1 /*
2  * Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved.
3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4  *
5  * This code is free software; you can redistribute it and/or modify it
6  * under the terms of the GNU General Public License version 2 only, as
7  * published by the Free Software Foundation.  Oracle designates this
8  * particular file as subject to the "Classpath" exception as provided
9  * by Oracle in the LICENSE file that accompanied this code.
10  *
11  * This code is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
14  * version 2 for more details (a copy is included in the LICENSE file that
15  * accompanied this code).
16  *
17  * You should have received a copy of the GNU General Public License version
18  * 2 along with this work; if not, write to the Free Software Foundation,
19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20  *
21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22  * or visit www.oracle.com if you need additional information or have any
23  * questions.
24  */
25 
26 package sun.security.x509;
27 
28 import java.io.*;
29 
30 import sun.security.util.*;
31 
32 /**
33  * Lists all the object identifiers of the X509 extensions of the PKIX profile.
34  *
35  * <p>Extensions are addiitonal attributes which can be inserted in a X509
36  * v3 certificate. For example a "Driving License Certificate" could have
37  * the driving license number as a extension.
38  *
39  * <p>Extensions are represented as a sequence of the extension identifier
40  * (Object Identifier), a boolean flag stating whether the extension is to
41  * be treated as being critical and the extension value itself (this is again
42  * a DER encoding of the extension value).
43  *
44  * @see Extension
45  *
46  *
47  * @author Amit Kapoor
48  * @author Hemma Prafullchandra
49  */
50 public class PKIXExtensions {
51     // The object identifiers
52     private static final int[] AuthorityKey_data = { 2, 5, 29, 35 };
53     private static final int[] SubjectKey_data = { 2, 5, 29, 14 };
54     private static final int[] KeyUsage_data = { 2, 5, 29, 15 };
55     private static final int[] PrivateKeyUsage_data = { 2, 5, 29, 16 };
56     private static final int[] CertificatePolicies_data = { 2, 5, 29, 32 };
57     private static final int[] PolicyMappings_data = { 2, 5, 29, 33 };
58     private static final int[] SubjectAlternativeName_data = { 2, 5, 29, 17 };
59     private static final int[] IssuerAlternativeName_data = { 2, 5, 29, 18 };
60     private static final int[] SubjectDirectoryAttributes_data = { 2, 5, 29, 9 };
61     private static final int[] BasicConstraints_data = { 2, 5, 29, 19 };
62     private static final int[] NameConstraints_data = { 2, 5, 29, 30 };
63     private static final int[] PolicyConstraints_data = { 2, 5, 29, 36 };
64     private static final int[] CRLDistributionPoints_data = { 2, 5, 29, 31 };
65     private static final int[] CRLNumber_data = { 2, 5, 29, 20 };
66     private static final int[] IssuingDistributionPoint_data = { 2, 5, 29, 28 };
67     private static final int[] DeltaCRLIndicator_data = { 2, 5, 29, 27 };
68     private static final int[] ReasonCode_data = { 2, 5, 29, 21 };
69     private static final int[] HoldInstructionCode_data = { 2, 5, 29, 23 };
70     private static final int[] InvalidityDate_data = { 2, 5, 29, 24 };
71     private static final int[] ExtendedKeyUsage_data = { 2, 5, 29, 37 };
72     private static final int[] InhibitAnyPolicy_data = { 2, 5, 29, 54 };
73     private static final int[] CertificateIssuer_data = { 2, 5, 29, 29 };
74     private static final int[] AuthInfoAccess_data = { 1, 3, 6, 1, 5, 5, 7, 1, 1};
75     private static final int[] SubjectInfoAccess_data = { 1, 3, 6, 1, 5, 5, 7, 1, 11};
76     private static final int[] FreshestCRL_data = { 2, 5, 29, 46 };
77     private static final int[] OCSPNoCheck_data = { 1, 3, 6, 1, 5, 5, 7,
78                                                     48, 1, 5};
79 
80     // Additional extensions under the PKIX arc that are not necessarily
81     // used in X.509 Certificates or CRLs.
82     private static final int OCSPNonce_data [] = { 1, 3, 6, 1, 5, 5, 7,
83                                                   48, 1, 2};
84 
85     /**
86      * Identifies the particular public key used to sign the certificate.
87      */
88     public static final ObjectIdentifier AuthorityKey_Id;
89 
90     /**
91      * Identifies the particular public key used in an application.
92      */
93     public static final ObjectIdentifier SubjectKey_Id;
94 
95     /**
96      * Defines the purpose of the key contained in the certificate.
97      */
98     public static final ObjectIdentifier KeyUsage_Id;
99 
100     /**
101      * Allows the certificate issuer to specify a different validity period
102      * for the private key than the certificate.
103      */
104     public static final ObjectIdentifier PrivateKeyUsage_Id;
105 
106     /**
107      * Contains the sequence of policy information terms.
108      */
109     public static final ObjectIdentifier CertificatePolicies_Id;
110 
111     /**
112      * Lists pairs of object identifiers of policies considered equivalent by
113      * the issuing CA to the subject CA.
114      */
115     public static final ObjectIdentifier PolicyMappings_Id;
116 
117     /**
118      * Allows additional identities to be bound to the subject of the
119      * certificate.
120      */
121     public static final ObjectIdentifier SubjectAlternativeName_Id;
122 
123     /**
124      * Allows additional identities to be associated with the certificate
125      * issuer.
126      */
127     public static final ObjectIdentifier IssuerAlternativeName_Id;
128 
129     /**
130      * Identifies additional directory attributes.
131      * This extension is always non-critical.
132      */
133     public static final ObjectIdentifier SubjectDirectoryAttributes_Id;
134 
135     /**
136      * Identifies whether the subject of the certificate is a CA and how deep
137      * a certification path may exist through that CA.
138      */
139     public static final ObjectIdentifier BasicConstraints_Id;
140 
141     /**
142      * Provides for permitted and excluded subtrees that place restrictions
143      * on names that may be included within a certificate issued by a given CA.
144      */
145     public static final ObjectIdentifier NameConstraints_Id;
146 
147     /**
148      * Used to either prohibit policy mapping or limit the set of policies
149      * that can be in subsequent certificates.
150      */
151     public static final ObjectIdentifier PolicyConstraints_Id;
152 
153     /**
154      * Identifies how CRL information is obtained.
155      */
156     public static final ObjectIdentifier CRLDistributionPoints_Id;
157 
158     /**
159      * Conveys a monotonically increasing sequence number for each CRL
160      * issued by a given CA.
161      */
162     public static final ObjectIdentifier CRLNumber_Id;
163 
164     /**
165      * Identifies the CRL distribution point for a particular CRL.
166      */
167     public static final ObjectIdentifier IssuingDistributionPoint_Id;
168 
169     /**
170      * Identifies the delta CRL.
171      */
172     public static final ObjectIdentifier DeltaCRLIndicator_Id;
173 
174     /**
175      * Identifies the reason for the certificate revocation.
176      */
177     public static final ObjectIdentifier ReasonCode_Id;
178 
179     /**
180      * This extension provides a registered instruction identifier indicating
181      * the action to be taken, after encountering a certificate that has been
182      * placed on hold.
183      */
184     public static final ObjectIdentifier HoldInstructionCode_Id;
185 
186     /**
187      * Identifies the date on which it is known or suspected that the private
188      * key was compromised or that the certificate otherwise became invalid.
189      */
190     public static final ObjectIdentifier InvalidityDate_Id;
191     /**
192      * Identifies one or more purposes for which the certified public key
193      * may be used, in addition to or in place of the basic purposes
194      * indicated in the key usage extension field.
195      */
196     public static final ObjectIdentifier ExtendedKeyUsage_Id;
197 
198     /**
199      * Specifies whether any-policy policy OID is permitted
200      */
201     public static final ObjectIdentifier InhibitAnyPolicy_Id;
202 
203     /**
204      * Identifies the certificate issuer associated with an entry in an
205      * indirect CRL.
206      */
207     public static final ObjectIdentifier CertificateIssuer_Id;
208 
209     /**
210      * This extension indicates how to access CA information and services for
211      * the issuer of the certificate in which the extension appears.
212      * This information may be used for on-line certification validation
213      * services.
214      */
215     public static final ObjectIdentifier AuthInfoAccess_Id;
216 
217     /**
218      * This extension indicates how to access CA information and services for
219      * the subject of the certificate in which the extension appears.
220      */
221     public static final ObjectIdentifier SubjectInfoAccess_Id;
222 
223     /**
224      * Identifies how delta CRL information is obtained.
225      */
226     public static final ObjectIdentifier FreshestCRL_Id;
227 
228     /**
229      * Identifies the OCSP client can trust the responder for the
230      * lifetime of the responder's certificate.
231      */
232     public static final ObjectIdentifier OCSPNoCheck_Id;
233 
234     /**
235      * This extension is used to provide nonce data for OCSP requests
236      * or responses.
237      */
238     public static final ObjectIdentifier OCSPNonce_Id;
239 
240     static {
241         AuthorityKey_Id = ObjectIdentifier.newInternal(AuthorityKey_data);
242         SubjectKey_Id   = ObjectIdentifier.newInternal(SubjectKey_data);
243         KeyUsage_Id     = ObjectIdentifier.newInternal(KeyUsage_data);
244         PrivateKeyUsage_Id = ObjectIdentifier.newInternal(PrivateKeyUsage_data);
245         CertificatePolicies_Id =
246             ObjectIdentifier.newInternal(CertificatePolicies_data);
247         PolicyMappings_Id = ObjectIdentifier.newInternal(PolicyMappings_data);
248         SubjectAlternativeName_Id =
249             ObjectIdentifier.newInternal(SubjectAlternativeName_data);
250         IssuerAlternativeName_Id =
251             ObjectIdentifier.newInternal(IssuerAlternativeName_data);
252         ExtendedKeyUsage_Id = ObjectIdentifier.newInternal(ExtendedKeyUsage_data);
253         InhibitAnyPolicy_Id = ObjectIdentifier.newInternal(InhibitAnyPolicy_data);
254         SubjectDirectoryAttributes_Id =
255             ObjectIdentifier.newInternal(SubjectDirectoryAttributes_data);
256         BasicConstraints_Id =
257             ObjectIdentifier.newInternal(BasicConstraints_data);
258         ReasonCode_Id = ObjectIdentifier.newInternal(ReasonCode_data);
259         HoldInstructionCode_Id  =
260             ObjectIdentifier.newInternal(HoldInstructionCode_data);
261         InvalidityDate_Id = ObjectIdentifier.newInternal(InvalidityDate_data);
262 
263         NameConstraints_Id = ObjectIdentifier.newInternal(NameConstraints_data);
264         PolicyConstraints_Id =
265             ObjectIdentifier.newInternal(PolicyConstraints_data);
266         CRLDistributionPoints_Id =
267             ObjectIdentifier.newInternal(CRLDistributionPoints_data);
268         CRLNumber_Id =
269             ObjectIdentifier.newInternal(CRLNumber_data);
270         IssuingDistributionPoint_Id =
271             ObjectIdentifier.newInternal(IssuingDistributionPoint_data);
272         DeltaCRLIndicator_Id =
273             ObjectIdentifier.newInternal(DeltaCRLIndicator_data);
274         CertificateIssuer_Id =
275             ObjectIdentifier.newInternal(CertificateIssuer_data);
276         AuthInfoAccess_Id =
277             ObjectIdentifier.newInternal(AuthInfoAccess_data);
278         SubjectInfoAccess_Id =
279             ObjectIdentifier.newInternal(SubjectInfoAccess_data);
280         FreshestCRL_Id = ObjectIdentifier.newInternal(FreshestCRL_data);
281         OCSPNoCheck_Id = ObjectIdentifier.newInternal(OCSPNoCheck_data);
282         OCSPNonce_Id = ObjectIdentifier.newInternal(OCSPNonce_data);
283     }
284 }
285