Example #1
0
        public static RSACryptoServiceProvider LoadKeyPairFromPKCS12Store(string Filename)
        {
            Pkcs12Store Store = new Pkcs12StoreBuilder().Build();

            Store.Load(File.OpenRead(Filename), new char[0]);

            foreach (string Alias in Store.Aliases)
            {
                if (Store.IsKeyEntry(Alias))
                {
                    Console.WriteLine("Key with alias {0} is {1}", Alias, Store.GetKey(Alias).Key);
                    return(ConvertBouncyKeyPairToNET(Store.GetKey(Alias).Key as RsaPrivateCrtKeyParameters));
                }
            }

            return(null);
        }
Example #2
0
        /// <summary>
        /// stores SubjectPublicKeyInfo Data Type from certificate's public key, asymmetric algorithm and digest
        /// </summary>
        /// <param name="path">string .ps12, pfx or .jks (PKCS12 fromat) certificate path</param>
        /// <param name="password">string certificate's password, required if PKCS12</param>
        /// <returns>boolean true if loaded correctly</returns>
        private bool loadPublicKeyFromPKCS12File(string path, string password)
        {
            bool flag = false;

            if (password == null)
            {
                this.error.setError("CE012", "Alias and password are required for PKCS12 certificates");
                return(false);
            }

            Pkcs12Store pkcs12 = null;

            try
            {
                pkcs12 = new Pkcs12StoreBuilder().Build();
                pkcs12.Load(new FileStream(path, FileMode.Open, FileAccess.Read), password.ToCharArray());
            }

            catch
            {
                this.error.setError("CE013", path + "not found.");
                // throw new FileLoadException(path + "not found.");
            }

            if (pkcs12 != null)
            {
                string pName = null;
                foreach (string n in pkcs12.Aliases)
                {
                    if (pkcs12.IsKeyEntry(n))
                    {
                        pName = n;


                        Org.BouncyCastle.X509.X509Certificate cert = pkcs12.GetCertificate(pName).Certificate;
                        castCertificate(cert);
                        return(true);
                    }
                }
            }
            this.error.setError("CE014", path + "not found.");
            return(flag);
        }
Example #3
0
        /// <summary>
        /// Stores PrivateKeyInfo Data Type from certificate's private key, algorithm and digest
        /// </summary>
        /// <param name="path">string .ps12, pfx or .jks (PKCS12 fromat) certificate path</param>
        /// <param name="password">string certificate's password, required if PKCS12</param>
        /// <returns></returns>
        private bool loadPrivateKeyFromPKCS12File(string path, string password)
        {
            bool flag = false;

            if (password == null)
            {
                this.error.setError("PK004", "Alias and Password are required for PKCS12 keys");
                return(false);
            }
            Pkcs12Store pkcs12 = null;

            try
            {
                pkcs12 = new Pkcs12StoreBuilder().Build();
                pkcs12.Load(new FileStream(path, FileMode.Open, FileAccess.Read), password.ToCharArray());
            }

            catch
            {
                this.error.setError("PK005", path + "not found or wrong password.");
                //throw new FileLoadException(path + "not found or wrong password.");
            }

            if (pkcs12 != null)
            {
                string pName = null;
                foreach (string n in pkcs12.Aliases)
                {
                    if (pkcs12.IsKeyEntry(n) && pkcs12.GetKey(n).Key.IsPrivate)
                    {
                        pName = n;

                        this.privateKeyInfo      = PrivateKeyInfoFactory.CreatePrivateKeyInfo(pkcs12.GetKey(n).Key);
                        this.privateKeyAlgorithm = this.privateKeyInfo.PrivateKeyAlgorithm.Algorithm.Id;
                        this.hasPrivateKey       = true;
                        return(true);
                    }
                }
            }
            this.error.setError("PK006", path + " not found");
            return(flag);
        }
        public static AsymmetricKeyParameter getPrivateKey(Stream certStream, string password)
        {
            Pkcs12Store pkcs12Store = new Pkcs12StoreBuilder().Build();

            pkcs12Store.Load(certStream, password.ToCharArray());
            AsymmetricKeyParameter asymmetricKeyParameter = null;

            foreach (string alias in pkcs12Store.Aliases)
            {
                if (pkcs12Store.IsKeyEntry(alias))
                {
                    asymmetricKeyParameter = pkcs12Store.GetKey(alias).Key;
                    if (asymmetricKeyParameter.IsPrivate)
                    {
                        return(asymmetricKeyParameter);
                    }
                }
            }
            return(asymmetricKeyParameter);
        }
Example #5
0
        /// <exception cref="Sharpen.KeyStoreException"></exception>
        public IList <IDssPrivateKeyEntry> GetKeys()
        {
            if (keys != null)
            {
                return(keys);
            }

            IList <IDssPrivateKeyEntry> list = new List <IDssPrivateKeyEntry>();
            Pkcs12Store     keyStore         = new Pkcs12StoreBuilder().Build();
            FileInputStream input            = new FileInputStream(pkcs12File);

            keyStore.Load(input, password.ToCharArray());
            input.Close();

            foreach (string alias in keyStore.Aliases)
            {
                bool[] keyUsage;
                if (!(keyStore.IsKeyEntry(alias) &&
                      keyStore.GetKey(alias).Key.IsPrivate &&
                      ((keyUsage = keyStore.GetCertificate(alias).Certificate.GetKeyUsage()) == null ||
                       keyUsage[0])))
                {
                    continue;
                }

                X509CertificateEntry[] x     = keyStore.GetCertificateChain(alias);
                X509Certificate[]      chain = new X509Certificate[x.Length];

                for (int k = 0; k < x.Length; ++k)
                {
                    chain[k] = x[k].Certificate;
                }

                AsymmetricKeyParameter privateKey = keyStore.GetKey(alias).Key;

                list.Add(new KSPrivateKeyEntry(chain[0], chain, privateKey));
            }
            this.keys = list;

            return(list);
        }
Example #6
0
        /*
         *
         * ==================读取私钥==========================
         * path   证书路径
         *
         * pwd  证书密码
         *
         */
        public static AsymmetricKeyParameter getPrivateKeyFromFile(string path, string pwd)
        {
            FileStream fs = File.OpenRead(path);      //path路径下证书

            char[] passwd = pwd.ToCharArray();

            Pkcs12Store store = new Pkcs12StoreBuilder().Build();

            store.Load(fs, passwd); //加载证书
            string alias = null;

            foreach (string str in store.Aliases)
            {
                if (store.IsKeyEntry(str))
                {
                    alias = str;
                }
            }
            AsymmetricKeyEntry keyEntry = store.GetKey(alias);

            return(keyEntry.Key);
        }
Example #7
0
        /// <exception cref="Sharpen.KeyStoreException"></exception>
        public override IList <IDssPrivateKeyEntry> GetKeys()
        {
            if (keys != null)
            {
                return(keys);
            }

            IList <IDssPrivateKeyEntry> list = new AList <IDssPrivateKeyEntry>();

            try
            {
                Pkcs12Store     keyStore = new Pkcs12StoreBuilder().Build();
                FileInputStream input    = new FileInputStream(pkcs12File);
                keyStore.Load(input, password);
                input.Close();

                foreach (string alias in keyStore.Aliases)
                {
                    if (keyStore.IsKeyEntry(alias) &&
                        keyStore.GetKey(alias).Key.IsPrivate &&
                        keyStore.GetCertificate(alias).Certificate.GetKeyUsage()[0]    //0: DigitalSignature
                        )
                    {
                        X509CertificateEntry[] x     = keyStore.GetCertificateChain(alias);
                        X509Certificate[]      chain = new X509Certificate[x.Length];

                        for (int k = 0; k < x.Length; ++k)
                        {
                            chain[k] = x[k].Certificate;
                        }

                        AsymmetricKeyParameter privateKey = keyStore.GetKey(alias).Key;

                        list.AddItem(new KSPrivateKeyEntry(chain[0], chain, privateKey));
                    }
                }
            }
            catch (IOException iox)
            {
                if (iox.Message.Contains("password") || iox.Message.Contains("corrupted"))
                {
                    //"PKCS12 key store MAC invalid - wrong  or corrupted file."
                    throw new IOException("La contraseña es incorrecta, o el archivo está corrompido.", iox);
                }

                throw;
            }
            catch (NoSuchAlgorithmException e)
            {
                //throw new KeyStoreException("Can't initialize Sun PKCS#12 security " + "provider. Reason: "
                //     + e.InnerException.Message, e);
                throw;
            }
            catch (CertificateException e)
            {
                //throw new KeyStoreException("Can't initialize Sun PKCS#12 security " + "provider. Reason: "
                //     + e.InnerException.Message, e);
                throw;
            }

            /*catch (UnrecoverableEntryException e)
             * {
             *  throw new KeyStoreException("Can't initialize Sun PKCS#12 security " + "provider. Reason: "
             + e.InnerException.Message, e);
             + }*/

            this.keys = list;

            return(list);
        }
Example #8
0
        public void doTestPkcs12Store()
        {
            BigInteger mod = new BigInteger("bb1be8074e4787a8d77967f1575ef72dd7582f9b3347724413c021beafad8f32dba5168e280cbf284df722283dad2fd4abc750e3d6487c2942064e2d8d80641aa5866d1f6f1f83eec26b9b46fecb3b1c9856a303148a5cc899c642fb16f3d9d72f52526c751dc81622c420c82e2cfda70fe8d13f16cc7d6a613a5b2a2b5894d1", 16);

            MemoryStream stream = new MemoryStream(pkcs12, false);
            Pkcs12Store  store  = new Pkcs12StoreBuilder().Build();

            store.Load(stream, passwd);

            string pName = null;

            foreach (string n in store.Aliases)
            {
                if (store.IsKeyEntry(n))
                {
                    pName = n;
                    //break;
                }
            }

            AsymmetricKeyEntry key = store.GetKey(pName);

            if (!((RsaKeyParameters)key.Key).Modulus.Equals(mod))
            {
                Fail("Modulus doesn't match.");
            }

            X509CertificateEntry[] ch = store.GetCertificateChain(pName);

            if (ch.Length != 3)
            {
                Fail("chain was wrong length");
            }

            if (!ch[0].Certificate.SerialNumber.Equals(new BigInteger("96153094170511488342715101755496684211")))
            {
                Fail("chain[0] wrong certificate.");
            }

            if (!ch[1].Certificate.SerialNumber.Equals(new BigInteger("279751514312356623147411505294772931957")))
            {
                Fail("chain[1] wrong certificate.");
            }

            if (!ch[2].Certificate.SerialNumber.Equals(new BigInteger("11341398017")))
            {
                Fail("chain[2] wrong certificate.");
            }

            //
            // save test
            //
            MemoryStream bOut = new MemoryStream();

            store.Save(bOut, passwd, new SecureRandom());

            stream = new MemoryStream(bOut.ToArray(), false);
            store.Load(stream, passwd);

            key = store.GetKey(pName);

            if (!((RsaKeyParameters)key.Key).Modulus.Equals(mod))
            {
                Fail("Modulus doesn't match.");
            }

            store.DeleteEntry(pName);

            if (store.GetKey(pName) != null)
            {
                Fail("Failed deletion test.");
            }

            //
            // cert chain test
            //
            store.SetCertificateEntry("testCert", ch[2]);

            if (store.GetCertificateChain("testCert") != null)
            {
                Fail("Failed null chain test.");
            }

            //
            // UTF 8 single cert test
            //
            stream = new MemoryStream(certUTF, false);
            store.Load(stream, "user".ToCharArray());

            if (store.GetCertificate("37") == null)
            {
                Fail("Failed to find UTF cert.");
            }

            //
            // try for a self generated certificate
            //
            RsaKeyParameters pubKey = new RsaKeyParameters(
                false,
                new BigInteger("b4a7e46170574f16a97082b22be58b6a2a629798419be12872a4bdba626cfae9900f76abfb12139dce5de56564fab2b6543165a040c606887420e33d91ed7ed7", 16),
                new BigInteger("11", 16));

            RsaPrivateCrtKeyParameters privKey = new RsaPrivateCrtKeyParameters(
                new BigInteger("b4a7e46170574f16a97082b22be58b6a2a629798419be12872a4bdba626cfae9900f76abfb12139dce5de56564fab2b6543165a040c606887420e33d91ed7ed7", 16),
                new BigInteger("11", 16),
                new BigInteger("9f66f6b05410cd503b2709e88115d55daced94d1a34d4e32bf824d0dde6028ae79c5f07b580f5dce240d7111f7ddb130a7945cd7d957d1920994da389f490c89", 16),
                new BigInteger("c0a0758cdf14256f78d4708c86becdead1b50ad4ad6c5c703e2168fbf37884cb", 16),
                new BigInteger("f01734d7960ea60070f1b06f2bb81bfac48ff192ae18451d5e56c734a5aab8a5", 16),
                new BigInteger("b54bb9edff22051d9ee60f9351a48591b6500a319429c069a3e335a1d6171391", 16),
                new BigInteger("d3d83daf2a0cecd3367ae6f8ae1aeb82e9ac2f816c6fc483533d8297dd7884cd", 16),
                new BigInteger("b8f52fc6f38593dabb661d3f50f8897f8106eee68b1bce78a95b132b4e5b5d19", 16));

            X509CertificateEntry[] chain = new X509CertificateEntry[] {
                CreateCert(pubKey, privKey, "*****@*****.**", "*****@*****.**")
            };

            store = new Pkcs12StoreBuilder().Build();

            store.SetKeyEntry("privateKey", new AsymmetricKeyEntry(privKey), chain);

            if (!store.ContainsAlias("privateKey") || !store.ContainsAlias("PRIVATEKEY"))
            {
                Fail("couldn't find alias privateKey");
            }

            if (store.IsCertificateEntry("privateKey"))
            {
                Fail("key identified as certificate entry");
            }

            if (!store.IsKeyEntry("privateKey") || !store.IsKeyEntry("PRIVATEKEY"))
            {
                Fail("key not identified as key entry");
            }

            if (!"privateKey".Equals(store.GetCertificateAlias(chain[0].Certificate)))
            {
                Fail("Did not return alias for key certificate privateKey");
            }

            MemoryStream store1Stream = new MemoryStream();

            store.Save(store1Stream, passwd, new SecureRandom());
            testNoExtraLocalKeyID(store1Stream.ToArray());

            //
            // no friendly name test
            //
            stream = new MemoryStream(pkcs12noFriendly, false);
            store.Load(stream, noFriendlyPassword);

            pName = null;

            foreach (string n in store.Aliases)
            {
                if (store.IsKeyEntry(n))
                {
                    pName = n;
                    //break;
                }
            }

            ch = store.GetCertificateChain(pName);

            //for (int i = 0; i != ch.Length; i++)
            //{
            //	Console.WriteLine(ch[i]);
            //}

            if (ch.Length != 1)
            {
                Fail("no cert found in pkcs12noFriendly");
            }

            //
            // failure tests
            //
            ch = store.GetCertificateChain("dummy");

            store.GetCertificateChain("DUMMY");

            store.GetCertificate("dummy");

            store.GetCertificate("DUMMY");

            //
            // storage test
            //
            stream = new MemoryStream(pkcs12StorageIssue, false);
            store.Load(stream, storagePassword);

            pName = null;

            foreach (string n in store.Aliases)
            {
                if (store.IsKeyEntry(n))
                {
                    pName = n;
                    //break;
                }
            }

            ch = store.GetCertificateChain(pName);
            if (ch.Length != 2)
            {
                Fail("Certificate chain wrong length");
            }

            store.Save(new MemoryStream(), storagePassword, new SecureRandom());

            //
            // basic certificate check
            //
            store.SetCertificateEntry("cert", ch[1]);

            if (!store.ContainsAlias("cert") || !store.ContainsAlias("CERT"))
            {
                Fail("couldn't find alias cert");
            }

            if (!store.IsCertificateEntry("cert") || !store.IsCertificateEntry("CERT"))
            {
                Fail("cert not identified as certificate entry");
            }

            if (store.IsKeyEntry("cert") || store.IsKeyEntry("CERT"))
            {
                Fail("cert identified as key entry");
            }

            if (!store.IsEntryOfType("cert", typeof(X509CertificateEntry)))
            {
                Fail("cert not identified as X509CertificateEntry");
            }

            if (!store.IsEntryOfType("CERT", typeof(X509CertificateEntry)))
            {
                Fail("CERT not identified as X509CertificateEntry");
            }

            if (store.IsEntryOfType("cert", typeof(AsymmetricKeyEntry)))
            {
                Fail("cert identified as key entry via AsymmetricKeyEntry");
            }

            if (!"cert".Equals(store.GetCertificateAlias(ch[1].Certificate)))
            {
                Fail("Did not return alias for certificate entry");
            }

            //
            // test restoring of a certificate with private key originally as a ca certificate
            //
            store = new Pkcs12StoreBuilder().Build();

            store.SetCertificateEntry("cert", ch[0]);

            if (!store.ContainsAlias("cert") || !store.ContainsAlias("CERT"))
            {
                Fail("restore: couldn't find alias cert");
            }

            if (!store.IsCertificateEntry("cert") || !store.IsCertificateEntry("CERT"))
            {
                Fail("restore: cert not identified as certificate entry");
            }

            if (store.IsKeyEntry("cert") || store.IsKeyEntry("CERT"))
            {
                Fail("restore: cert identified as key entry");
            }

            if (store.IsEntryOfType("cert", typeof(AsymmetricKeyEntry)))
            {
                Fail("restore: cert identified as key entry via AsymmetricKeyEntry");
            }

            if (store.IsEntryOfType("CERT", typeof(AsymmetricKeyEntry)))
            {
                Fail("restore: cert identified as key entry via AsymmetricKeyEntry");
            }

            if (!store.IsEntryOfType("cert", typeof(X509CertificateEntry)))
            {
                Fail("restore: cert not identified as X509CertificateEntry");
            }

            //
            // test of reading incorrect zero-length encoding
            //
            stream = new MemoryStream(pkcs12nopass, false);
            store.Load(stream, "".ToCharArray());
        }