2003-04-30 Michael Koch <konqueror@gmx.de> * gnu/java/security/Engine.java, gnu/java/security/OID.java, gnu/java/security/der/BitString.java, gnu/java/security/der/DER.java, gnu/java/security/der/DERReader.java, gnu/java/security/der/DERValue.java, gnu/java/security/der/DERWriter.java, gnu/java/security/provider/DSAKeyFactory.java, gnu/java/security/provider/X509CertificateFactory.java, gnu/java/security/x509/X500DistinguishedName.java, gnu/java/security/x509/X509CRL.java, gnu/java/security/x509/X509CRLEntry.java, gnu/java/security/x509/X509Certificate.java, java/security/cert/CRLSelector.java, java/security/cert/CertPathBuilder.java, java/security/cert/CertPathBuilderResult.java, java/security/cert/CertPathBuilderSpi.java, java/security/cert/CertPathParameters.java, java/security/cert/CertPathValidator.java, java/security/cert/CertPathValidatorResult.java, java/security/cert/CertPathValidatorSpi.java, java/security/cert/CertSelector.java, java/security/cert/CertStore.java, java/security/cert/CertStoreParameters.java, java/security/cert/CertStoreSpi.java, java/security/cert/CollectionCertStoreParameters.java, java/security/cert/LDAPCertStoreParameters.java, java/security/cert/PKIXBuilderParameters.java, java/security/cert/PKIXCertPathBuilderResult.java, java/security/cert/PKIXCertPathChecker.java, java/security/cert/PKIXCertPathValidatorResult.java, java/security/cert/PKIXParameters.java, java/security/cert/PolicyNode.java, java/security/cert/PolicyQualifierInfo.java, java/security/cert/TrustAnchor.java, javax/security/auth/x500/X500Principal.java: New files from classpath. * gnu/java/io/ASN1ParsingException.java, gnu/java/io/Base64InputStream.java, gnu/java/security/der/DEREncodingException.java, gnu/java/security/provider/DSAParameters.java, gnu/java/security/provider/DSASignature.java, gnu/java/security/provider/Gnu.java, gnu/java/security/provider/GnuDSAPrivateKey.java, gnu/java/security/provider/GnuDSAPublicKey.java, java/security/AlgorithmParameterGenerator.java, java/security/AlgorithmParameters.java, java/security/KeyFactory.java, java/security/KeyPairGenerator.java, java/security/KeyStore.java, java/security/MessageDigest.java, java/security/SecureClassLoader.java, java/security/SecureRandom.java, java/security/Security.java, java/security/Signature.java, java/security/cert/Certificate.java, java/security/cert/CertificateFactory.java, java/security/cert/CertificateFactorySpi.java, java/security/cert/X509CRL.java, java/security/cert/X509Certificate.java, java/security/spec/DSAPublicKeySpec.java: New versions from classpath. * gnu/java/security/provider/DERReader.java, gnu/java/security/provider/DERWriter.java, java/security/Engine.java: Removed. * Makefile.am (java_source_files, javax_source_files): Added new files. * Makefile.in: Regenerated. From-SVN: r66283
694 lines
21 KiB
Java
694 lines
21 KiB
Java
/* X509Certificate.java -- X.509 certificate.
|
||
Copyright (C) 2003 Free Software Foundation, Inc.
|
||
|
||
This file is part of GNU Classpath.
|
||
|
||
GNU Classpath is free software; you can redistribute it and/or modify
|
||
it under the terms of the GNU General Public License as published by
|
||
the Free Software Foundation; either version 2, or (at your option)
|
||
any later version.
|
||
|
||
GNU Classpath is distributed in the hope that it will be useful, but
|
||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||
General Public License for more details.
|
||
|
||
You should have received a copy of the GNU General Public License
|
||
along with GNU Classpath; see the file COPYING. If not, write to the
|
||
Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
||
02111-1307 USA.
|
||
|
||
Linking this library statically or dynamically with other modules is
|
||
making a combined work based on this library. Thus, the terms and
|
||
conditions of the GNU General Public License cover the whole
|
||
combination.
|
||
|
||
As a special exception, the copyright holders of this library give you
|
||
permission to link this library with independent modules to produce an
|
||
executable, regardless of the license terms of these independent
|
||
modules, and to copy and distribute the resulting executable under
|
||
terms of your choice, provided that you also meet, for each linked
|
||
independent module, the terms and conditions of the license of that
|
||
module. An independent module is a module which is not derived from
|
||
or based on this library. If you modify this library, you may extend
|
||
this exception to your version of the library, but you are not
|
||
obligated to do so. If you do not wish to do so, delete this
|
||
exception statement from your version. */
|
||
|
||
|
||
package gnu.java.security.x509;
|
||
|
||
import java.io.ByteArrayInputStream;
|
||
import java.io.InputStream;
|
||
import java.io.IOException;
|
||
import java.io.Serializable;
|
||
|
||
import java.math.BigInteger;
|
||
|
||
import java.security.AlgorithmParameters;
|
||
import java.security.InvalidKeyException;
|
||
import java.security.KeyFactory;
|
||
import java.security.NoSuchAlgorithmException;
|
||
import java.security.NoSuchProviderException;
|
||
import java.security.Principal;
|
||
import java.security.PublicKey;
|
||
import java.security.Signature;
|
||
import java.security.SignatureException;
|
||
|
||
import java.security.cert.CertificateEncodingException;
|
||
import java.security.cert.CertificateException;
|
||
import java.security.cert.CertificateExpiredException;
|
||
import java.security.cert.CertificateNotYetValidException;
|
||
import java.security.cert.CertificateParsingException;
|
||
|
||
import java.security.spec.DSAParameterSpec;
|
||
import java.security.spec.DSAPublicKeySpec;
|
||
import java.security.spec.RSAPublicKeySpec;
|
||
|
||
import java.util.ArrayList;
|
||
import java.util.Collection;
|
||
import java.util.Collections;
|
||
import java.util.Date;
|
||
import java.util.HashMap;
|
||
import java.util.HashSet;
|
||
import java.util.Iterator;
|
||
import java.util.LinkedList;
|
||
import java.util.List;
|
||
import java.util.Set;
|
||
|
||
import javax.security.auth.x500.X500Principal;
|
||
|
||
import gnu.java.io.ASN1ParsingException;
|
||
import gnu.java.security.OID;
|
||
import gnu.java.security.der.BitString;
|
||
import gnu.java.security.der.DER;
|
||
import gnu.java.security.der.DERReader;
|
||
import gnu.java.security.der.DERValue;
|
||
import gnu.java.security.der.DERWriter;
|
||
|
||
/**
|
||
* An implementation of X.509 certificates.
|
||
*
|
||
* @author Casey Marshall (rsdio@metastatic.org)
|
||
*/
|
||
public class X509Certificate extends java.security.cert.X509Certificate
|
||
implements Serializable
|
||
{
|
||
|
||
// Constants and fields.
|
||
// ------------------------------------------------------------------------
|
||
|
||
private static final OID ID_DSA = new OID("1.2.840.10040.4.1");
|
||
private static final OID ID_DSA_WITH_SHA1 = new OID("1.2.840.10040.4.3");
|
||
private static final OID ID_RSA = new OID("1.2.840.113549.1.1.1");
|
||
private static final OID ID_RSA_WITH_MD2 = new OID("1.2.840.113549.1.1.2");
|
||
private static final OID ID_RSA_WITH_MD5 = new OID("1.2.840.113549.1.1.4");
|
||
private static final OID ID_RSA_WITH_SHA1 = new OID("1.2.840.113549.1.1.5");
|
||
|
||
private static final OID ID_EXTENSION = new OID("2.5.29");
|
||
private static final OID ID_KEY_USAGE = ID_EXTENSION.getChild(15);
|
||
private static final OID ID_BASIC_CONSTRAINTS = ID_EXTENSION.getChild(19);
|
||
private static final OID ID_EXT_KEY_USAGE = ID_EXTENSION.getChild(37);
|
||
|
||
private static final int OTHER_NAME = 0;
|
||
private static final int RFC882_NAME = 1;
|
||
private static final int DNS_NAME = 2;
|
||
private static final int X400_ADDRESS = 3;
|
||
private static final int DIRECTORY_NAME = 4;
|
||
private static final int EDI_PARTY_NAME = 5;
|
||
private static final int URI = 6;
|
||
private static final int IP_ADDRESS = 7;
|
||
private static final int REGISTERED_ID = 8;
|
||
|
||
// This object SHOULD be serialized with an instance of
|
||
// java.security.cert.Certificate.CertificateRep, thus all fields are
|
||
// transient.
|
||
|
||
// The encoded certificate.
|
||
private transient byte[] encoded;
|
||
|
||
// TBSCertificate part.
|
||
private transient byte[] tbsCertBytes;
|
||
private transient int version;
|
||
private transient BigInteger serialNo;
|
||
private transient OID algId;
|
||
private transient byte[] algVal;
|
||
private transient X500Principal issuer;
|
||
private transient Date notBefore;
|
||
private transient Date notAfter;
|
||
private transient X500Principal subject;
|
||
private transient PublicKey subjectKey;
|
||
private transient BitString issuerUniqueId;
|
||
private transient BitString subjectUniqueId;
|
||
private transient HashMap extensions;
|
||
private transient HashSet critOids;
|
||
private transient HashSet nonCritOids;
|
||
|
||
private transient BitString keyUsage;
|
||
private transient int basicConstraints = -1;
|
||
|
||
// Signature.
|
||
private transient OID sigAlgId;
|
||
private transient byte[] sigAlgVal;
|
||
private transient byte[] signature;
|
||
|
||
// Constructors.
|
||
// ------------------------------------------------------------------------
|
||
|
||
/**
|
||
* Create a new X.509 certificate from the encoded data. The input
|
||
* data are expected to be the ASN.1 DER encoding of the certificate.
|
||
*
|
||
* @param encoded The encoded certificate data.
|
||
* @throws IOException If the certificate cannot be read, possibly
|
||
* from a formatting error.
|
||
* @throws CertificateException If the data read is not an X.509
|
||
* certificate.
|
||
*/
|
||
public X509Certificate(InputStream encoded)
|
||
throws CertificateException, IOException
|
||
{
|
||
super();
|
||
extensions = new HashMap();
|
||
critOids = new HashSet();
|
||
nonCritOids = new HashSet();
|
||
try
|
||
{
|
||
parse(encoded);
|
||
}
|
||
catch (IOException ioe)
|
||
{
|
||
throw ioe;
|
||
}
|
||
catch (Exception e)
|
||
{
|
||
throw new CertificateException(e.toString());
|
||
}
|
||
}
|
||
|
||
// X509Certificate methods.
|
||
// ------------------------------------------------------------------------
|
||
|
||
public void checkValidity()
|
||
throws CertificateExpiredException, CertificateNotYetValidException
|
||
{
|
||
checkValidity(new Date());
|
||
}
|
||
|
||
public void checkValidity(Date date)
|
||
throws CertificateExpiredException, CertificateNotYetValidException
|
||
{
|
||
if (date.compareTo(notBefore) < 0)
|
||
throw new CertificateNotYetValidException();
|
||
if (date.compareTo(notAfter) > 0)
|
||
throw new CertificateExpiredException();
|
||
}
|
||
|
||
public int getVersion()
|
||
{
|
||
return version;
|
||
}
|
||
|
||
public BigInteger getSerialNumber()
|
||
{
|
||
return serialNo;
|
||
}
|
||
|
||
public Principal getIssuerDN()
|
||
{
|
||
return getIssuerX500Principal();
|
||
}
|
||
|
||
public X500Principal getIssuerX500Principal()
|
||
{
|
||
return issuer;
|
||
}
|
||
|
||
public Principal getSubjectDN()
|
||
{
|
||
return getSubjectX500Principal();
|
||
}
|
||
|
||
public X500Principal getSubjectX500Principal()
|
||
{
|
||
return subject;
|
||
}
|
||
|
||
public Date getNotBefore()
|
||
{
|
||
return (Date) notBefore.clone();
|
||
}
|
||
|
||
public Date getNotAfter()
|
||
{
|
||
return (Date) notAfter.clone();
|
||
}
|
||
|
||
public byte[] getTBSCertificate() throws CertificateEncodingException
|
||
{
|
||
return (byte[]) tbsCertBytes.clone();
|
||
}
|
||
|
||
public byte[] getSignature()
|
||
{
|
||
return (byte[]) signature.clone();
|
||
}
|
||
|
||
public String getSigAlgName()
|
||
{
|
||
if (sigAlgId.equals(ID_DSA_WITH_SHA1))
|
||
return "SHA1withDSA";
|
||
if (sigAlgId.equals(ID_RSA_WITH_MD2 ))
|
||
return "MD2withRSA";
|
||
if (sigAlgId.equals(ID_RSA_WITH_MD5 ))
|
||
return "MD5withRSA";
|
||
if (sigAlgId.equals(ID_RSA_WITH_SHA1 ))
|
||
return "SHA1withRSA";
|
||
return "unknown";
|
||
// return sigAlgId.getShortName();
|
||
}
|
||
|
||
public String getSigAlgOID()
|
||
{
|
||
return sigAlgId.toString();
|
||
}
|
||
|
||
public byte[] getSigAlgParams()
|
||
{
|
||
return (byte[]) sigAlgVal.clone();
|
||
}
|
||
|
||
public boolean[] getIssuerUniqueID()
|
||
{
|
||
if (issuerUniqueId != null)
|
||
return issuerUniqueId.toBooleanArray();
|
||
return null;
|
||
}
|
||
|
||
public boolean[] getSubjectUniqueID()
|
||
{
|
||
if (subjectUniqueId != null)
|
||
return subjectUniqueId.toBooleanArray();
|
||
return null;
|
||
}
|
||
|
||
public boolean[] getKeyUsage()
|
||
{
|
||
if (keyUsage != null)
|
||
return keyUsage.toBooleanArray();
|
||
return null;
|
||
}
|
||
|
||
public List getExtendedKeyUsage() throws CertificateParsingException
|
||
{
|
||
byte[] ext = (byte[]) extensions.get("2.5.29.37");
|
||
if (ext == null)
|
||
return null;
|
||
LinkedList usages = new LinkedList();
|
||
try
|
||
{
|
||
DERReader der = new DERReader(new ByteArrayInputStream(ext));
|
||
DERValue seq = der.read();
|
||
if (!seq.isConstructed())
|
||
throw new CertificateParsingException();
|
||
int len = 0;
|
||
while (len < seq.getLength())
|
||
{
|
||
DERValue oid = der.read();
|
||
if (!(oid.getValue() instanceof OID))
|
||
throw new CertificateParsingException();
|
||
usages.add(oid.getValue().toString());
|
||
len += DERWriter.definiteEncodingSize(oid.getLength())
|
||
+ oid.getLength() + 1;
|
||
}
|
||
}
|
||
catch (IOException ioe)
|
||
{
|
||
throw new CertificateParsingException();
|
||
}
|
||
return usages;
|
||
}
|
||
|
||
public int getBasicConstraints()
|
||
{
|
||
return basicConstraints;
|
||
}
|
||
|
||
public Collection getSubjectAlternativeNames()
|
||
throws CertificateParsingException
|
||
{
|
||
byte[] ext = getExtensionValue("2.5.29.17");
|
||
if (ext == null)
|
||
return null;
|
||
return getAltNames(ext);
|
||
}
|
||
|
||
public Collection getIssuerAlternativeNames()
|
||
throws CertificateParsingException
|
||
{
|
||
byte[] ext = getExtensionValue("2.5.29.18");
|
||
if (ext == null)
|
||
return null;
|
||
return getAltNames(ext);
|
||
}
|
||
|
||
// X509Extension methods.
|
||
// ------------------------------------------------------------------------
|
||
|
||
public boolean hasUnsupportedCriticalExtension()
|
||
{
|
||
for (Iterator it = critOids.iterator(); it.hasNext(); )
|
||
{
|
||
String oid = (String) it.next();
|
||
if (!oid.equals("2.5.29.15") && !oid.equals("2.5.29.17") &&
|
||
!oid.equals("2.5.29.18") && !oid.equals("2.5.29.19") &&
|
||
!oid.equals("2.5.29.37"))
|
||
return true;
|
||
}
|
||
return false;
|
||
}
|
||
|
||
public Set getCriticalExtensionOIDs()
|
||
{
|
||
return Collections.unmodifiableSet(critOids);
|
||
}
|
||
|
||
public Set getNonCriticalExtensionOIDs()
|
||
{
|
||
return Collections.unmodifiableSet(nonCritOids);
|
||
}
|
||
|
||
public byte[] getExtensionValue(String oid)
|
||
{
|
||
byte[] ext = (byte[]) extensions.get(oid);
|
||
if (ext != null)
|
||
return (byte[]) ext.clone();
|
||
return null;
|
||
}
|
||
|
||
// Certificate methods.
|
||
// ------------------------------------------------------------------------
|
||
|
||
public byte[] getEncoded() throws CertificateEncodingException
|
||
{
|
||
return (byte[]) encoded.clone();
|
||
}
|
||
|
||
public void verify(PublicKey key)
|
||
throws CertificateException, NoSuchAlgorithmException,
|
||
InvalidKeyException, NoSuchProviderException, SignatureException
|
||
{
|
||
Signature sig = Signature.getInstance(sigAlgId.toString());
|
||
doVerify(sig, key);
|
||
}
|
||
|
||
public void verify(PublicKey key, String provider)
|
||
throws CertificateException, NoSuchAlgorithmException,
|
||
InvalidKeyException, NoSuchProviderException, SignatureException
|
||
{
|
||
Signature sig = Signature.getInstance(sigAlgId.toString(), provider);
|
||
doVerify(sig, key);
|
||
}
|
||
|
||
public String toString()
|
||
{
|
||
// XXX say more than this.
|
||
return gnu.java.security.x509.X509Certificate.class.getName();
|
||
}
|
||
|
||
public PublicKey getPublicKey()
|
||
{
|
||
return subjectKey;
|
||
}
|
||
|
||
public Object writeReplace() throws java.io.ObjectStreamException
|
||
{
|
||
return super.writeReplace();
|
||
}
|
||
|
||
// Own methods.
|
||
// ------------------------------------------------------------------------
|
||
|
||
/**
|
||
* Verify this certificate's signature.
|
||
*/
|
||
private void doVerify(Signature sig, PublicKey key)
|
||
throws CertificateException, InvalidKeyException, SignatureException
|
||
{
|
||
sig.initVerify(key);
|
||
sig.update(tbsCertBytes);
|
||
if (!sig.verify(signature))
|
||
throw new CertificateException("signature not validated");
|
||
}
|
||
|
||
/**
|
||
* Read a GeneralNames structure.
|
||
*/
|
||
private List getAltNames(byte[] encoded)
|
||
throws CertificateParsingException
|
||
{
|
||
LinkedList names = new LinkedList();
|
||
try
|
||
{
|
||
ByteArrayInputStream in = new ByteArrayInputStream(encoded);
|
||
DERReader der = new DERReader(in);
|
||
DERValue seq = der.read();
|
||
if (!seq.isConstructed())
|
||
throw new CertificateParsingException();
|
||
int len = 0;
|
||
while (len < seq.getLength())
|
||
{
|
||
DERValue name = der.read();
|
||
ArrayList pair = new ArrayList(2);
|
||
Object nameVal = null;
|
||
switch (name.getTag())
|
||
{
|
||
case RFC882_NAME:
|
||
case DNS_NAME:
|
||
case URI:
|
||
nameVal = new String((byte[]) name.getValue());
|
||
break;
|
||
case IP_ADDRESS:
|
||
nameVal = java.net.InetAddress.getByAddress(
|
||
(byte[]) name.getValue()).getHostAddress();
|
||
break;
|
||
case REGISTERED_ID:
|
||
nameVal = new OID((byte[]) name.getValue());
|
||
break;
|
||
case OTHER_NAME:
|
||
case X400_ADDRESS:
|
||
case DIRECTORY_NAME:
|
||
case EDI_PARTY_NAME:
|
||
nameVal = name.getEncoded();
|
||
break;
|
||
default:
|
||
throw new CertificateParsingException();
|
||
}
|
||
pair.add(new Integer(name.getTag()));
|
||
pair.add(nameVal);
|
||
names.add(pair);
|
||
if (name.isConstructed())
|
||
in.skip(name.getLength());
|
||
len += name.getEncodedLength();
|
||
}
|
||
}
|
||
catch (IOException ioe)
|
||
{
|
||
throw new CertificateParsingException(ioe.toString());
|
||
}
|
||
return Collections.unmodifiableList(names);
|
||
}
|
||
|
||
/**
|
||
* Parse a DER stream into an X.509 certificate.
|
||
*
|
||
* @param encoded The encoded bytes.
|
||
*/
|
||
private void parse(InputStream encoded) throws Exception
|
||
{
|
||
DERReader der = new DERReader(encoded);
|
||
|
||
// Certificate ::= SEQUENCE {
|
||
DERValue cert = der.read();
|
||
this.encoded = cert.getEncoded();
|
||
if (!cert.isConstructed())
|
||
throw new ASN1ParsingException("malformed Certificate");
|
||
|
||
// TBSCertificate ::= SEQUENCE {
|
||
DERValue tbsCert = der.read();
|
||
if (tbsCert.getValue() != DER.CONSTRUCTED_VALUE)
|
||
throw new ASN1ParsingException("malformed TBSCertificate");
|
||
tbsCertBytes = tbsCert.getEncoded();
|
||
|
||
DERValue val = der.read();
|
||
if (val.getTagClass() == DER.CONTEXT && val.getTag() == 0)
|
||
{
|
||
// Version ::= INTEGER [0] { v1(0), v2(1), v3(2) }
|
||
version = ((BigInteger) der.read().getValue()).intValue() + 1;
|
||
val = der.read();
|
||
}
|
||
else
|
||
{
|
||
version = 1;
|
||
}
|
||
// SerialNumber ::= INTEGER
|
||
serialNo = (BigInteger) val.getValue();
|
||
|
||
// AlgorithmIdentifier ::= SEQUENCE {
|
||
val = der.read();
|
||
if (!val.isConstructed())
|
||
throw new ASN1ParsingException("malformed AlgorithmIdentifier");
|
||
int certAlgLen = val.getLength();
|
||
val = der.read();
|
||
algId = (OID) val.getValue();
|
||
if (certAlgLen > val.getEncodedLength())
|
||
{
|
||
val = der.read();
|
||
if (val == null)
|
||
algVal = null;
|
||
else
|
||
algVal = val.getEncoded();
|
||
if (val.isConstructed())
|
||
encoded.skip(val.getLength());
|
||
}
|
||
|
||
issuer = new X500Principal(encoded);
|
||
|
||
if (!der.read().isConstructed())
|
||
throw new ASN1ParsingException("malformed Validity");
|
||
notBefore = (Date) der.read().getValue();
|
||
notAfter = (Date) der.read().getValue();
|
||
|
||
subject = new X500Principal(encoded);
|
||
|
||
if (!der.read().isConstructed())
|
||
throw new ASN1ParsingException("malformed SubjectPublicKeyInfo");
|
||
|
||
val = der.read();
|
||
if (!val.isConstructed())
|
||
throw new ASN1ParsingException("malformed AlgorithmIdentifier");
|
||
int keyAlgLen = val.getLength();
|
||
val = der.read();
|
||
OID keyID = (OID) val.getValue();
|
||
byte[] keyParams = null;
|
||
if (keyAlgLen > val.getEncodedLength())
|
||
{
|
||
val = der.read();
|
||
keyParams = val.getEncoded();
|
||
if (algVal == null)
|
||
algVal = keyParams;
|
||
if (val.isConstructed())
|
||
encoded.skip(val.getLength());
|
||
}
|
||
val = der.read();
|
||
byte[] keyVal = ((BitString) val.getValue()).toByteArray();
|
||
|
||
if (keyID.equals(ID_DSA))
|
||
{
|
||
AlgorithmParameters params = AlgorithmParameters.getInstance("DSA");
|
||
params.init(keyParams, "ASN.1");
|
||
KeyFactory keyFac = KeyFactory.getInstance("DSA");
|
||
DSAParameterSpec spec = (DSAParameterSpec)
|
||
params.getParameterSpec(DSAParameterSpec.class);
|
||
subjectKey = keyFac.generatePublic(new DSAPublicKeySpec(
|
||
(BigInteger) new DERReader(keyVal).read().getValue(),
|
||
spec.getP(), spec.getQ(), spec.getG()));
|
||
}
|
||
else if (keyID.equals(ID_RSA))
|
||
{
|
||
KeyFactory keyFac = KeyFactory.getInstance("RSA");
|
||
DERReader rsaKey = new DERReader(keyVal);
|
||
if (!rsaKey.read().isConstructed())
|
||
throw new ASN1ParsingException("malformed RSAPublicKey");
|
||
subjectKey = keyFac.generatePublic(new RSAPublicKeySpec(
|
||
(BigInteger) rsaKey.read().getValue(),
|
||
(BigInteger) rsaKey.read().getValue()));
|
||
}
|
||
else
|
||
throw new ASN1ParsingException("unknown key algorithm " + keyID);
|
||
|
||
if (version > 1)
|
||
val = der.read();
|
||
if (version >= 2 && val.getTagClass() != DER.UNIVERSAL && val.getTag() == 1)
|
||
{
|
||
byte[] b = (byte[]) val.getValue();
|
||
issuerUniqueId = new BitString(b, 1, b.length-1, b[0] & 0xFF);
|
||
val = der.read();
|
||
}
|
||
if (version >= 2 && val.getTagClass() != DER.UNIVERSAL && val.getTag() == 2)
|
||
{
|
||
byte[] b = (byte[]) val.getValue();
|
||
subjectUniqueId = new BitString(b, 1, b.length-1, b[0] & 0xFF);
|
||
val = der.read();
|
||
}
|
||
if (version >= 3 && val.getTagClass() != DER.UNIVERSAL && val.getTag() == 3)
|
||
{
|
||
val = der.read();
|
||
int len = 0;
|
||
while (len < val.getLength())
|
||
{
|
||
DERValue ext = der.read();
|
||
OID extId = (OID) der.read().getValue();
|
||
DERValue val2 = der.read();
|
||
Boolean crit = Boolean.valueOf(false);
|
||
if (val2.getValue() instanceof Boolean)
|
||
{
|
||
crit = (Boolean) val2.getValue();
|
||
val2 = der.read();
|
||
}
|
||
byte[] extVal = (byte[]) val2.getValue();
|
||
extensions.put(extId.toString(), extVal);
|
||
if (crit.booleanValue())
|
||
critOids.add(extId.toString());
|
||
else
|
||
nonCritOids.add(extId.toString());
|
||
if (extId.equals(ID_KEY_USAGE))
|
||
{
|
||
keyUsage = (BitString) DERReader.read(extVal).getValue();
|
||
}
|
||
else if (extId.equals(ID_BASIC_CONSTRAINTS))
|
||
{
|
||
DERReader bc = new DERReader(extVal);
|
||
DERValue constraints = bc.read();
|
||
if (!constraints.isConstructed())
|
||
throw new ASN1ParsingException("malformed BasicConstraints");
|
||
if (constraints.getLength() > 0)
|
||
{
|
||
boolean ca = false;
|
||
int constr = -1;
|
||
val2 = bc.read();
|
||
if (val2.getValue() instanceof Boolean)
|
||
{
|
||
ca = ((Boolean) val2.getValue()).booleanValue();
|
||
if (constraints.getLength() > val2.getEncodedLength())
|
||
val2 = bc.read();
|
||
}
|
||
if (val2.getValue() instanceof BigInteger)
|
||
constr = ((BigInteger) val2.getValue()).intValue();
|
||
basicConstraints = constr;
|
||
}
|
||
}
|
||
len += ext.getEncodedLength();
|
||
}
|
||
}
|
||
|
||
val = der.read();
|
||
if (!val.isConstructed())
|
||
throw new ASN1ParsingException("malformed AlgorithmIdentifier");
|
||
int sigAlgLen = val.getLength();
|
||
val = der.read();
|
||
sigAlgId = (OID) val.getValue();
|
||
if (sigAlgLen > val.getEncodedLength())
|
||
{
|
||
val = der.read();
|
||
if (val.getValue() == null)
|
||
sigAlgVal = keyParams;
|
||
else
|
||
sigAlgVal = (byte[]) val.getEncoded();
|
||
if (val.isConstructed())
|
||
encoded.skip(val.getLength());
|
||
}
|
||
signature = ((BitString) der.read().getValue()).toByteArray();
|
||
}
|
||
}
|