All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bouncycastle.cert.TBSCert Maven / Gradle / Ivy

Go to download

The Bouncy Castle Java APIs for CMS, PKCS, EAC, TSP, CMP, CRMF, OCSP, and certificate generation. The APIs are designed primarily to be used in conjunction with the BC FIPS provider. The APIs may also be used with other providers although if being used in a FIPS context it is the responsibility of the user to ensure that any other providers used are FIPS certified.

There is a newer version: 2.1.9
Show newest version
package org.bouncycastle.cert;

import org.bouncycastle.asn1.ASN1BitString;
import org.bouncycastle.asn1.ASN1EncodableVector;
import org.bouncycastle.asn1.ASN1Integer;
import org.bouncycastle.asn1.ASN1Object;
import org.bouncycastle.asn1.ASN1Primitive;
import org.bouncycastle.asn1.ASN1Sequence;
import org.bouncycastle.asn1.ASN1TaggedObject;
import org.bouncycastle.asn1.DERBitString;
import org.bouncycastle.asn1.DERSequence;
import org.bouncycastle.asn1.DERTaggedObject;
import org.bouncycastle.asn1.x500.X500Name;
import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
import org.bouncycastle.asn1.x509.Extensions;
import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo;
import org.bouncycastle.asn1.x509.Time;
import org.bouncycastle.util.Properties;

/**
 * The TBSCertificate object.
 * 
 * TBSCertificate ::= SEQUENCE {
 *      version          [ 0 ]  Version DEFAULT v1(0),
 *      serialNumber            CertificateSerialNumber,
 *      signature               AlgorithmIdentifier,
 *      issuer                  Name,
 *      validity                Validity,
 *      subject                 Name,
 *      subjectPublicKeyInfo    SubjectPublicKeyInfo,
 *      issuerUniqueID    [ 1 ] IMPLICIT UniqueIdentifier OPTIONAL,
 *      subjectUniqueID   [ 2 ] IMPLICIT UniqueIdentifier OPTIONAL,
 *      extensions        [ 3 ] Extensions OPTIONAL
 *      }
 * 
*

* Note: issuerUniqueID and subjectUniqueID are both deprecated by the IETF. This class * will parse them, but you really shouldn't be creating new ones. */ class TBSCert extends ASN1Object { ASN1Sequence seq; ASN1Integer version; ASN1Integer serialNumber; AlgorithmIdentifier signature; X500Name issuer; Validity validity; X500Name subject; SubjectPublicKeyInfo subjectPublicKeyInfo; ASN1BitString issuerUniqueId; ASN1BitString subjectUniqueId; Extensions extensions; public static TBSCert getInstance( ASN1TaggedObject obj, boolean explicit) { return getInstance(ASN1Sequence.getInstance(obj, explicit)); } public static TBSCert getInstance( Object obj) { if (obj instanceof TBSCert) { return (TBSCert)obj; } else if (obj != null) { return new TBSCert(ASN1Sequence.getInstance(obj)); } return null; } private TBSCert( ASN1Sequence seq) { int seqStart = 0; this.seq = seq; // // some certficates don't include a version number - we assume v1 // if (seq.getObjectAt(0) instanceof ASN1TaggedObject) { version = ASN1Integer.getInstance((ASN1TaggedObject)seq.getObjectAt(0), true); } else { seqStart = -1; // field 0 is missing! version = new ASN1Integer(0); } boolean isV1 = false; boolean isV2 = false; if (version.hasValue(0)) { isV1 = true; } else if (version.hasValue(1)) { isV2 = true; } else if (!version.hasValue(2)) { throw new IllegalArgumentException("version number not recognised"); } serialNumber = ASN1Integer.getInstance(seq.getObjectAt(seqStart + 1)); signature = AlgorithmIdentifier.getInstance(seq.getObjectAt(seqStart + 2)); issuer = X500Name.getInstance(seq.getObjectAt(seqStart + 3)); validity = Validity.getInstance(seq.getObjectAt(seqStart + 4)); subject = X500Name.getInstance(seq.getObjectAt(seqStart + 5)); subjectPublicKeyInfo = SubjectPublicKeyInfo.getInstance(seq.getObjectAt(seqStart + 6)); int extras = seq.size() - (seqStart + 6) - 1; if (extras != 0 && isV1) { throw new IllegalArgumentException("version 1 certificate contains extra data"); } while (extras > 0) { ASN1TaggedObject extra = (ASN1TaggedObject)seq.getObjectAt(seqStart + 6 + extras); switch (extra.getTagNo()) { case 1: issuerUniqueId = DERBitString.getInstance(extra, false); break; case 2: subjectUniqueId = DERBitString.getInstance(extra, false); break; case 3: if (isV2) { throw new IllegalArgumentException("version 2 certificate cannot contain extensions"); } extensions = Extensions.getInstance(ASN1Sequence.getInstance(extra, true)); break; default: throw new IllegalArgumentException("Unknown tag encountered in structure: " + extra.getTagNo()); } extras--; } } public TBSCert(ASN1Integer version, ASN1Integer serialNumber, AlgorithmIdentifier signature, X500Name issuer, Validity validity, X500Name subject, SubjectPublicKeyInfo subjectPublicKeyInfo, ASN1BitString issuerUniqueId, ASN1BitString subjectUniqueId, Extensions extensions) { if (serialNumber == null) { throw new NullPointerException("'serialNumber' cannot be null"); } if (signature == null) { throw new NullPointerException("'signature' cannot be null"); } if (issuer == null) { throw new NullPointerException("'issuer' cannot be null"); } if (validity == null) { throw new NullPointerException("'validity' cannot be null"); } if (subject == null) { throw new NullPointerException("'subject' cannot be null"); } if (subjectPublicKeyInfo == null) { throw new NullPointerException("'subjectPublicKeyInfo' cannot be null"); } this.version = version != null ? version : new ASN1Integer(0); this.serialNumber = serialNumber; this.signature = signature; this.issuer = issuer; this.validity = validity; this.subject = subject; this.subjectPublicKeyInfo = subjectPublicKeyInfo; this.issuerUniqueId = issuerUniqueId; this.subjectUniqueId = subjectUniqueId; this.extensions = extensions; this.seq = null; } public int getVersionNumber() { return version.intValueExact() + 1; } public ASN1Integer getVersion() { return version; } public ASN1Integer getSerialNumber() { return serialNumber; } public AlgorithmIdentifier getSignature() { return signature; } public X500Name getIssuer() { return issuer; } public Validity getValidity() { return validity; } public Time getStartDate() { return validity.getNotBefore(); } public Time getEndDate() { return validity.getNotAfter(); } public X500Name getSubject() { return subject; } public SubjectPublicKeyInfo getSubjectPublicKeyInfo() { return subjectPublicKeyInfo; } public ASN1BitString getIssuerUniqueId() { return issuerUniqueId; } public ASN1BitString getSubjectUniqueId() { return subjectUniqueId; } public Extensions getExtensions() { return extensions; } public ASN1Primitive toASN1Primitive() { if (seq != null) { if (Properties.getPropertyValue("org.bouncycastle.x509.allow_non-der_tbscert") != null) { if (Properties.isOverrideSet("org.bouncycastle.x509.allow_non-der_tbscert")) { return seq; } } else { return seq; } } ASN1EncodableVector v = new ASN1EncodableVector(10); // DEFAULT Zero if (!version.hasValue(0)) { v.add(new DERTaggedObject(true, 0, version)); } v.add(serialNumber); v.add(signature); v.add(issuer); v.add(validity.toASN1Primitive()); v.add(subject); v.add(subjectPublicKeyInfo); // Note: implicit tag if (issuerUniqueId != null) { v.add(new DERTaggedObject(false, 1, issuerUniqueId)); } // Note: implicit tag if (subjectUniqueId != null) { v.add(new DERTaggedObject(false, 2, subjectUniqueId)); } if (extensions != null) { v.add(new DERTaggedObject(true, 3, extensions)); } return new DERSequence(v); } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy