de.rub.nds.x509attacker.trust.TrustPath Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of x509-attacker Show documentation
Show all versions of x509-attacker Show documentation
X.509-Attacker is a tool based on ASN.1 Tool for creating arbitrary certificates; including especially
invalid and malformed certificates. Since X.509 certificates encode their contents in ASN.1, this tool extends
the features of ASN.1 Tool in terms of certificate signing. Also, X.509-Attacker introduces a feature of
referencing XML elements in order to avoid redundancies when defining certificates in XML.
The newest version!
/*
* X.509-Attacker - A Library for Arbitrary X.509 Certificates
*
* Copyright 2014-2023 Ruhr University Bochum, Paderborn University, Technology Innovation Institute, and Hackmanit GmbH
*
* Licensed under Apache License, Version 2.0
* http://www.apache.org/licenses/LICENSE-2.0.txt
*/
package de.rub.nds.x509attacker.trust;
import de.rub.nds.x509attacker.x509.model.X509Certificate;
import java.util.Arrays;
import java.util.List;
public class TrustPath {
/**
* A sorted list of certificates that form the trust path. The first certificate is the
* end-entity certificate, the last certificate is the trust anchor.
*/
private List certificateList;
/**
* Creates a new TrustPath. *
*
* @param certificateList A sorted list of certificates that form the trust path. The first
* certificate is the end-entity certificate, the last certificate is the trust anchor.
*/
public TrustPath(List certificateList) {
this.certificateList = certificateList;
}
public List getCertificateList() {
return certificateList;
}
public X509Certificate getTrustAnchor() {
return certificateList.get(certificateList.size() - 1);
}
public Boolean containsExpiredCertificate() {
for (X509Certificate certificate : certificateList) {
if (certificate.isExpired()) {
return true;
}
}
return false;
}
public Boolean containsNotYetValidCertificate() {
for (X509Certificate certificate : certificateList) {
if (!certificate.isYetValid()) {
return true;
}
}
return false;
}
public Boolean containsWeakSignature() {
for (X509Certificate certificate : certificateList) {
if (Arrays.equals(
certificate.getSha256Fingerprint(),
getTrustAnchor().getSha256Fingerprint())
&& certificate.isWeakSignature()) {
return true;
}
}
return false;
}
}