1 | /* X509Certificate.java --- X.509 Certificate class
|
---|
2 | Copyright (C) 1999 Free Software Foundation, Inc.
|
---|
3 |
|
---|
4 | This file is part of GNU Classpath.
|
---|
5 |
|
---|
6 | GNU Classpath is free software; you can redistribute it and/or modify
|
---|
7 | it under the terms of the GNU General Public License as published by
|
---|
8 | the Free Software Foundation; either version 2, or (at your option)
|
---|
9 | any later version.
|
---|
10 |
|
---|
11 | GNU Classpath is distributed in the hope that it will be useful, but
|
---|
12 | WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
14 | General Public License for more details.
|
---|
15 |
|
---|
16 | You should have received a copy of the GNU General Public License
|
---|
17 | along with GNU Classpath; see the file COPYING. If not, write to the
|
---|
18 | Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
---|
19 | 02111-1307 USA.
|
---|
20 |
|
---|
21 | Linking this library statically or dynamically with other modules is
|
---|
22 | making a combined work based on this library. Thus, the terms and
|
---|
23 | conditions of the GNU General Public License cover the whole
|
---|
24 | combination.
|
---|
25 |
|
---|
26 | As a special exception, the copyright holders of this library give you
|
---|
27 | permission to link this library with independent modules to produce an
|
---|
28 | executable, regardless of the license terms of these independent
|
---|
29 | modules, and to copy and distribute the resulting executable under
|
---|
30 | terms of your choice, provided that you also meet, for each linked
|
---|
31 | independent module, the terms and conditions of the license of that
|
---|
32 | module. An independent module is a module which is not derived from
|
---|
33 | or based on this library. If you modify this library, you may extend
|
---|
34 | this exception to your version of the library, but you are not
|
---|
35 | obligated to do so. If you do not wish to do so, delete this
|
---|
36 | exception statement from your version. */
|
---|
37 |
|
---|
38 |
|
---|
39 | package java.security.cert;
|
---|
40 | import java.math.BigInteger;
|
---|
41 | import java.security.Principal;
|
---|
42 | import java.security.PublicKey;
|
---|
43 | import java.security.NoSuchAlgorithmException;
|
---|
44 | import java.security.InvalidKeyException;
|
---|
45 | import java.security.NoSuchProviderException;
|
---|
46 | import java.security.SignatureException;
|
---|
47 | import java.util.Date;
|
---|
48 |
|
---|
49 | /**
|
---|
50 | X509Certificate is the abstract class for X.509 certificates.
|
---|
51 | This provides a stanard class interface for accessing all
|
---|
52 | the attributes of X.509 certificates.
|
---|
53 |
|
---|
54 | In June 1996, the basic X.509 v3 format was finished by
|
---|
55 | ISO/IEC and ANSI X.9. The ASN.1 DER format is below:
|
---|
56 |
|
---|
57 | Certificate ::= SEQUENCE {
|
---|
58 | tbsCertificate TBSCertificate,
|
---|
59 | signatureAlgorithm AlgorithmIdentifier,
|
---|
60 | signatureValue BIT STRING }
|
---|
61 |
|
---|
62 | These certificates are widely used in various Internet
|
---|
63 | protocols to support authentication. It is used in
|
---|
64 | Privacy Enhanced Mail (PEM), Transport Layer Security (TLS),
|
---|
65 | Secure Sockets Layer (SSL), code signing for trusted software
|
---|
66 | distribution, and Secure Electronic Transactions (SET).
|
---|
67 |
|
---|
68 | The certificates are managed and vouched for by
|
---|
69 | <I>Certificate Authorities</I> (CAs). CAs are companies or
|
---|
70 | groups that create certificates by placing the data in the
|
---|
71 | X.509 certificate format and signing it with their private
|
---|
72 | key. CAs serve as trusted third parties by certifying that
|
---|
73 | the person or group specified in the certificate is who
|
---|
74 | they say they are.
|
---|
75 |
|
---|
76 | The ASN.1 defintion for <I>tbsCertificate</I> is
|
---|
77 |
|
---|
78 | TBSCertificate ::= SEQUENCE {
|
---|
79 | version [0] EXPLICIT Version DEFAULT v1,
|
---|
80 | serialNumber CertificateSerialNumber,
|
---|
81 | signature AlgorithmIdentifier,
|
---|
82 | issuer Name,
|
---|
83 | validity Validity,
|
---|
84 | subject Name,
|
---|
85 | subjectPublicKeyInfo SubjectPublicKeyInfo,
|
---|
86 | issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
|
---|
87 | -- If present, version shall be v2 or v3
|
---|
88 | subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
|
---|
89 | -- If present, version shall be v2 or v3
|
---|
90 | extensions [3] EXPLICIT Extensions OPTIONAL
|
---|
91 | -- If present, version shall be v3
|
---|
92 | }
|
---|
93 |
|
---|
94 | Version ::= INTEGER { v1(0), v2(1), v3(2) }
|
---|
95 |
|
---|
96 | CertificateSerialNumber ::= INTEGER
|
---|
97 |
|
---|
98 | Validity ::= SEQUENCE {
|
---|
99 | notBefore Time,
|
---|
100 | notAfter Time }
|
---|
101 |
|
---|
102 | Time ::= CHOICE {
|
---|
103 | utcTime UTCTime,
|
---|
104 | generalTime GeneralizedTime }
|
---|
105 |
|
---|
106 | UniqueIdentifier ::= BIT STRING
|
---|
107 |
|
---|
108 | SubjectPublicKeyInfo ::= SEQUENCE {
|
---|
109 | algorithm AlgorithmIdentifier,
|
---|
110 | subjectPublicKey BIT STRING }
|
---|
111 |
|
---|
112 | Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
|
---|
113 |
|
---|
114 | Extension ::= SEQUENCE {
|
---|
115 | extnID OBJECT IDENTIFIER,
|
---|
116 | critical BOOLEAN DEFAULT FALSE,
|
---|
117 | extnValue OCTET STRING }
|
---|
118 |
|
---|
119 |
|
---|
120 | Certificates are created with the CertificateFactory.
|
---|
121 | For more information about X.509 certificates, consult
|
---|
122 | rfc2459.
|
---|
123 |
|
---|
124 | @since JDK 1.2
|
---|
125 |
|
---|
126 | @author Mark Benvenuto
|
---|
127 | */
|
---|
128 | public abstract class X509Certificate extends Certificate implements X509Extension
|
---|
129 | {
|
---|
130 |
|
---|
131 | /**
|
---|
132 | Constructs a new certificate of the specified type.
|
---|
133 | */
|
---|
134 | protected X509Certificate()
|
---|
135 | {
|
---|
136 | super( "X.509" );
|
---|
137 | }
|
---|
138 |
|
---|
139 | /**
|
---|
140 | Checks the validity of the X.509 certificate. It is valid
|
---|
141 | if the current date and time are within the period specified
|
---|
142 | by the certificate.
|
---|
143 |
|
---|
144 | The ASN.1 DER encoding is:
|
---|
145 |
|
---|
146 | validity Validity,
|
---|
147 |
|
---|
148 | Validity ::= SEQUENCE {
|
---|
149 | notBefore Time,
|
---|
150 | notAfter Time }
|
---|
151 |
|
---|
152 | Time ::= CHOICE {
|
---|
153 | utcTime UTCTime,
|
---|
154 | generalTime GeneralizedTime }
|
---|
155 |
|
---|
156 | Consult rfc2459 for more information.
|
---|
157 |
|
---|
158 | @throws CertificateExpiredException if the certificate expired
|
---|
159 | @throws CertificateNotYetValidException if the certificate is
|
---|
160 | not yet valid
|
---|
161 | */
|
---|
162 | public abstract void checkValidity()
|
---|
163 | throws CertificateExpiredException,
|
---|
164 | CertificateNotYetValidException;
|
---|
165 |
|
---|
166 | /**
|
---|
167 | Checks the validity of the X.509 certificate for the
|
---|
168 | specified time and date. It is valid if the specified
|
---|
169 | date and time are within the period specified by
|
---|
170 | the certificate.
|
---|
171 |
|
---|
172 | @throws CertificateExpiredException if the certificate expired
|
---|
173 | based on the date
|
---|
174 | @throws CertificateNotYetValidException if the certificate is
|
---|
175 | not yet valid based on the date
|
---|
176 | */
|
---|
177 | public abstract void checkValidity(Date date)
|
---|
178 | throws CertificateExpiredException,
|
---|
179 | CertificateNotYetValidException;
|
---|
180 |
|
---|
181 | /**
|
---|
182 | Returns the version of this certificate.
|
---|
183 |
|
---|
184 | The ASN.1 DER encoding is:
|
---|
185 |
|
---|
186 | version [0] EXPLICIT Version DEFAULT v1,
|
---|
187 |
|
---|
188 | Version ::= INTEGER { v1(0), v2(1), v3(2) }
|
---|
189 |
|
---|
190 | Consult rfc2459 for more information.
|
---|
191 |
|
---|
192 | @return version number of certificate
|
---|
193 | */
|
---|
194 | public abstract int getVersion();
|
---|
195 |
|
---|
196 | /**
|
---|
197 | Gets the serial number for serial Number in
|
---|
198 | this Certifcate. It must be a unique number
|
---|
199 | unique other serial numbers from the granting CA.
|
---|
200 |
|
---|
201 | The ASN.1 DER encoding is:
|
---|
202 |
|
---|
203 | serialNumber CertificateSerialNumber,
|
---|
204 |
|
---|
205 | CertificateSerialNumber ::= INTEGER
|
---|
206 |
|
---|
207 | Consult rfc2459 for more information.
|
---|
208 |
|
---|
209 | @return the serial number for this X509CRLEntry.
|
---|
210 | */
|
---|
211 | public abstract BigInteger getSerialNumber();
|
---|
212 |
|
---|
213 | /**
|
---|
214 | Returns the issuer (issuer distinguished name) of the
|
---|
215 | Certificate. The issuer is the entity who signed
|
---|
216 | and issued the Certificate.
|
---|
217 |
|
---|
218 | The ASN.1 DER encoding is:
|
---|
219 |
|
---|
220 | issuer Name,
|
---|
221 |
|
---|
222 | Name ::= CHOICE {
|
---|
223 | RDNSequence }
|
---|
224 |
|
---|
225 | RDNSequence ::= SEQUENCE OF RelativeDistinguishedName
|
---|
226 |
|
---|
227 | RelativeDistinguishedName ::=
|
---|
228 | SET OF AttributeTypeAndValue
|
---|
229 |
|
---|
230 | AttributeTypeAndValue ::= SEQUENCE {
|
---|
231 | type AttributeType,
|
---|
232 | value AttributeValue }
|
---|
233 |
|
---|
234 | AttributeType ::= OBJECT IDENTIFIER
|
---|
235 |
|
---|
236 | AttributeValue ::= ANY DEFINED BY AttributeType
|
---|
237 |
|
---|
238 | DirectoryString ::= CHOICE {
|
---|
239 | teletexString TeletexString (SIZE (1..MAX)),
|
---|
240 | printableString PrintableString (SIZE (1..MAX)),
|
---|
241 | universalString UniversalString (SIZE (1..MAX)),
|
---|
242 | utf8String UTF8String (SIZE (1.. MAX)),
|
---|
243 | bmpString BMPString (SIZE (1..MAX)) }
|
---|
244 |
|
---|
245 | Consult rfc2459 for more information.
|
---|
246 |
|
---|
247 | @return the issuer in the Principal class
|
---|
248 | */
|
---|
249 | public abstract Principal getIssuerDN();
|
---|
250 |
|
---|
251 | /**
|
---|
252 | Returns the subject (subject distinguished name) of the
|
---|
253 | Certificate. The subject is the entity who the Certificate
|
---|
254 | identifies.
|
---|
255 |
|
---|
256 | The ASN.1 DER encoding is:
|
---|
257 |
|
---|
258 | subject Name,
|
---|
259 |
|
---|
260 | Consult rfc2459 for more information.
|
---|
261 |
|
---|
262 | @return the issuer in the Principal class
|
---|
263 | */
|
---|
264 | public abstract Principal getSubjectDN();
|
---|
265 |
|
---|
266 | /**
|
---|
267 | Returns the date that this certificate is not to be used
|
---|
268 | before, <I>notBefore</I>.
|
---|
269 |
|
---|
270 | The ASN.1 DER encoding is:
|
---|
271 |
|
---|
272 | validity Validity,
|
---|
273 |
|
---|
274 | Validity ::= SEQUENCE {
|
---|
275 | notBefore Time,
|
---|
276 | notAfter Time }
|
---|
277 |
|
---|
278 | Time ::= CHOICE {
|
---|
279 | utcTime UTCTime,
|
---|
280 | generalTime GeneralizedTime }
|
---|
281 |
|
---|
282 | Consult rfc2459 for more information.
|
---|
283 |
|
---|
284 | @return the date <I>notBefore</I>
|
---|
285 | */
|
---|
286 | public abstract Date getNotBefore();
|
---|
287 |
|
---|
288 | /**
|
---|
289 | Returns the date that this certificate is not to be used
|
---|
290 | after, <I>notAfter</I>.
|
---|
291 |
|
---|
292 | @return the date <I>notAfter</I>
|
---|
293 | */
|
---|
294 | public abstract Date getNotAfter();
|
---|
295 |
|
---|
296 |
|
---|
297 | /**
|
---|
298 | Returns the <I>tbsCertificate</I> from the certificate.
|
---|
299 |
|
---|
300 | @return the DER encoded tbsCertificate
|
---|
301 |
|
---|
302 | @throws CertificateEncodingException if encoding error occurred
|
---|
303 | */
|
---|
304 | public abstract byte[] getTBSCertificate() throws CertificateEncodingException;
|
---|
305 |
|
---|
306 | /**
|
---|
307 | Returns the signature in its raw DER encoded format.
|
---|
308 |
|
---|
309 | The ASN.1 DER encoding is:
|
---|
310 |
|
---|
311 | signatureValue BIT STRING
|
---|
312 |
|
---|
313 | Consult rfc2459 for more information.
|
---|
314 |
|
---|
315 | @return byte array representing signature
|
---|
316 | */
|
---|
317 | public abstract byte[] getSignature();
|
---|
318 |
|
---|
319 | /**
|
---|
320 | Returns the signature algorithm used to sign the CRL.
|
---|
321 | An examples is "SHA-1/DSA".
|
---|
322 |
|
---|
323 | The ASN.1 DER encoding is:
|
---|
324 |
|
---|
325 | signatureAlgorithm AlgorithmIdentifier,
|
---|
326 |
|
---|
327 | AlgorithmIdentifier ::= SEQUENCE {
|
---|
328 | algorithm OBJECT IDENTIFIER,
|
---|
329 | parameters ANY DEFINED BY algorithm OPTIONAL }
|
---|
330 |
|
---|
331 | Consult rfc2459 for more information.
|
---|
332 |
|
---|
333 | The algorithm name is determined from the OID.
|
---|
334 |
|
---|
335 | @return a string with the signature algorithm name
|
---|
336 | */
|
---|
337 | public abstract String getSigAlgName();
|
---|
338 |
|
---|
339 |
|
---|
340 | /**
|
---|
341 | Returns the OID for the signature algorithm used.
|
---|
342 | Example "1.2.840.10040.4.3" is return for SHA-1 with DSA.\
|
---|
343 |
|
---|
344 | The ASN.1 DER encoding for the example is:
|
---|
345 |
|
---|
346 | id-dsa-with-sha1 ID ::= {
|
---|
347 | iso(1) member-body(2) us(840) x9-57 (10040)
|
---|
348 | x9cm(4) 3 }
|
---|
349 |
|
---|
350 | Consult rfc2459 for more information.
|
---|
351 |
|
---|
352 | @return a string containing the OID.
|
---|
353 | */
|
---|
354 | public abstract String getSigAlgOID();
|
---|
355 |
|
---|
356 |
|
---|
357 | /**
|
---|
358 | Returns the AlgorithmParameters in the encoded form
|
---|
359 | for the signature algorithm used.
|
---|
360 |
|
---|
361 | If access to the parameters is need, create an
|
---|
362 | instance of AlgorithmParameters.
|
---|
363 |
|
---|
364 | @return byte array containing algorithm parameters, null
|
---|
365 | if no parameters are present in certificate
|
---|
366 | */
|
---|
367 | public abstract byte[] getSigAlgParams();
|
---|
368 |
|
---|
369 |
|
---|
370 | /**
|
---|
371 | Returns the issuer unique ID for this certificate.
|
---|
372 |
|
---|
373 | The ASN.1 DER encoding is:
|
---|
374 |
|
---|
375 | issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
|
---|
376 | -- If present, version shall be v2 or v3
|
---|
377 |
|
---|
378 | UniqueIdentifier ::= BIT STRING
|
---|
379 |
|
---|
380 | Consult rfc2459 for more information.
|
---|
381 |
|
---|
382 | @return bit representation of <I>issuerUniqueID</I>
|
---|
383 | */
|
---|
384 | public abstract boolean[] getIssuerUniqueID();
|
---|
385 |
|
---|
386 | /**
|
---|
387 | Returns the subject unique ID for this certificate.
|
---|
388 |
|
---|
389 | The ASN.1 DER encoding is:
|
---|
390 |
|
---|
391 | subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
|
---|
392 | -- If present, version shall be v2 or v3
|
---|
393 |
|
---|
394 | UniqueIdentifier ::= BIT STRING
|
---|
395 |
|
---|
396 | Consult rfc2459 for more information.
|
---|
397 |
|
---|
398 | @return bit representation of <I>subjectUniqueID</I>
|
---|
399 | */
|
---|
400 | public abstract boolean[] getSubjectUniqueID();
|
---|
401 |
|
---|
402 | /**
|
---|
403 | Returns a boolean array representing the <I>KeyUsage</I>
|
---|
404 | extension for the certificate. The KeyUsage (OID = 2.5.29.15)
|
---|
405 | defines the purpose of the key in the certificate.
|
---|
406 |
|
---|
407 | The ASN.1 DER encoding is:
|
---|
408 |
|
---|
409 | id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
|
---|
410 |
|
---|
411 | KeyUsage ::= BIT STRING {
|
---|
412 | digitalSignature (0),
|
---|
413 | nonRepudiation (1),
|
---|
414 | keyEncipherment (2),
|
---|
415 | dataEncipherment (3),
|
---|
416 | keyAgreement (4),
|
---|
417 | keyCertSign (5),
|
---|
418 | cRLSign (6),
|
---|
419 | encipherOnly (7),
|
---|
420 | decipherOnly (8) }
|
---|
421 |
|
---|
422 | Consult rfc2459 for more information.
|
---|
423 |
|
---|
424 | @return bit representation of <I>KeyUsage</I>
|
---|
425 | */
|
---|
426 | public abstract boolean[] getKeyUsage();
|
---|
427 |
|
---|
428 | /**
|
---|
429 | Returns the certificate constraints path length from the
|
---|
430 | critical BasicConstraints extension, (OID = 2.5.29.19).
|
---|
431 |
|
---|
432 | The basic constraints extensions is used to determine if
|
---|
433 | the subject of the certificate is a Certificate Authority (CA)
|
---|
434 | and how deep the certification path may exist. The
|
---|
435 | <I>pathLenConstraint</I> only takes affect if <I>cA</I>
|
---|
436 | is set to true. "A value of zero indicates that only an
|
---|
437 | end-entity certificate may follow in the path." (rfc2459)
|
---|
438 |
|
---|
439 | The ASN.1 DER encoding is:
|
---|
440 |
|
---|
441 | id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 }
|
---|
442 |
|
---|
443 | BasicConstraints ::= SEQUENCE {
|
---|
444 | cA BOOLEAN DEFAULT FALSE,
|
---|
445 | pathLenConstraint INTEGER (0..MAX) OPTIONAL }
|
---|
446 |
|
---|
447 | Consult rfc2459 for more information.
|
---|
448 |
|
---|
449 | @return the length of the path constraint if BasicConstraints
|
---|
450 | is present and cA is TRUE. Otherwise returns -1.
|
---|
451 | */
|
---|
452 | public abstract int getBasicConstraints();
|
---|
453 |
|
---|
454 |
|
---|
455 | }
|
---|