blob: e1a5588fe3b52f739bb13bc2cc6bd905733c7f1a [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/**
* @author Vladimir N. Molotkov, Alexander Y. Kleymenov
* @version $Revision$
*/
package org.apache.harmony.security.x509;
import java.io.IOException;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Iterator;
import java.util.List;
import org.apache.harmony.security.asn1.ASN1Implicit;
import org.apache.harmony.security.asn1.ASN1OctetString;
import org.apache.harmony.security.asn1.ASN1Sequence;
import org.apache.harmony.security.asn1.ASN1Type;
import org.apache.harmony.security.asn1.BerInputStream;
/**
* The class encapsulates the ASN.1 DER encoding/decoding work
* with the following structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
* Certificate and Certificate Revocation List (CRL) Profile.
* http://www.ietf.org/rfc/rfc3280.txt):
*
* <pre>
*
* NameConstraints ::= SEQUENCE {
* permittedSubtrees [0] GeneralSubtrees OPTIONAL,
* excludedSubtrees [1] GeneralSubtrees OPTIONAL }
*
* GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree
*
* </pre>
*
*
* @see org.apache.harmony.security.x509.GeneralSubtree
* @see org.apache.harmony.security.x509.GeneralName
*/
public class NameConstraints extends ExtensionValue {
// the value of permittedSubtrees field of the structure
private final GeneralSubtrees permittedSubtrees;
// the value of excludedSubtrees field of the structure
private final GeneralSubtrees excludedSubtrees;
// the ASN.1 encoded form of NameConstraints
private byte[] encoding;
// helper fields
private ArrayList[] permitted_names;
private ArrayList[] excluded_names;
/**
* Default ctor
*/
public NameConstraints() {
this(null, null);
}
/**
* Constructs <code>NameConstrains</code> object
* @param permittedSubtrees: GeneralSubtrees
* @param excludedSubtrees: GeneralSubtrees
*/
public NameConstraints(GeneralSubtrees permittedSubtrees,
GeneralSubtrees excludedSubtrees) {
if (permittedSubtrees != null) {
List ps = permittedSubtrees.getSubtrees();
if ((ps == null) || (ps.size() == 0)) {
throw new IllegalArgumentException("permittedSubtrees are empty");
}
}
if (excludedSubtrees != null) {
List es = excludedSubtrees.getSubtrees();
if ((es == null) || (es.size() == 0)) {
throw new IllegalArgumentException("excludedSubtrees are empty");
}
}
this.permittedSubtrees = permittedSubtrees;
this.excludedSubtrees = excludedSubtrees;
}
//
// Constructs NameConstrains object
// @param permittedSubtrees: GeneralSubtrees
// @param excludedSubtrees: GeneralSubtrees
// @param encoding: byte[]
//
private NameConstraints(GeneralSubtrees permittedSubtrees,
GeneralSubtrees excludedSubtrees, byte[] encoding) {
this(permittedSubtrees, excludedSubtrees);
this.encoding = encoding;
}
public static NameConstraints decode(byte[] encoding) throws IOException {
return (NameConstraints) ASN1.decode(encoding);
}
/**
* Returns ASN.1 encoded form of this X.509 NameConstraints value.
* @return a byte array containing ASN.1 encode form.
*/
public byte[] getEncoded() {
if (encoding == null) {
encoding = ASN1.encode(this);
}
return encoding;
}
//
// Prepare the data structure to speed up the checking process.
//
private void prepareNames() {
// array of lists with permitted General Names divided by type
permitted_names = new ArrayList[9];
if (permittedSubtrees != null) {
Iterator it = permittedSubtrees.getSubtrees().iterator();
while (it.hasNext()) {
GeneralName name = ((GeneralSubtree) it.next()).getBase();
//System.out.println("PERMITTED: "+name);
int tag = name.getTag();
if (permitted_names[tag] == null) {
permitted_names[tag] = new ArrayList();
}
permitted_names[tag].add(name);
}
}
// array of lists with excluded General Names divided by type
excluded_names = new ArrayList[9];
if (excludedSubtrees != null) {
Iterator it = excludedSubtrees.getSubtrees().iterator();
while (it.hasNext()) {
GeneralName name = ((GeneralSubtree) it.next()).getBase();
//System.out.println("EXCLUDED: "+name);
int tag = name.getTag();
if (excluded_names[tag] == null) {
excluded_names[tag] = new ArrayList();
}
excluded_names[tag].add(name);
}
}
}
//
// Returns the value of certificate extension
//
private byte[] getExtensionValue(X509Certificate cert, String OID) {
try {
byte[] bytes = cert.getExtensionValue(OID);
if (bytes == null) {
return null;
}
return (byte[]) ASN1OctetString.getInstance().decode(bytes);
} catch (IOException e) {
return null;
}
}
/**
* Apply the name restrictions specified by this NameConstraints
* instance to the subject distinguished name and subject alternative
* names of specified X509Certificate. Restrictions apply only
* if specified name form is present in the certificate.
* The restrictions are applied according the RFC 3280
* (see 4.2.1.11 Name Constraints), excepting that restrictions are applied
* and to CA certificates, and to certificates which issuer and subject
* names the same (i.e. method does not check if it CA's certificate or not,
* or if the names differ or not. This check if it is needed should be done
* by caller before calling this method).
* @param X509Certificate : X.509 Certificate to be checked.
* @return true, if the certificate is acceptable according
* these NameConstraints restrictions, and false otherwise.
*/
public boolean isAcceptable(X509Certificate cert) {
if (permitted_names == null) {
prepareNames();
}
byte[] bytes = getExtensionValue(cert, "2.5.29.17");
List names;
try {
names = (bytes == null)
? new ArrayList(1) // will check the subject field only
: ((GeneralNames) GeneralNames.ASN1.decode(bytes)).getNames();
} catch (IOException e) {
// the certificate is broken;
e.printStackTrace();
return false;
}
if ((excluded_names[4] != null) || (permitted_names[4] != null)) {
try {
names.add(new GeneralName(4,
cert.getSubjectX500Principal().getName()));
} catch (IOException e) {
// should never be happened
}
}
return isAcceptable(names);
}
/**
* Check if this list of names is acceptable accoring to this
* NameConstraints object.
* @param names: List
* @return
*/
public boolean isAcceptable(List names) {
if (permitted_names == null) {
prepareNames();
}
Iterator it = names.iterator();
// check map: shows which types of permitted alternative names are
// presented in the certificate
boolean[] types_presented = new boolean[9];
// check map: shows if permitted name of presented type is found
// among the certificate's alternative names
boolean[] permitted_found = new boolean[9];
while (it.hasNext()) {
GeneralName name = (GeneralName) it.next();
int type = name.getTag();
// search the name in excluded names
if (excluded_names[type] != null) {
for (int i=0; i<excluded_names[type].size(); i++) {
if (((GeneralName) excluded_names[type].get(i))
.isAcceptable(name)) {
return false;
}
}
}
// Search the name in permitted names
// (if we already found the name of such type between the alt
// names - we do not need to check others)
if ((permitted_names[type] != null) && (!permitted_found[type])) {
types_presented[type] = true;
for (int i=0; i<permitted_names[type].size(); i++) {
if (((GeneralName) permitted_names[type].get(i))
.isAcceptable(name)) {
// found one permitted name of such type
permitted_found[type] = true;
}
}
}
}
for (int type=0; type<9; type++) {
if (types_presented[type] && !permitted_found[type]) {
return false;
}
}
return true;
}
/**
* Places the string representation of extension value
* into the StringBuffer object.
*/
public void dumpValue(StringBuffer buffer, String prefix) {
buffer.append(prefix).append("Name Constraints: [\n");
if (permittedSubtrees != null) {
buffer.append(prefix).append(" Permitted: [\n");
for (Iterator it=permittedSubtrees.getSubtrees().iterator();
it.hasNext();) {
((GeneralSubtree) it.next()).dumpValue(buffer, prefix + " ");
}
buffer.append(prefix).append(" ]\n");
}
if (excludedSubtrees != null) {
buffer.append(prefix).append(" Excluded: [\n");
for (Iterator it=excludedSubtrees.getSubtrees().iterator();
it.hasNext();) {
((GeneralSubtree) it.next()).dumpValue(buffer, prefix + " ");
}
buffer.append(prefix).append(" ]\n");
}
buffer.append('\n').append(prefix).append("]\n");
}
/**
* X.509 NameConstraints encoder/decoder.
*/
public static final ASN1Sequence ASN1 = new ASN1Sequence(new ASN1Type[] {
new ASN1Implicit(0, GeneralSubtrees.ASN1),
new ASN1Implicit(1, GeneralSubtrees.ASN1) }) {
{
setOptional(0);
setOptional(1);
}
protected Object getDecodedObject(BerInputStream in) {
Object[] values = (Object[]) in.content;
return new NameConstraints(
(GeneralSubtrees) values[0],
(GeneralSubtrees) values[1],
in.getEncoded());
}
protected void getValues(Object object, Object[] values) {
NameConstraints nc = (NameConstraints) object;
values[0] = nc.permittedSubtrees;
values[1] = nc.excludedSubtrees;
}
};
}