MalwareSourceCode/MSIL/Virus/Win32/E/Virus.Win32.Expiro.w-69bb73081eac86b8cf86f45e33515d0095855636967076e2b593d7a30cd80a07/Microsoft/InfoCards/InfoCardX509Validator.cs
2022-08-18 06:28:56 -05:00

132 lines
5.1 KiB
C#

// Decompiled with JetBrains decompiler
// Type: Microsoft.InfoCards.InfoCardX509Validator
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: 516D8B44-4448-4D2C-8B8E-FFBB3FFE472B
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-69bb73081eac86b8cf86f45e33515d0095855636967076e2b593d7a30cd80a07.exe
using Microsoft.InfoCards.Diagnostics;
using System;
using System.IdentityModel.Selectors;
using System.IdentityModel.Tokens;
using System.Net.Security;
using System.Security.Cryptography.X509Certificates;
namespace Microsoft.InfoCards
{
internal class InfoCardX509Validator : X509CertificateValidator
{
private static InfoCardOfflineChainTrustValidator s_identityMachineChainTrustValidator = (InfoCardOfflineChainTrustValidator) null;
private static InfoCardOfflineChainTrustValidator s_identityUserChainTrustValidator = (InfoCardOfflineChainTrustValidator) null;
private static X509CertificateValidator s_identityPeerTrustValidator;
private static X509Certificate2Collection m_supportingCertificates;
static InfoCardX509Validator()
{
InfoCardX509Validator.s_identityMachineChainTrustValidator = new InfoCardOfflineChainTrustValidator(true);
InfoCardX509Validator.s_identityUserChainTrustValidator = new InfoCardOfflineChainTrustValidator(false);
InfoCardX509Validator.s_identityPeerTrustValidator = X509CertificateValidator.PeerTrust;
}
private InfoCardX509Validator(X509Certificate2Collection supportingCerts) => InfoCardX509Validator.m_supportingCertificates = supportingCerts;
public static X509CertificateValidator Create(
X509Certificate2Collection supportingCerts)
{
return (X509CertificateValidator) new InfoCardX509Validator(supportingCerts);
}
public static void ValidateChainOrPeer(
X509Certificate2 certificate,
X509Certificate2Collection supportingRecipientCerts,
out bool chainTrustPassed)
{
InfoCardX509Validator.Validate(certificate, supportingRecipientCerts, out chainTrustPassed);
}
public override void Validate(X509Certificate2 certificate) => InfoCardX509Validator.Validate(certificate, InfoCardX509Validator.m_supportingCertificates, out bool _);
public static bool ValidateChainOrPeerCallback(
object sender,
X509Certificate certificate,
X509Chain chain,
SslPolicyErrors sslPolicyErrors)
{
bool chainTrustPassed = false;
if ((sslPolicyErrors & SslPolicyErrors.RemoteCertificateNameMismatch) != SslPolicyErrors.None || (sslPolicyErrors & SslPolicyErrors.RemoteCertificateNotAvailable) != SslPolicyErrors.None)
return false;
InfoCardTrace.Assert(certificate != null && null != chain, "We should have returned false for SslPolicyErrors.RemoteCertificateNotAvailable");
try
{
InfoCardX509Validator.ValidateChainOrPeer(new X509Certificate2(certificate), chain.ChainPolicy.ExtraStore, out chainTrustPassed);
}
catch (SecurityTokenValidationException ex)
{
InfoCardTrace.TraceAndLogException((Exception) new IdentityValidationException(SR.GetString("RecipientCertificateNotValid"), (Exception) ex));
return false;
}
return true;
}
private static void Validate(
X509Certificate2 certificate,
X509Certificate2Collection supportingRecipientCerts,
out bool chainTrustPassed)
{
chainTrustPassed = false;
string str = string.Empty;
try
{
InfoCardX509Validator.ValidateChain(certificate, supportingRecipientCerts, out X509Chain _);
chainTrustPassed = true;
}
catch (SecurityTokenValidationException ex)
{
str = ex.Message;
}
if (chainTrustPassed)
return;
try
{
InfoCardX509Validator.ValidatePeer(certificate);
}
catch (SecurityTokenValidationException ex)
{
throw InfoCardTrace.ThrowHelperError((Exception) new SecurityTokenValidationException(SR.GetString("X509ChainFailAndPeerTrustFail", (object) str, (object) ex.Message)));
}
}
public static void ValidateChain(
X509Certificate2 certificate,
X509Certificate2Collection supportingCerts,
out X509Chain chain)
{
try
{
InfoCardX509Validator.s_identityMachineChainTrustValidator.Validate(certificate, supportingCerts, out chain);
}
catch (SecurityTokenValidationException ex)
{
InfoCardX509Validator.s_identityUserChainTrustValidator.Validate(certificate, supportingCerts, out chain);
}
}
public static bool TryValidateChain(
X509Certificate2 certificate,
X509Certificate2Collection supportingCerts)
{
bool flag = true;
try
{
InfoCardX509Validator.ValidateChain(certificate, supportingCerts, out X509Chain _);
}
catch (SecurityTokenValidationException ex)
{
flag = false;
}
return flag;
}
public static void ValidatePeer(X509Certificate2 certificate) => InfoCardX509Validator.s_identityPeerTrustValidator.Validate(certificate);
}
}