File: src\Servers\Kestrel\shared\test\CertificateAuthority.cs
Web Access
Project: src\src\Servers\Kestrel\Core\test\Microsoft.AspNetCore.Server.Kestrel.Core.Tests.csproj (Microsoft.AspNetCore.Server.Kestrel.Core.Tests)
// Licensed to the .NET Foundation under one or more agreements.
// The .NET Foundation licenses this file to you under the MIT license.
 
using System.Formats.Asn1;
using System.Security.Cryptography;
using System.Security.Cryptography.X509Certificates;
 
// Copied from https://github.com/dotnet/runtime/blob/main/src/libraries/Common/tests/System/Security/Cryptography/X509Certificates/CertificateAuthority.cs
namespace Microsoft.AspNetCore.InternalTesting;
 
// This class represents only a portion of what is required to be a proper Certificate Authority.
//
// Please do not use it as the basis for any real Public/Private Key Infrastructure (PKI) system
// without understanding all of the portions of proper CA management that you're skipping.
//
// At minimum, read the current baseline requirements of the CA/Browser Forum.
 
[Flags]
public enum PkiOptions
{
    None = 0,
 
    IssuerRevocationViaCrl = 1 << 0,
    IssuerRevocationViaOcsp = 1 << 1,
    EndEntityRevocationViaCrl = 1 << 2,
    EndEntityRevocationViaOcsp = 1 << 3,
 
    CrlEverywhere = IssuerRevocationViaCrl | EndEntityRevocationViaCrl,
    OcspEverywhere = IssuerRevocationViaOcsp | EndEntityRevocationViaOcsp,
    AllIssuerRevocation = IssuerRevocationViaCrl | IssuerRevocationViaOcsp,
    AllEndEntityRevocation = EndEntityRevocationViaCrl | EndEntityRevocationViaOcsp,
    AllRevocation = CrlEverywhere | OcspEverywhere,
 
    IssuerAuthorityHasDesignatedOcspResponder = 1 << 16,
    RootAuthorityHasDesignatedOcspResponder = 1 << 17,
    NoIssuerCertDistributionUri = 1 << 18,
    NoRootCertDistributionUri = 1 << 18,
}
 
internal sealed class CertificateAuthority : IDisposable
{
    private static readonly Asn1Tag s_context0 = new Asn1Tag(TagClass.ContextSpecific, 0);
    private static readonly Asn1Tag s_context1 = new Asn1Tag(TagClass.ContextSpecific, 1);
    private static readonly Asn1Tag s_context2 = new Asn1Tag(TagClass.ContextSpecific, 2);
 
    private static readonly X500DistinguishedName s_nonParticipatingName =
        new X500DistinguishedName("CN=The Ghost in the Machine");
 
    private static readonly X509BasicConstraintsExtension s_eeConstraints =
        new X509BasicConstraintsExtension(false, false, 0, false);
 
    private static readonly X509KeyUsageExtension s_caKeyUsage =
        new X509KeyUsageExtension(
            X509KeyUsageFlags.KeyCertSign | X509KeyUsageFlags.CrlSign,
            critical: false);
 
    private static readonly X509KeyUsageExtension s_eeKeyUsage =
        new X509KeyUsageExtension(
            X509KeyUsageFlags.DigitalSignature | X509KeyUsageFlags.KeyEncipherment | X509KeyUsageFlags.DataEncipherment,
            critical: false);
 
    private static readonly X509EnhancedKeyUsageExtension s_ocspResponderEku =
        new X509EnhancedKeyUsageExtension(
            new OidCollection
            {
                new Oid("1.3.6.1.5.5.7.3.9", null),
            },
            critical: false);
 
    private static readonly X509EnhancedKeyUsageExtension s_tlsClientEku =
        new X509EnhancedKeyUsageExtension(
            new OidCollection
            {
                new Oid("1.3.6.1.5.5.7.3.2", null)
            },
            false);
 
    private X509Certificate2 _cert;
    private byte[] _certData;
    private X509Extension _cdpExtension;
    private X509Extension _aiaExtension;
    private X509AuthorityKeyIdentifierExtension _akidExtension;
 
    private List<(byte[], DateTimeOffset)> _revocationList;
    private byte[] _crl;
    private int _crlNumber;
    private DateTimeOffset _crlExpiry;
    private X509Certificate2 _ocspResponder;
    private byte[] _dnHash;
 
    internal string AiaHttpUri { get; }
    internal string CdpUri { get; }
    internal string OcspUri { get; }
 
    internal bool CorruptRevocationSignature { get; set; }
    internal DateTimeOffset? RevocationExpiration { get; set; }
    internal bool CorruptRevocationIssuerName { get; set; }
    internal bool OmitNextUpdateInCrl { get; set; }
 
    // All keys created in this method are smaller than recommended,
    // but they only live for a few seconds (at most),
    // and never communicate out of process.
    const int DefaultKeySize = 1024;
 
    internal CertificateAuthority(
        X509Certificate2 cert,
        string aiaHttpUrl,
        string cdpUrl,
        string ocspUrl)
    {
        _cert = cert;
        AiaHttpUri = aiaHttpUrl;
        CdpUri = cdpUrl;
        OcspUri = ocspUrl;
    }
 
    public void Dispose()
    {
        _cert.Dispose();
        _ocspResponder?.Dispose();
    }
 
    internal string SubjectName => _cert.Subject;
    internal bool HasOcspDelegation => _ocspResponder != null;
    internal string OcspResponderSubjectName => (_ocspResponder ?? _cert).Subject;
 
    internal X509Certificate2 CloneIssuerCert()
    {
        return new X509Certificate2(_cert.RawData);
    }
 
    internal void Revoke(X509Certificate2 certificate, DateTimeOffset revocationTime)
    {
        if (!certificate.IssuerName.RawData.SequenceEqual(_cert.SubjectName.RawData))
        {
            throw new ArgumentException("Certificate was not from this issuer", nameof(certificate));
        }
 
        if (_revocationList == null)
        {
            _revocationList = new List<(byte[], DateTimeOffset)>();
        }
 
        byte[] serial = certificate.SerialNumberBytes.ToArray();
        _revocationList.Add((serial, revocationTime));
        _crl = null;
    }
 
    internal X509Certificate2 CreateSubordinateCA(
        string subject,
        RSA publicKey,
        int? depthLimit = null)
    {
        return CreateCertificate(
            subject,
            publicKey,
            TimeSpan.FromMinutes(1),
            new X509ExtensionCollection() {
                new X509BasicConstraintsExtension(
                    certificateAuthority: true,
                    depthLimit.HasValue,
                    depthLimit.GetValueOrDefault(),
                    critical: true),
                s_caKeyUsage });
    }
 
    internal X509Certificate2 CreateEndEntity(string subject, RSA publicKey, X509ExtensionCollection extensions)
    {
        return CreateCertificate(
            subject,
            publicKey,
            TimeSpan.FromSeconds(2),
            extensions);
    }
 
    internal X509Certificate2 CreateOcspSigner(string subject, RSA publicKey)
    {
        return CreateCertificate(
            subject,
            publicKey,
            TimeSpan.FromSeconds(1),
            new X509ExtensionCollection() { s_eeConstraints, s_eeKeyUsage, s_ocspResponderEku},
            ocspResponder: true);
    }
 
    internal void RebuildRootWithRevocation()
    {
        if (_cdpExtension == null && CdpUri != null)
        {
            _cdpExtension = CreateCdpExtension(CdpUri);
        }
 
        if (_aiaExtension == null && (OcspUri != null || AiaHttpUri != null))
        {
            _aiaExtension = CreateAiaExtension(AiaHttpUri, OcspUri);
        }
 
        RebuildRootWithRevocation(_cdpExtension, _aiaExtension);
    }
 
    private void RebuildRootWithRevocation(X509Extension cdpExtension, X509Extension aiaExtension)
    {
        X500DistinguishedName subjectName = _cert.SubjectName;
 
        if (!subjectName.RawData.SequenceEqual(_cert.IssuerName.RawData))
        {
            throw new InvalidOperationException();
        }
 
        var req = new CertificateRequest(subjectName, _cert.PublicKey, HashAlgorithmName.SHA256);
 
        foreach (X509Extension ext in _cert.Extensions)
        {
            req.CertificateExtensions.Add(ext);
        }
 
        req.CertificateExtensions.Add(cdpExtension);
        req.CertificateExtensions.Add(aiaExtension);
 
        byte[] serial = _cert.SerialNumberBytes.ToArray();
 
        X509Certificate2 dispose = _cert;
 
        using (dispose)
        using (RSA rsa = _cert.GetRSAPrivateKey())
        using (X509Certificate2 tmp = req.Create(
            subjectName,
            X509SignatureGenerator.CreateForRSA(rsa, RSASignaturePadding.Pkcs1),
            new DateTimeOffset(_cert.NotBefore),
            new DateTimeOffset(_cert.NotAfter),
            serial))
        {
            _cert = tmp.CopyWithPrivateKey(rsa);
        }
    }
 
    private X509Certificate2 CreateCertificate(
        string subject,
        RSA publicKey,
        TimeSpan nestingBuffer,
        X509ExtensionCollection extensions,
        bool ocspResponder = false)
    {
        if (_cdpExtension == null && CdpUri != null)
        {
            _cdpExtension = CreateCdpExtension(CdpUri);
        }
 
        if (_aiaExtension == null && (OcspUri != null || AiaHttpUri != null))
        {
            _aiaExtension = CreateAiaExtension(AiaHttpUri, OcspUri);
        }
 
        if (_akidExtension == null)
        {
            _akidExtension = CreateAkidExtension();
        }
 
        CertificateRequest request = new CertificateRequest(
            subject,
            publicKey,
            HashAlgorithmName.SHA256,
            RSASignaturePadding.Pkcs1);
 
        foreach (X509Extension extension in extensions)
        {
            request.CertificateExtensions.Add(extension);
        }
 
        // Windows does not accept OCSP Responder certificates which have
        // a CDP extension, or an AIA extension with an OCSP endpoint.
        if (!ocspResponder)
        {
            request.CertificateExtensions.Add(_cdpExtension);
            request.CertificateExtensions.Add(_aiaExtension);
        }
 
        request.CertificateExtensions.Add(_akidExtension);
        request.CertificateExtensions.Add(
            new X509SubjectKeyIdentifierExtension(request.PublicKey, false));
 
        byte[] serial = new byte[sizeof(long)];
        RandomNumberGenerator.Fill(serial);
 
        return request.Create(
            _cert,
            _cert.NotBefore.Add(nestingBuffer),
            _cert.NotAfter.Subtract(nestingBuffer),
            serial);
    }
 
    internal byte[] GetCertData()
    {
        return (_certData ??= _cert.RawData);
    }
 
    internal byte[] GetCrl()
    {
        byte[] crl = _crl;
        DateTimeOffset now = DateTimeOffset.UtcNow;
 
        if (crl != null && now < _crlExpiry)
        {
            return crl;
        }
 
        DateTimeOffset newExpiry = now.AddSeconds(2);
        X509AuthorityKeyIdentifierExtension akid = _akidExtension ??= CreateAkidExtension();
 
        if (OmitNextUpdateInCrl)
        {
            crl = BuildCrlManually(now, newExpiry, akid);
        }
        else
        {
            CertificateRevocationListBuilder builder = new CertificateRevocationListBuilder();
 
            if (_revocationList is not null)
            {
                foreach ((byte[] serial, DateTimeOffset when) in _revocationList)
                {
                    builder.AddEntry(serial, when);
                }
            }
 
            DateTimeOffset thisUpdate;
            DateTimeOffset nextUpdate;
 
            if (RevocationExpiration.HasValue)
            {
                nextUpdate = RevocationExpiration.GetValueOrDefault();
                thisUpdate = _cert.NotBefore;
            }
            else
            {
                thisUpdate = now;
                nextUpdate = newExpiry;
            }
 
            using (RSA key = _cert.GetRSAPrivateKey())
            {
                crl = builder.Build(
                    CorruptRevocationIssuerName ? s_nonParticipatingName : _cert.SubjectName,
                    X509SignatureGenerator.CreateForRSA(key, RSASignaturePadding.Pkcs1),
                    _crlNumber,
                    nextUpdate,
                    HashAlgorithmName.SHA256,
                    _akidExtension,
                    thisUpdate);
            }
        }
 
        if (CorruptRevocationSignature)
        {
            crl[^2] ^= 0xFF;
        }
 
        _crl = crl;
        _crlExpiry = newExpiry;
        _crlNumber++;
        return crl;
    }
 
    private byte[] BuildCrlManually(
        DateTimeOffset now,
        DateTimeOffset newExpiry,
        X509AuthorityKeyIdentifierExtension akidExtension)
    {
        AsnWriter writer = new AsnWriter(AsnEncodingRules.DER);
 
        using (writer.PushSequence())
        {
            writer.WriteObjectIdentifier("1.2.840.113549.1.1.11");
            writer.WriteNull();
        }
 
        byte[] signatureAlgId = writer.Encode();
        writer.Reset();
 
        // TBSCertList
        using (writer.PushSequence())
        {
            // version v2(1)
            writer.WriteInteger(1);
 
            // signature (AlgorithmIdentifier)
            writer.WriteEncodedValue(signatureAlgId);
 
            // issuer
            if (CorruptRevocationIssuerName)
            {
                writer.WriteEncodedValue(s_nonParticipatingName.RawData);
            }
            else
            {
                writer.WriteEncodedValue(_cert.SubjectName.RawData);
            }
 
            if (RevocationExpiration.HasValue)
            {
                // thisUpdate
                writer.WriteUtcTime(_cert.NotBefore);
 
                // nextUpdate
                if (!OmitNextUpdateInCrl)
                {
                    writer.WriteUtcTime(RevocationExpiration.Value);
                }
            }
            else
            {
                // thisUpdate
                writer.WriteUtcTime(now);
 
                // nextUpdate
                if (!OmitNextUpdateInCrl)
                {
                    writer.WriteUtcTime(newExpiry);
                }
            }
 
            // revokedCertificates (don't write down if empty)
            if (_revocationList?.Count > 0)
            {
                // SEQUENCE OF
                using (writer.PushSequence())
                {
                    foreach ((byte[] serial, DateTimeOffset when) in _revocationList)
                    {
                        // Anonymous CRL Entry type
                        using (writer.PushSequence())
                        {
                            writer.WriteInteger(serial);
                            writer.WriteUtcTime(when);
                        }
                    }
                }
            }
 
            // extensions [0] EXPLICIT Extensions
            using (writer.PushSequence(s_context0))
            {
                // Extensions (SEQUENCE OF)
                using (writer.PushSequence())
                {
                    // Authority Key Identifier Extension
                    using (writer.PushSequence())
                    {
                        writer.WriteObjectIdentifier(akidExtension.Oid.Value);
 
                        if (akidExtension.Critical)
                        {
                            writer.WriteBoolean(true);
                        }
 
                        writer.WriteOctetString(akidExtension.RawData);
                    }
 
                    // CRL Number Extension
                    using (writer.PushSequence())
                    {
                        writer.WriteObjectIdentifier("2.5.29.20");
 
                        using (writer.PushOctetString())
                        {
                            writer.WriteInteger(_crlNumber);
                        }
                    }
                }
            }
        }
 
        byte[] tbsCertList = writer.Encode();
        writer.Reset();
 
        byte[] signature;
 
        using (RSA key = _cert.GetRSAPrivateKey())
        {
            signature =
                key.SignData(tbsCertList, HashAlgorithmName.SHA256, RSASignaturePadding.Pkcs1);
 
            if (CorruptRevocationSignature)
            {
                signature[5] ^= 0xFF;
            }
        }
 
        // CertificateList
        using (writer.PushSequence())
        {
            writer.WriteEncodedValue(tbsCertList);
            writer.WriteEncodedValue(signatureAlgId);
            writer.WriteBitString(signature);
        }
 
        return writer.Encode();
    }
 
    internal void DesignateOcspResponder(X509Certificate2 responder)
    {
        _ocspResponder = responder;
    }
 
    internal byte[] BuildOcspResponse(
        ReadOnlyMemory<byte> certId,
        ReadOnlyMemory<byte> nonceExtension)
    {
        DateTimeOffset now = DateTimeOffset.UtcNow;
 
        DateTimeOffset revokedTime = default;
        CertStatus status = CheckRevocation(certId, ref revokedTime);
        X509Certificate2 responder = (_ocspResponder ?? _cert);
 
        AsnWriter writer = new AsnWriter(AsnEncodingRules.DER);
 
        /*
ResponseData ::= SEQUENCE {
  version              [0] EXPLICIT Version DEFAULT v1,
  responderID              ResponderID,
  producedAt               GeneralizedTime,
  responses                SEQUENCE OF SingleResponse,
  responseExtensions   [1] EXPLICIT Extensions OPTIONAL }
             */
        using (writer.PushSequence())
        {
            // Skip version (v1)
 
            /*
ResponderID ::= CHOICE {
byName               [1] Name,
byKey                [2] KeyHash }
             */
 
            using (writer.PushSequence(s_context1))
            {
                if (CorruptRevocationIssuerName)
                {
                    writer.WriteEncodedValue(s_nonParticipatingName.RawData);
                }
                else
                {
                    writer.WriteEncodedValue(responder.SubjectName.RawData);
                }
            }
 
            writer.WriteGeneralizedTime(now, omitFractionalSeconds: true);
 
            using (writer.PushSequence())
            {
                /*
SingleResponse ::= SEQUENCE {
certID                       CertID,
certStatus                   CertStatus,
thisUpdate                   GeneralizedTime,
nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,
singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }
                 */
                using (writer.PushSequence())
                {
                    writer.WriteEncodedValue(certId.Span);
 
                    if (status == CertStatus.OK)
                    {
                        writer.WriteNull(s_context0);
                    }
                    else if (status == CertStatus.Revoked)
                    {
                        // Android does not support all precisions for seconds - just omit fractional seconds for testing on Android
                        writer.PushSequence(s_context1);
                        writer.WriteGeneralizedTime(revokedTime, omitFractionalSeconds: OperatingSystem.IsAndroid());
                        writer.PopSequence(s_context1);
                    }
                    else
                    {
                        Assert.Equal(CertStatus.Unknown, status);
                        writer.WriteNull(s_context2);
                    }
 
                    if (RevocationExpiration.HasValue)
                    {
                        writer.WriteGeneralizedTime(
                            _cert.NotBefore,
                            omitFractionalSeconds: true);
 
                        using (writer.PushSequence(s_context0))
                        {
                            writer.WriteGeneralizedTime(
                                RevocationExpiration.Value,
                                omitFractionalSeconds: true);
                        }
                    }
                    else
                    {
                        writer.WriteGeneralizedTime(now, omitFractionalSeconds: true);
                    }
                }
            }
 
            if (!nonceExtension.IsEmpty)
            {
                using (writer.PushSequence(s_context1))
                using (writer.PushSequence())
                {
                    writer.WriteEncodedValue(nonceExtension.Span);
                }
            }
        }
 
        byte[] tbsResponseData = writer.Encode();
        writer.Reset();
 
        /*
            BasicOCSPResponse       ::= SEQUENCE {
tbsResponseData      ResponseData,
signatureAlgorithm   AlgorithmIdentifier,
signature            BIT STRING,
certs            [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
         */
        using (writer.PushSequence())
        {
            writer.WriteEncodedValue(tbsResponseData);
 
            using (writer.PushSequence())
            {
                writer.WriteObjectIdentifier("1.2.840.113549.1.1.11");
                writer.WriteNull();
            }
 
            using (RSA rsa = responder.GetRSAPrivateKey())
            {
                byte[] signature = rsa.SignData(
                    tbsResponseData,
                    HashAlgorithmName.SHA256,
                    RSASignaturePadding.Pkcs1);
 
                if (CorruptRevocationSignature)
                {
                    signature[5] ^= 0xFF;
                }
 
                writer.WriteBitString(signature);
            }
 
            if (_ocspResponder != null)
            {
                using (writer.PushSequence(s_context0))
                using (writer.PushSequence())
                {
                    writer.WriteEncodedValue(_ocspResponder.RawData);
                    writer.PopSequence();
                }
            }
        }
 
        byte[] responseBytes = writer.Encode();
        writer.Reset();
 
        using (writer.PushSequence())
        {
            writer.WriteEnumeratedValue(OcspResponseStatus.Successful);
 
            using (writer.PushSequence(s_context0))
            using (writer.PushSequence())
            {
                writer.WriteObjectIdentifier("1.3.6.1.5.5.7.48.1.1");
                writer.WriteOctetString(responseBytes);
            }
        }
 
        return writer.Encode();
    }
 
    private CertStatus CheckRevocation(ReadOnlyMemory<byte> certId, ref DateTimeOffset revokedTime)
    {
        AsnReader reader = new AsnReader(certId, AsnEncodingRules.DER);
        AsnReader idReader = reader.ReadSequence();
        reader.ThrowIfNotEmpty();
 
        AsnReader algIdReader = idReader.ReadSequence();
 
        if (algIdReader.ReadObjectIdentifier() != "1.3.14.3.2.26")
        {
            return CertStatus.Unknown;
        }
 
        if (algIdReader.HasData)
        {
            algIdReader.ReadNull();
            algIdReader.ThrowIfNotEmpty();
        }
 
        if (_dnHash == null)
        {
            _dnHash = SHA1.HashData(_cert.SubjectName.RawData);
        }
 
        if (!idReader.TryReadPrimitiveOctetString(out ReadOnlyMemory<byte> reqDn))
        {
            idReader.ThrowIfNotEmpty();
        }
 
        if (!reqDn.Span.SequenceEqual(_dnHash))
        {
            return CertStatus.Unknown;
        }
 
        if (!idReader.TryReadPrimitiveOctetString(out ReadOnlyMemory<byte> reqKeyHash))
        {
            idReader.ThrowIfNotEmpty();
        }
 
        // We could check the key hash...
 
        ReadOnlyMemory<byte> reqSerial = idReader.ReadIntegerBytes();
        idReader.ThrowIfNotEmpty();
 
        if (_revocationList == null)
        {
            return CertStatus.OK;
        }
 
        ReadOnlySpan<byte> reqSerialSpan = reqSerial.Span;
 
        foreach ((byte[] serial, DateTimeOffset time) in _revocationList)
        {
            if (reqSerialSpan.SequenceEqual(serial))
            {
                revokedTime = time;
                return CertStatus.Revoked;
            }
        }
 
        return CertStatus.OK;
    }
 
    private static X509Extension CreateAiaExtension(string certLocation, string ocspStem)
    {
        string[] ocsp = null;
        string[] caIssuers = null;
 
        if (ocspStem is not null)
        {
            ocsp = new[] { ocspStem };
        }
 
        if (certLocation is not null)
        {
            caIssuers = new[] { certLocation };
        }
 
        return new X509AuthorityInformationAccessExtension(ocsp, caIssuers);
    }
 
    private static X509Extension CreateCdpExtension(string cdp)
    {
        return CertificateRevocationListBuilder.BuildCrlDistributionPointExtension(new[] { cdp });
    }
 
    private X509AuthorityKeyIdentifierExtension CreateAkidExtension()
    {
        X509SubjectKeyIdentifierExtension skid =
            _cert.Extensions.OfType<X509SubjectKeyIdentifierExtension>().SingleOrDefault();
 
        if (skid is null)
        {
            return X509AuthorityKeyIdentifierExtension.CreateFromCertificate(
                _cert,
                includeKeyIdentifier: false,
                includeIssuerAndSerial: true);
        }
 
        return X509AuthorityKeyIdentifierExtension.CreateFromSubjectKeyIdentifier(skid);
    }
 
    private enum OcspResponseStatus
    {
        Successful,
    }
 
    private enum CertStatus
    {
        Unknown,
        OK,
        Revoked,
    }
 
    internal static void BuildPrivatePki(
        PkiOptions pkiOptions,
        out RevocationResponder responder,
        out CertificateAuthority rootAuthority,
        out CertificateAuthority[] intermediateAuthorities,
        out X509Certificate2 endEntityCert,
        int intermediateAuthorityCount,
        string testName = null,
        bool registerAuthorities = true,
        bool pkiOptionsInSubject = false,
        string subjectName = null,
        int keySize = DefaultKeySize,
        X509ExtensionCollection extensions = null)
    {
        bool rootDistributionViaHttp = !pkiOptions.HasFlag(PkiOptions.NoRootCertDistributionUri);
        bool issuerRevocationViaCrl = pkiOptions.HasFlag(PkiOptions.IssuerRevocationViaCrl);
        bool issuerRevocationViaOcsp = pkiOptions.HasFlag(PkiOptions.IssuerRevocationViaOcsp);
        bool issuerDistributionViaHttp = !pkiOptions.HasFlag(PkiOptions.NoIssuerCertDistributionUri);
        bool endEntityRevocationViaCrl = pkiOptions.HasFlag(PkiOptions.EndEntityRevocationViaCrl);
        bool endEntityRevocationViaOcsp = pkiOptions.HasFlag(PkiOptions.EndEntityRevocationViaOcsp);
 
        Assert.True(
            issuerRevocationViaCrl || issuerRevocationViaOcsp ||
                endEntityRevocationViaCrl || endEntityRevocationViaOcsp,
            "At least one revocation mode is enabled");
 
        // default to client
        extensions ??= new X509ExtensionCollection() { s_eeConstraints, s_eeKeyUsage, s_tlsClientEku };
 
        using (RSA rootKey = RSA.Create(keySize))
        using (RSA eeKey = RSA.Create(keySize))
        {
            var rootReq = new CertificateRequest(
                BuildSubject("A Revocation Test Root", testName, pkiOptions, pkiOptionsInSubject),
                rootKey,
                HashAlgorithmName.SHA256,
                RSASignaturePadding.Pkcs1);
 
            X509BasicConstraintsExtension caConstraints =
                new X509BasicConstraintsExtension(true, false, 0, true);
 
            rootReq.CertificateExtensions.Add(caConstraints);
            var rootSkid = new X509SubjectKeyIdentifierExtension(rootReq.PublicKey, false);
            rootReq.CertificateExtensions.Add(
                rootSkid);
 
            DateTimeOffset start = DateTimeOffset.UtcNow;
            DateTimeOffset end = start.AddMonths(3);
 
            // Don't dispose this, it's being transferred to the CertificateAuthority
            X509Certificate2 rootCert = rootReq.CreateSelfSigned(start.AddDays(-2), end.AddDays(2));
            responder = RevocationResponder.CreateAndListen();
 
            string certUrl = $"{responder.UriPrefix}cert/{rootSkid.SubjectKeyIdentifier}.cer";
            string cdpUrl = $"{responder.UriPrefix}crl/{rootSkid.SubjectKeyIdentifier}.crl";
            string ocspUrl = $"{responder.UriPrefix}ocsp/{rootSkid.SubjectKeyIdentifier}";
 
            rootAuthority = new CertificateAuthority(
                rootCert,
                rootDistributionViaHttp ? certUrl : null,
                issuerRevocationViaCrl ? cdpUrl : null,
                issuerRevocationViaOcsp ? ocspUrl : null);
 
            CertificateAuthority issuingAuthority = rootAuthority;
            intermediateAuthorities = new CertificateAuthority[intermediateAuthorityCount];
 
            for (int intermediateIndex = 0; intermediateIndex < intermediateAuthorityCount; intermediateIndex++)
            {
                using RSA intermediateKey = RSA.Create(keySize);
 
                // Don't dispose this, it's being transferred to the CertificateAuthority
                X509Certificate2 intermedCert;
 
                {
                    X509Certificate2 intermedPub = issuingAuthority.CreateSubordinateCA(
                        BuildSubject($"A Revocation Test CA {intermediateIndex}", testName, pkiOptions, pkiOptionsInSubject),
                        intermediateKey);
                    intermedCert = intermedPub.CopyWithPrivateKey(intermediateKey);
                    intermedPub.Dispose();
                }
 
                X509SubjectKeyIdentifierExtension intermedSkid =
                    intermedCert.Extensions.OfType<X509SubjectKeyIdentifierExtension>().Single();
 
                certUrl = $"{responder.UriPrefix}cert/{intermedSkid.SubjectKeyIdentifier}.cer";
                cdpUrl = $"{responder.UriPrefix}crl/{intermedSkid.SubjectKeyIdentifier}.crl";
                ocspUrl = $"{responder.UriPrefix}ocsp/{intermedSkid.SubjectKeyIdentifier}";
 
                CertificateAuthority intermediateAuthority = new CertificateAuthority(
                    intermedCert,
                    issuerDistributionViaHttp ? certUrl : null,
                    endEntityRevocationViaCrl ? cdpUrl : null,
                    endEntityRevocationViaOcsp ? ocspUrl : null);
 
                issuingAuthority = intermediateAuthority;
                intermediateAuthorities[intermediateIndex] = intermediateAuthority;
            }
 
            endEntityCert = issuingAuthority.CreateEndEntity(
                BuildSubject(subjectName ?? "A Revocation Test Cert", testName, pkiOptions, pkiOptionsInSubject),
                eeKey,
                extensions);
 
            X509Certificate2 tmp = endEntityCert;
            endEntityCert = endEntityCert.CopyWithPrivateKey(eeKey);
            tmp.Dispose();
        }
 
        if (registerAuthorities)
        {
            responder.AddCertificateAuthority(rootAuthority);
 
            foreach (CertificateAuthority authority in intermediateAuthorities)
            {
                responder.AddCertificateAuthority(authority);
            }
        }
    }
 
    internal static void BuildPrivatePki(
        PkiOptions pkiOptions,
        out RevocationResponder responder,
        out CertificateAuthority rootAuthority,
        out CertificateAuthority intermediateAuthority,
        out X509Certificate2 endEntityCert,
        string testName = null,
        bool registerAuthorities = true,
        bool pkiOptionsInSubject = false,
        string subjectName = null,
        int keySize = DefaultKeySize,
        X509ExtensionCollection extensions = null)
    {
 
        BuildPrivatePki(
            pkiOptions,
            out responder,
            out rootAuthority,
            out CertificateAuthority[] intermediateAuthorities,
            out endEntityCert,
            intermediateAuthorityCount: 1,
            testName: testName,
            registerAuthorities: registerAuthorities,
            pkiOptionsInSubject: pkiOptionsInSubject,
            subjectName: subjectName,
            keySize: keySize,
            extensions: extensions);
 
        intermediateAuthority = intermediateAuthorities.Single();
    }
 
    private static string BuildSubject(
        string cn,
        string testName,
        PkiOptions pkiOptions,
        bool includePkiOptions)
    {
        if (includePkiOptions)
        {
            return $"CN=\"{cn}\", O=\"{testName}\", OU=\"{pkiOptions}\"";
        }
 
        return $"CN=\"{cn}\", O=\"{testName}\"";
    }
}