1 /* 2 * Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 package sun.security.x509; 27 28 import java.io.*; 29 30 import sun.security.util.*; 31 32 /** 33 * Lists all the object identifiers of the X509 extensions of the PKIX profile. 34 * 35 * <p>Extensions are addiitonal attributes which can be inserted in a X509 36 * v3 certificate. For example a "Driving License Certificate" could have 37 * the driving license number as a extension. 38 * 39 * <p>Extensions are represented as a sequence of the extension identifier 40 * (Object Identifier), a boolean flag stating whether the extension is to 41 * be treated as being critical and the extension value itself (this is again 42 * a DER encoding of the extension value). 43 * 44 * @see Extension 45 * 46 * 47 * @author Amit Kapoor 48 * @author Hemma Prafullchandra 49 */ 50 public class PKIXExtensions { 51 // The object identifiers 52 private static final int[] AuthorityKey_data = { 2, 5, 29, 35 }; 53 private static final int[] SubjectKey_data = { 2, 5, 29, 14 }; 54 private static final int[] KeyUsage_data = { 2, 5, 29, 15 }; 55 private static final int[] PrivateKeyUsage_data = { 2, 5, 29, 16 }; 56 private static final int[] CertificatePolicies_data = { 2, 5, 29, 32 }; 57 private static final int[] PolicyMappings_data = { 2, 5, 29, 33 }; 58 private static final int[] SubjectAlternativeName_data = { 2, 5, 29, 17 }; 59 private static final int[] IssuerAlternativeName_data = { 2, 5, 29, 18 }; 60 private static final int[] SubjectDirectoryAttributes_data = { 2, 5, 29, 9 }; 61 private static final int[] BasicConstraints_data = { 2, 5, 29, 19 }; 62 private static final int[] NameConstraints_data = { 2, 5, 29, 30 }; 63 private static final int[] PolicyConstraints_data = { 2, 5, 29, 36 }; 64 private static final int[] CRLDistributionPoints_data = { 2, 5, 29, 31 }; 65 private static final int[] CRLNumber_data = { 2, 5, 29, 20 }; 66 private static final int[] IssuingDistributionPoint_data = { 2, 5, 29, 28 }; 67 private static final int[] DeltaCRLIndicator_data = { 2, 5, 29, 27 }; 68 private static final int[] ReasonCode_data = { 2, 5, 29, 21 }; 69 private static final int[] HoldInstructionCode_data = { 2, 5, 29, 23 }; 70 private static final int[] InvalidityDate_data = { 2, 5, 29, 24 }; 71 private static final int[] ExtendedKeyUsage_data = { 2, 5, 29, 37 }; 72 private static final int[] InhibitAnyPolicy_data = { 2, 5, 29, 54 }; 73 private static final int[] CertificateIssuer_data = { 2, 5, 29, 29 }; 74 private static final int[] AuthInfoAccess_data = { 1, 3, 6, 1, 5, 5, 7, 1, 1}; 75 private static final int[] SubjectInfoAccess_data = { 1, 3, 6, 1, 5, 5, 7, 1, 11}; 76 private static final int[] FreshestCRL_data = { 2, 5, 29, 46 }; 77 private static final int[] OCSPNoCheck_data = { 1, 3, 6, 1, 5, 5, 7, 78 48, 1, 5}; 79 80 // Additional extensions under the PKIX arc that are not necessarily 81 // used in X.509 Certificates or CRLs. 82 private static final int[] OCSPNonce_data = { 1, 3, 6, 1, 5, 5, 7, 83 48, 1, 2}; 84 85 /** 86 * Identifies the particular public key used to sign the certificate. 87 */ 88 public static final ObjectIdentifier AuthorityKey_Id; 89 90 /** 91 * Identifies the particular public key used in an application. 92 */ 93 public static final ObjectIdentifier SubjectKey_Id; 94 95 /** 96 * Defines the purpose of the key contained in the certificate. 97 */ 98 public static final ObjectIdentifier KeyUsage_Id; 99 100 /** 101 * Allows the certificate issuer to specify a different validity period 102 * for the private key than the certificate. 103 */ 104 public static final ObjectIdentifier PrivateKeyUsage_Id; 105 106 /** 107 * Contains the sequence of policy information terms. 108 */ 109 public static final ObjectIdentifier CertificatePolicies_Id; 110 111 /** 112 * Lists pairs of object identifiers of policies considered equivalent by 113 * the issuing CA to the subject CA. 114 */ 115 public static final ObjectIdentifier PolicyMappings_Id; 116 117 /** 118 * Allows additional identities to be bound to the subject of the 119 * certificate. 120 */ 121 public static final ObjectIdentifier SubjectAlternativeName_Id; 122 123 /** 124 * Allows additional identities to be associated with the certificate 125 * issuer. 126 */ 127 public static final ObjectIdentifier IssuerAlternativeName_Id; 128 129 /** 130 * Identifies additional directory attributes. 131 * This extension is always non-critical. 132 */ 133 public static final ObjectIdentifier SubjectDirectoryAttributes_Id; 134 135 /** 136 * Identifies whether the subject of the certificate is a CA and how deep 137 * a certification path may exist through that CA. 138 */ 139 public static final ObjectIdentifier BasicConstraints_Id; 140 141 /** 142 * Provides for permitted and excluded subtrees that place restrictions 143 * on names that may be included within a certificate issued by a given CA. 144 */ 145 public static final ObjectIdentifier NameConstraints_Id; 146 147 /** 148 * Used to either prohibit policy mapping or limit the set of policies 149 * that can be in subsequent certificates. 150 */ 151 public static final ObjectIdentifier PolicyConstraints_Id; 152 153 /** 154 * Identifies how CRL information is obtained. 155 */ 156 public static final ObjectIdentifier CRLDistributionPoints_Id; 157 158 /** 159 * Conveys a monotonically increasing sequence number for each CRL 160 * issued by a given CA. 161 */ 162 public static final ObjectIdentifier CRLNumber_Id; 163 164 /** 165 * Identifies the CRL distribution point for a particular CRL. 166 */ 167 public static final ObjectIdentifier IssuingDistributionPoint_Id; 168 169 /** 170 * Identifies the delta CRL. 171 */ 172 public static final ObjectIdentifier DeltaCRLIndicator_Id; 173 174 /** 175 * Identifies the reason for the certificate revocation. 176 */ 177 public static final ObjectIdentifier ReasonCode_Id; 178 179 /** 180 * This extension provides a registered instruction identifier indicating 181 * the action to be taken, after encountering a certificate that has been 182 * placed on hold. 183 */ 184 public static final ObjectIdentifier HoldInstructionCode_Id; 185 186 /** 187 * Identifies the date on which it is known or suspected that the private 188 * key was compromised or that the certificate otherwise became invalid. 189 */ 190 public static final ObjectIdentifier InvalidityDate_Id; 191 /** 192 * Identifies one or more purposes for which the certified public key 193 * may be used, in addition to or in place of the basic purposes 194 * indicated in the key usage extension field. 195 */ 196 public static final ObjectIdentifier ExtendedKeyUsage_Id; 197 198 /** 199 * Specifies whether any-policy policy OID is permitted 200 */ 201 public static final ObjectIdentifier InhibitAnyPolicy_Id; 202 203 /** 204 * Identifies the certificate issuer associated with an entry in an 205 * indirect CRL. 206 */ 207 public static final ObjectIdentifier CertificateIssuer_Id; 208 209 /** 210 * This extension indicates how to access CA information and services for 211 * the issuer of the certificate in which the extension appears. 212 * This information may be used for on-line certification validation 213 * services. 214 */ 215 public static final ObjectIdentifier AuthInfoAccess_Id; 216 217 /** 218 * This extension indicates how to access CA information and services for 219 * the subject of the certificate in which the extension appears. 220 */ 221 public static final ObjectIdentifier SubjectInfoAccess_Id; 222 223 /** 224 * Identifies how delta CRL information is obtained. 225 */ 226 public static final ObjectIdentifier FreshestCRL_Id; 227 228 /** 229 * Identifies the OCSP client can trust the responder for the 230 * lifetime of the responder's certificate. 231 */ 232 public static final ObjectIdentifier OCSPNoCheck_Id; 233 234 /** 235 * This extension is used to provide nonce data for OCSP requests 236 * or responses. 237 */ 238 public static final ObjectIdentifier OCSPNonce_Id; 239 240 static { 241 AuthorityKey_Id = ObjectIdentifier.newInternal(AuthorityKey_data); 242 SubjectKey_Id = ObjectIdentifier.newInternal(SubjectKey_data); 243 KeyUsage_Id = ObjectIdentifier.newInternal(KeyUsage_data); 244 PrivateKeyUsage_Id = ObjectIdentifier.newInternal(PrivateKeyUsage_data); 245 CertificatePolicies_Id = 246 ObjectIdentifier.newInternal(CertificatePolicies_data); 247 PolicyMappings_Id = ObjectIdentifier.newInternal(PolicyMappings_data); 248 SubjectAlternativeName_Id = 249 ObjectIdentifier.newInternal(SubjectAlternativeName_data); 250 IssuerAlternativeName_Id = 251 ObjectIdentifier.newInternal(IssuerAlternativeName_data); 252 ExtendedKeyUsage_Id = ObjectIdentifier.newInternal(ExtendedKeyUsage_data); 253 InhibitAnyPolicy_Id = ObjectIdentifier.newInternal(InhibitAnyPolicy_data); 254 SubjectDirectoryAttributes_Id = 255 ObjectIdentifier.newInternal(SubjectDirectoryAttributes_data); 256 BasicConstraints_Id = 257 ObjectIdentifier.newInternal(BasicConstraints_data); 258 ReasonCode_Id = ObjectIdentifier.newInternal(ReasonCode_data); 259 HoldInstructionCode_Id = 260 ObjectIdentifier.newInternal(HoldInstructionCode_data); 261 InvalidityDate_Id = ObjectIdentifier.newInternal(InvalidityDate_data); 262 263 NameConstraints_Id = ObjectIdentifier.newInternal(NameConstraints_data); 264 PolicyConstraints_Id = 265 ObjectIdentifier.newInternal(PolicyConstraints_data); 266 CRLDistributionPoints_Id = 267 ObjectIdentifier.newInternal(CRLDistributionPoints_data); 268 CRLNumber_Id = 269 ObjectIdentifier.newInternal(CRLNumber_data); 270 IssuingDistributionPoint_Id = 271 ObjectIdentifier.newInternal(IssuingDistributionPoint_data); 272 DeltaCRLIndicator_Id = 273 ObjectIdentifier.newInternal(DeltaCRLIndicator_data); 274 CertificateIssuer_Id = 275 ObjectIdentifier.newInternal(CertificateIssuer_data); 276 AuthInfoAccess_Id = 277 ObjectIdentifier.newInternal(AuthInfoAccess_data); 278 SubjectInfoAccess_Id = 279 ObjectIdentifier.newInternal(SubjectInfoAccess_data); 280 FreshestCRL_Id = ObjectIdentifier.newInternal(FreshestCRL_data); 281 OCSPNoCheck_Id = ObjectIdentifier.newInternal(OCSPNoCheck_data); 282 OCSPNonce_Id = ObjectIdentifier.newInternal(OCSPNonce_data); 283 } 284 }