thisAlias); cert = ce.Certificate; break; } // Next thisAlias } // End Using fs System.Console.WriteLine(cert); return(cert); } // End Function LoadPfx
void ValidateParameters(Common.ParametersValidation validationRequest, ref string logMessage, ref bool passed, XmlNode test) { foreach (Common.ValidationRule rule in validationRequest.ValidationRules) { string parameterPath = string.Format("RequestParameters/{0}", rule.ParameterPath); switch (rule.Type) { case ParameterType.String: CommonCompare.StringCompare(parameterPath, rule.ParameterName, (string)rule.Value, ref logMessage, ref passed, test); break; case ParameterType.Int: CommonCompare.IntCompare(parameterPath, rule.ParameterName, (int)rule.Value, ref logMessage, ref passed, test); break; case ParameterType.OptionalInt: int?value = (int?)rule.Value; if (CommonCompare.Exist2(parameterPath, rule.ParameterName, value.HasValue, ref logMessage, ref passed, test)) { CommonCompare.IntCompare(parameterPath, rule.ParameterName, value.Value, ref logMessage, ref passed, test); } break; case ParameterType.OptionalBool: if (rule.ValueSpecified) { CommonCompare.StringCompare(parameterPath, rule.ParameterName, ((bool)rule.Value).ToString(), ref logMessage, ref passed, test); } else { CommonCompare.Exist2(parameterPath, rule.ParameterName, rule.ValueSpecified, ref logMessage, ref passed, test); } break; case ParameterType.OptionalString: { string stringValue = (string)rule.Value; if (CommonCompare.Exist2(parameterPath, rule.ParameterName, stringValue != null, ref logMessage, ref passed, test)) { CommonCompare.StringCompare(parameterPath, rule.ParameterName, (string)rule.Value, ref logMessage, ref passed, test); } } break; case ParameterType.OptionalElement: { CommonCompare.Exist2(parameterPath, rule.ParameterName, rule.Value != null, ref logMessage, ref passed, test); } break; case ParameterType.OptionalElementBoolFlag: { CommonCompare.Exist2(parameterPath, rule.ParameterName, (bool)rule.Value, ref logMessage, ref passed, test); } break; case ParameterType.StringArray: { CommonCompare.StringArrayCompare(parameterPath, rule.ParameterName, (string[])rule.Value, ref logMessage, ref passed, test); } break; case ParameterType.Log: { if (rule.Value.GetType().ToString() == "System.Byte[]") { logMessage = logMessage + rule.ParameterName + " = [Check it manually!]"; } else { logMessage = logMessage + rule.ParameterName + " = " + rule.Value.ToString(); } } break; case ParameterType.OptionalQName: { XmlQualifiedName QNameValue = (XmlQualifiedName)rule.Value; if (CommonCompare.Exist2(parameterPath, rule.ParameterName, QNameValue != null, ref logMessage, ref passed, test)) { CommonCompare.StringCompare(parameterPath + "/Namespace", rule.ParameterName + "/Namespace", QNameValue.Namespace, ref logMessage, ref passed, test); CommonCompare.StringCompare(parameterPath + "/Name", rule.ParameterName + "/Name", QNameValue.Name, ref logMessage, ref passed, test); } } break; case ParameterType.X509Cert: { Org.BouncyCastle.X509.X509Certificate cert = (new Org.BouncyCastle.X509.X509CertificateParser()).ReadCertificate((byte[])rule.Value); logMessage = logMessage + "\r\n"; logMessage = logMessage + rule.ParameterName + ": " + "\r\n" + cert.ToString(); logMessage = logMessage + "\r\n"; //TextWriter textWriter = new StringWriter(); //Org.BouncyCastle.Utilities.IO.Pem.PemWriter pemWriter = new Org.BouncyCastle.Utilities.IO.Pem.PemWriter(textWriter); //pemWriter.WriteObject(cert.CertificateStructure.SubjectPublicKeyInfo.PublicKeyData); //pemWriter.Writer.Flush(); //string privateKey = textWriter.ToString(); logMessage = logMessage + rule.ParameterName + "(PubK): " + "\r\n" + cert.CertificateStructure.SubjectPublicKeyInfo.PublicKeyData.ToString(); logMessage = logMessage + "\r\n"; logMessage = logMessage + rule.ParameterName + "(SignatureAlgorithm): " + "\r\n" + cert.CertificateStructure.SignatureAlgorithm.ObjectID.ToString(); logMessage = logMessage + "\r\n"; } break; case ParameterType.PKCS10: { Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest pkcs10 = new Org.BouncyCastle.Pkcs.Pkcs10CertificationRequest((byte[])rule.Value); logMessage = logMessage + "\r\n"; logMessage = logMessage + rule.ParameterName + ": " + "\r\n" + pkcs10.ToString(); logMessage = logMessage + "\r\n"; } break; case ParameterType.PKCS12WithoutPassphrase: { Org.BouncyCastle.Pkcs.Pkcs12Store pkcs12Store = new Org.BouncyCastle.Pkcs.Pkcs12Store(); pkcs12Store.Load(new MemoryStream((byte[])rule.Value), ("").ToArray()); logMessage = logMessage + rule.ParameterName + ": " + "\r\n"; foreach (string alias in pkcs12Store.Aliases) { logMessage = logMessage + "\r\n"; logMessage = logMessage + "Alias = " + alias + "\r\n"; logMessage = logMessage + "Certificate = " + pkcs12Store.GetCertificate(alias).Certificate.ToString(); } logMessage = logMessage + "\r\n"; } break; case ParameterType.CRL: { Org.BouncyCastle.X509.X509Crl crl = (new Org.BouncyCastle.X509.X509CrlParser()).ReadCrl((byte[])rule.Value); logMessage = logMessage + "\r\n"; logMessage = logMessage + rule.ParameterName + ": " + "\r\n" + crl.ToString(); logMessage = logMessage + "\r\n"; } break; case ParameterType.Float: { CommonCompare.FloatCompare(parameterPath, rule.ParameterName, (float)rule.Value, ref logMessage, ref passed, test); } break; case ParameterType.OptionalFloat: float?fvalue = (float?)rule.Value; if (CommonCompare.Exist2(parameterPath, rule.ParameterName, fvalue.HasValue, ref logMessage, ref passed, test)) { CommonCompare.FloatCompare(parameterPath, rule.ParameterName, (float)rule.Value, ref logMessage, ref passed, test); } break; } } }