| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| /** |
| * @author Vladimir N. Molotkov, Alexander Y. Kleymenov |
| * @version $Revision$ |
| */ |
| |
| package org.apache.harmony.security.x509; |
| |
| import java.io.IOException; |
| import java.security.cert.X509Certificate; |
| import java.util.ArrayList; |
| import java.util.List; |
| import org.apache.harmony.security.asn1.ASN1Implicit; |
| import org.apache.harmony.security.asn1.ASN1OctetString; |
| import org.apache.harmony.security.asn1.ASN1Sequence; |
| import org.apache.harmony.security.asn1.ASN1Type; |
| import org.apache.harmony.security.asn1.BerInputStream; |
| |
| /** |
| * The class encapsulates the ASN.1 DER encoding/decoding work |
| * with the following structure which is a part of X.509 certificate |
| * (as specified in RFC 3280 - |
| * Internet X.509 Public Key Infrastructure. |
| * Certificate and Certificate Revocation List (CRL) Profile. |
| * http://www.ietf.org/rfc/rfc3280.txt): |
| * |
| * <pre> |
| * |
| * NameConstraints ::= SEQUENCE { |
| * permittedSubtrees [0] GeneralSubtrees OPTIONAL, |
| * excludedSubtrees [1] GeneralSubtrees OPTIONAL } |
| * |
| * GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree |
| * |
| * </pre> |
| * |
| * @see org.apache.harmony.security.x509.GeneralSubtree |
| * @see org.apache.harmony.security.x509.GeneralName |
| */ |
| public final class NameConstraints extends ExtensionValue { |
| /** the value of permittedSubtrees field of the structure */ |
| private final GeneralSubtrees permittedSubtrees; |
| /** the value of excludedSubtrees field of the structure */ |
| private final GeneralSubtrees excludedSubtrees; |
| /** the ASN.1 encoded form of NameConstraints */ |
| private byte[] encoding; |
| |
| private ArrayList<GeneralName>[] permitted_names; |
| private ArrayList<GeneralName>[] excluded_names; |
| |
| /** |
| * Constructs <code>NameConstrains</code> object |
| */ |
| public NameConstraints(GeneralSubtrees permittedSubtrees, |
| GeneralSubtrees excludedSubtrees) { |
| if (permittedSubtrees != null) { |
| List<GeneralSubtree> ps = permittedSubtrees.getSubtrees(); |
| if (ps == null || ps.isEmpty()) { |
| throw new IllegalArgumentException("permittedSubtrees are empty"); |
| } |
| } |
| if (excludedSubtrees != null) { |
| List<GeneralSubtree> es = excludedSubtrees.getSubtrees(); |
| if (es == null || es.isEmpty()) { |
| throw new IllegalArgumentException("excludedSubtrees are empty"); |
| } |
| } |
| this.permittedSubtrees = permittedSubtrees; |
| this.excludedSubtrees = excludedSubtrees; |
| } |
| |
| private NameConstraints(GeneralSubtrees permittedSubtrees, |
| GeneralSubtrees excludedSubtrees, byte[] encoding) { |
| this(permittedSubtrees, excludedSubtrees); |
| this.encoding = encoding; |
| } |
| |
| public static NameConstraints decode(byte[] encoding) throws IOException { |
| return (NameConstraints) ASN1.decode(encoding); |
| } |
| |
| @Override public byte[] getEncoded() { |
| if (encoding == null) { |
| encoding = ASN1.encode(this); |
| } |
| return encoding; |
| } |
| |
| /** |
| * Prepare the data structure to speed up the checking process. |
| */ |
| private void prepareNames() { |
| // array of lists with permitted General Names divided by type |
| permitted_names = new ArrayList[9]; |
| if (permittedSubtrees != null) { |
| for (GeneralSubtree generalSubtree : permittedSubtrees.getSubtrees()) { |
| GeneralName name = generalSubtree.getBase(); |
| int tag = name.getTag(); |
| if (permitted_names[tag] == null) { |
| permitted_names[tag] = new ArrayList<GeneralName>(); |
| } |
| permitted_names[tag].add(name); |
| } |
| } |
| // array of lists with excluded General Names divided by type |
| excluded_names = new ArrayList[9]; |
| if (excludedSubtrees != null) { |
| for (GeneralSubtree generalSubtree : excludedSubtrees.getSubtrees()) { |
| GeneralName name = generalSubtree.getBase(); |
| int tag = name.getTag(); |
| if (excluded_names[tag] == null) { |
| excluded_names[tag] = new ArrayList<GeneralName>(); |
| } |
| excluded_names[tag].add(name); |
| } |
| } |
| } |
| |
| /** |
| * Returns the value of certificate extension |
| */ |
| private byte[] getExtensionValue(X509Certificate cert, String OID) { |
| try { |
| byte[] bytes = cert.getExtensionValue(OID); |
| if (bytes == null) { |
| return null; |
| } |
| return (byte[]) ASN1OctetString.getInstance().decode(bytes); |
| } catch (IOException e) { |
| return null; |
| } |
| } |
| |
| /** |
| * Apply the name restrictions specified by this NameConstraints |
| * instance to the subject distinguished name and subject alternative |
| * names of specified X509Certificate. Restrictions apply only |
| * if specified name form is present in the certificate. |
| * The restrictions are applied according the RFC 3280 |
| * (see 4.2.1.11 Name Constraints), excepting that restrictions are applied |
| * and to CA certificates, and to certificates which issuer and subject |
| * names the same (i.e. method does not check if it CA's certificate or not, |
| * or if the names differ or not. This check if it is needed should be done |
| * by caller before calling this method). |
| * @param cert X.509 Certificate to be checked. |
| * @return true if the certificate is acceptable according |
| * these NameConstraints restrictions |
| */ |
| public boolean isAcceptable(X509Certificate cert) { |
| if (permitted_names == null) { |
| prepareNames(); |
| } |
| |
| byte[] bytes = getExtensionValue(cert, "2.5.29.17"); |
| List<GeneralName> names; |
| try { |
| names = (bytes == null) |
| ? new ArrayList<GeneralName>(1) // will check the subject field only |
| : ((GeneralNames) GeneralNames.ASN1.decode(bytes)).getNames(); |
| } catch (IOException e) { |
| // the certificate is broken; |
| e.printStackTrace(); |
| return false; |
| } |
| if ((excluded_names[4] != null) || (permitted_names[4] != null)) { |
| try { |
| names.add(new GeneralName(4, |
| cert.getSubjectX500Principal().getName())); |
| } catch (IOException e) { |
| // should never be happened |
| } |
| } |
| return isAcceptable(names); |
| } |
| |
| /** |
| * Check if this list of names is acceptable according to this |
| * NameConstraints object. |
| */ |
| public boolean isAcceptable(List<GeneralName> names) { |
| if (permitted_names == null) { |
| prepareNames(); |
| } |
| |
| // check map: shows which types of permitted alternative names are |
| // presented in the certificate |
| boolean[] types_presented = new boolean[9]; |
| // check map: shows if permitted name of presented type is found |
| // among the certificate's alternative names |
| boolean[] permitted_found = new boolean[9]; |
| for (GeneralName name : names) { |
| int type = name.getTag(); |
| // search the name in excluded names |
| if (excluded_names[type] != null) { |
| for (int i = 0; i < excluded_names[type].size(); i++) { |
| if (excluded_names[type].get(i).isAcceptable(name)) { |
| return false; |
| } |
| } |
| } |
| // Search the name in permitted names |
| // (if we already found the name of such type between the alt |
| // names - we do not need to check others) |
| if ((permitted_names[type] != null) && (!permitted_found[type])) { |
| types_presented[type] = true; |
| for (int i = 0; i < permitted_names[type].size(); i++) { |
| if (permitted_names[type].get(i).isAcceptable(name)) { |
| // found one permitted name of such type |
| permitted_found[type] = true; |
| } |
| } |
| } |
| } |
| for (int type = 0; type < 9; type++) { |
| if (types_presented[type] && !permitted_found[type]) { |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| @Override public void dumpValue(StringBuilder sb, String prefix) { |
| sb.append(prefix).append("Name Constraints: [\n"); |
| if (permittedSubtrees != null) { |
| sb.append(prefix).append(" Permitted: [\n"); |
| for (GeneralSubtree generalSubtree : permittedSubtrees.getSubtrees()) { |
| generalSubtree.dumpValue(sb, prefix + " "); |
| } |
| sb.append(prefix).append(" ]\n"); |
| } |
| if (excludedSubtrees != null) { |
| sb.append(prefix).append(" Excluded: [\n"); |
| for (GeneralSubtree generalSubtree : excludedSubtrees.getSubtrees()) { |
| generalSubtree.dumpValue(sb, prefix + " "); |
| } |
| sb.append(prefix).append(" ]\n"); |
| } |
| sb.append('\n').append(prefix).append("]\n"); |
| } |
| |
| /** |
| * X.509 NameConstraints encoder/decoder. |
| */ |
| public static final ASN1Sequence ASN1 = new ASN1Sequence(new ASN1Type[] { |
| new ASN1Implicit(0, GeneralSubtrees.ASN1), |
| new ASN1Implicit(1, GeneralSubtrees.ASN1) }) { |
| { |
| setOptional(0); |
| setOptional(1); |
| } |
| |
| @Override protected Object getDecodedObject(BerInputStream in) { |
| Object[] values = (Object[]) in.content; |
| return new NameConstraints( |
| (GeneralSubtrees) values[0], |
| (GeneralSubtrees) values[1], |
| in.getEncoded()); |
| } |
| |
| @Override protected void getValues(Object object, Object[] values) { |
| NameConstraints nc = (NameConstraints) object; |
| values[0] = nc.permittedSubtrees; |
| values[1] = nc.excludedSubtrees; |
| } |
| }; |
| } |