1 /*
   2  * Copyright (c) 2009, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.  Oracle designates this
   8  * particular file as subject to the "Classpath" exception as provided
   9  * by Oracle in the LICENSE file that accompanied this code.
  10  *
  11  * This code is distributed in the hope that it will be useful, but WITHOUT
  12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  14  * version 2 for more details (a copy is included in the LICENSE file that
  15  * accompanied this code).
  16  *
  17  * You should have received a copy of the GNU General Public License version
  18  * 2 along with this work; if not, write to the Free Software Foundation,
  19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  20  *
  21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  22  * or visit www.oracle.com if you need additional information or have any
  23  * questions.
  24  */
  25 
  26 package sun.security.x509;
  27 
  28 import java.io.IOException;
  29 import java.io.OutputStream;
  30 import java.util.Enumeration;
  31 
  32 import sun.security.util.*;
  33 
  34 /**
  35  * Represent the OCSP NoCheck Extension from RFC2560.
  36  * <p>
  37  * A CA may specify that an OCSP client can trust a responder for the
  38  * lifetime of the responder's certificate. The CA does so by including
  39  * the extension id-pkix-ocsp-nocheck. This SHOULD be a non-critical
  40  * extension. The value of the extension should be NULL. CAs issuing
  41  * such a certificate should realized that a compromise of the
  42  * responder's key, is as serious as the compromise of a CA key used to
  43  * sign CRLs, at least for the validity period of this certificate. CA's
  44  * may choose to issue this type of certificate with a very short
  45  * lifetime and renew it frequently.
  46  * <pre>
  47  * id-pkix-ocsp-nocheck OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 }
  48  * </pre>
  49  *
  50  * @author Xuelei Fan
  51  * @see Extension
  52  * @see CertAttrSet
  53  */
  54 public class OCSPNoCheckExtension extends Extension
  55     implements CertAttrSet<String> {
  56 
  57     /**
  58      * Identifier for this attribute, to be used with the
  59      * get, set, delete methods of Certificate, x509 type.
  60      */
  61     public static final String IDENT =
  62                          "x509.info.extensions.OCSPNoCheck";
  63     /**
  64      * Attribute names.
  65      */
  66     public static final String NAME = "OCSPNoCheck";
  67 
  68     /**
  69      * Create a OCSPNoCheckExtension
  70      */
  71     public OCSPNoCheckExtension() throws IOException {
  72         this.extensionId = PKIXExtensions.OCSPNoCheck_Id;
  73         this.critical = false;
  74         this.extensionValue = new byte[0];
  75     }
  76 
  77     /**
  78      * Create the extension from the passed DER encoded value.
  79      *
  80      * @param critical true if the extension is to be treated as critical.
  81      * @param value an array of DER encoded bytes of the actual value.
  82      * @exception IOException on error.
  83      */
  84     public OCSPNoCheckExtension(Boolean critical, Object value)
  85         throws IOException {
  86 
  87         this.extensionId = PKIXExtensions.OCSPNoCheck_Id;
  88         this.critical = critical.booleanValue();
  89 
  90         // the value should be null, just ignore it here.
  91         this.extensionValue = new byte[0];
  92     }
  93 
  94     /**
  95      * Set the attribute value.
  96      */
  97     public void set(String name, Object obj) throws IOException {
  98         throw new IOException("No attribute is allowed by " +
  99                         "CertAttrSet:OCSPNoCheckExtension.");
 100     }
 101 
 102     /**
 103      * Get the attribute value.
 104      */
 105     public Object get(String name) throws IOException {
 106         throw new IOException("No attribute is allowed by " +
 107                         "CertAttrSet:OCSPNoCheckExtension.");
 108     }
 109 
 110     /**
 111      * Delete the attribute value.
 112      */
 113     public void delete(String name) throws IOException {
 114         throw new IOException("No attribute is allowed by " +
 115                         "CertAttrSet:OCSPNoCheckExtension.");
 116     }
 117 
 118     /**
 119      * Return an enumeration of names of attributes existing within this
 120      * attribute.
 121      */
 122     public Enumeration<String> getElements() {
 123         return (new AttributeNameEnumeration()).elements();
 124     }
 125 
 126     /**
 127      * Return the name of this attribute.
 128      */
 129     public String getName() {
 130         return NAME;
 131     }
 132 }