feat(jdk8): move files to new folder to avoid resources compiled.
This commit is contained in:
@@ -0,0 +1,308 @@
|
||||
/*
|
||||
* Copyright (c) 2000, 2015, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation. Oracle designates this
|
||||
* particular file as subject to the "Classpath" exception as provided
|
||||
* by Oracle in the LICENSE file that accompanied this code.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
package sun.security.provider.certpath;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.security.cert.Certificate;
|
||||
import java.security.cert.CertificateException;
|
||||
import java.security.cert.CertPathValidatorException;
|
||||
import java.security.cert.PKIXCertPathChecker;
|
||||
import java.security.cert.PKIXReason;
|
||||
import java.security.cert.X509Certificate;
|
||||
import java.util.Collection;
|
||||
import java.util.Collections;
|
||||
import java.util.HashSet;
|
||||
import java.util.Set;
|
||||
|
||||
import sun.security.util.Debug;
|
||||
import static sun.security.x509.PKIXExtensions.*;
|
||||
import sun.security.x509.NameConstraintsExtension;
|
||||
import sun.security.x509.X509CertImpl;
|
||||
|
||||
/**
|
||||
* ConstraintsChecker is a <code>PKIXCertPathChecker</code> that checks
|
||||
* constraints information on a PKIX certificate, namely basic constraints
|
||||
* and name constraints.
|
||||
*
|
||||
* @since 1.4
|
||||
* @author Yassir Elley
|
||||
*/
|
||||
class ConstraintsChecker extends PKIXCertPathChecker {
|
||||
|
||||
private static final Debug debug = Debug.getInstance("certpath");
|
||||
/* length of cert path */
|
||||
private final int certPathLength;
|
||||
/* current maximum path length (as defined in PKIX) */
|
||||
private int maxPathLength;
|
||||
/* current index of cert */
|
||||
private int i;
|
||||
private NameConstraintsExtension prevNC;
|
||||
|
||||
private Set<String> supportedExts;
|
||||
|
||||
/**
|
||||
* Creates a ConstraintsChecker.
|
||||
*
|
||||
* @param certPathLength the length of the certification path
|
||||
*/
|
||||
ConstraintsChecker(int certPathLength) {
|
||||
this.certPathLength = certPathLength;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void init(boolean forward) throws CertPathValidatorException {
|
||||
if (!forward) {
|
||||
i = 0;
|
||||
maxPathLength = certPathLength;
|
||||
prevNC = null;
|
||||
} else {
|
||||
throw new CertPathValidatorException
|
||||
("forward checking not supported");
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isForwardCheckingSupported() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Set<String> getSupportedExtensions() {
|
||||
if (supportedExts == null) {
|
||||
supportedExts = new HashSet<String>(2);
|
||||
supportedExts.add(BasicConstraints_Id.toString());
|
||||
supportedExts.add(NameConstraints_Id.toString());
|
||||
supportedExts = Collections.unmodifiableSet(supportedExts);
|
||||
}
|
||||
return supportedExts;
|
||||
}
|
||||
|
||||
/**
|
||||
* Performs the basic constraints and name constraints
|
||||
* checks on the certificate using its internal state.
|
||||
*
|
||||
* @param cert the <code>Certificate</code> to be checked
|
||||
* @param unresCritExts a <code>Collection</code> of OID strings
|
||||
* representing the current set of unresolved critical extensions
|
||||
* @throws CertPathValidatorException if the specified certificate
|
||||
* does not pass the check
|
||||
*/
|
||||
@Override
|
||||
public void check(Certificate cert, Collection<String> unresCritExts)
|
||||
throws CertPathValidatorException
|
||||
{
|
||||
X509Certificate currCert = (X509Certificate)cert;
|
||||
|
||||
i++;
|
||||
// MUST run NC check second, since it depends on BC check to
|
||||
// update remainingCerts
|
||||
checkBasicConstraints(currCert);
|
||||
verifyNameConstraints(currCert);
|
||||
|
||||
if (unresCritExts != null && !unresCritExts.isEmpty()) {
|
||||
unresCritExts.remove(BasicConstraints_Id.toString());
|
||||
unresCritExts.remove(NameConstraints_Id.toString());
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal method to check the name constraints against a cert
|
||||
*/
|
||||
private void verifyNameConstraints(X509Certificate currCert)
|
||||
throws CertPathValidatorException
|
||||
{
|
||||
String msg = "name constraints";
|
||||
if (debug != null) {
|
||||
debug.println("---checking " + msg + "...");
|
||||
}
|
||||
|
||||
// check name constraints only if there is a previous name constraint
|
||||
// and either the currCert is the final cert or the currCert is not
|
||||
// self-issued
|
||||
if (prevNC != null && ((i == certPathLength) ||
|
||||
!X509CertImpl.isSelfIssued(currCert))) {
|
||||
if (debug != null) {
|
||||
debug.println("prevNC = " + prevNC +
|
||||
", currDN = " + currCert.getSubjectX500Principal());
|
||||
}
|
||||
|
||||
try {
|
||||
if (!prevNC.verify(currCert)) {
|
||||
throw new CertPathValidatorException(msg + " check failed",
|
||||
null, null, -1, PKIXReason.INVALID_NAME);
|
||||
}
|
||||
} catch (IOException ioe) {
|
||||
throw new CertPathValidatorException(ioe);
|
||||
}
|
||||
}
|
||||
|
||||
// merge name constraints regardless of whether cert is self-issued
|
||||
prevNC = mergeNameConstraints(currCert, prevNC);
|
||||
|
||||
if (debug != null)
|
||||
debug.println(msg + " verified.");
|
||||
}
|
||||
|
||||
/**
|
||||
* Helper to fold sets of name constraints together
|
||||
*/
|
||||
static NameConstraintsExtension mergeNameConstraints(
|
||||
X509Certificate currCert, NameConstraintsExtension prevNC)
|
||||
throws CertPathValidatorException
|
||||
{
|
||||
X509CertImpl currCertImpl;
|
||||
try {
|
||||
currCertImpl = X509CertImpl.toImpl(currCert);
|
||||
} catch (CertificateException ce) {
|
||||
throw new CertPathValidatorException(ce);
|
||||
}
|
||||
|
||||
NameConstraintsExtension newConstraints =
|
||||
currCertImpl.getNameConstraintsExtension();
|
||||
|
||||
if (debug != null) {
|
||||
debug.println("prevNC = " + prevNC +
|
||||
", newNC = " + String.valueOf(newConstraints));
|
||||
}
|
||||
|
||||
// if there are no previous name constraints, we just return the
|
||||
// new name constraints.
|
||||
if (prevNC == null) {
|
||||
if (debug != null) {
|
||||
debug.println("mergedNC = " + String.valueOf(newConstraints));
|
||||
}
|
||||
if (newConstraints == null) {
|
||||
return newConstraints;
|
||||
} else {
|
||||
// Make sure we do a clone here, because we're probably
|
||||
// going to modify this object later and we don't want to
|
||||
// be sharing it with a Certificate object!
|
||||
return (NameConstraintsExtension)newConstraints.clone();
|
||||
}
|
||||
} else {
|
||||
try {
|
||||
// after merge, prevNC should contain the merged constraints
|
||||
prevNC.merge(newConstraints);
|
||||
} catch (IOException ioe) {
|
||||
throw new CertPathValidatorException(ioe);
|
||||
}
|
||||
if (debug != null) {
|
||||
debug.println("mergedNC = " + prevNC);
|
||||
}
|
||||
return prevNC;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Internal method to check that a given cert meets basic constraints.
|
||||
*/
|
||||
private void checkBasicConstraints(X509Certificate currCert)
|
||||
throws CertPathValidatorException
|
||||
{
|
||||
String msg = "basic constraints";
|
||||
if (debug != null) {
|
||||
debug.println("---checking " + msg + "...");
|
||||
debug.println("i = " + i +
|
||||
", maxPathLength = " + maxPathLength);
|
||||
}
|
||||
|
||||
/* check if intermediate cert */
|
||||
if (i < certPathLength) {
|
||||
// RFC5280: If certificate i is a version 3 certificate, verify
|
||||
// that the basicConstraints extension is present and that cA is
|
||||
// set to TRUE. (If certificate i is a version 1 or version 2
|
||||
// certificate, then the application MUST either verify that
|
||||
// certificate i is a CA certificate through out-of-band means
|
||||
// or reject the certificate. Conforming implementations may
|
||||
// choose to reject all version 1 and version 2 intermediate
|
||||
// certificates.)
|
||||
//
|
||||
// We choose to reject all version 1 and version 2 intermediate
|
||||
// certificates except that it is self issued by the trust
|
||||
// anchor in order to support key rollover or changes in
|
||||
// certificate policies.
|
||||
int pathLenConstraint = -1;
|
||||
if (currCert.getVersion() < 3) { // version 1 or version 2
|
||||
if (i == 1) { // issued by a trust anchor
|
||||
if (X509CertImpl.isSelfIssued(currCert)) {
|
||||
pathLenConstraint = Integer.MAX_VALUE;
|
||||
}
|
||||
}
|
||||
} else {
|
||||
pathLenConstraint = currCert.getBasicConstraints();
|
||||
}
|
||||
|
||||
if (pathLenConstraint == -1) {
|
||||
throw new CertPathValidatorException
|
||||
(msg + " check failed: this is not a CA certificate",
|
||||
null, null, -1, PKIXReason.NOT_CA_CERT);
|
||||
}
|
||||
|
||||
if (!X509CertImpl.isSelfIssued(currCert)) {
|
||||
if (maxPathLength <= 0) {
|
||||
throw new CertPathValidatorException
|
||||
(msg + " check failed: pathLenConstraint violated - "
|
||||
+ "this cert must be the last cert in the "
|
||||
+ "certification path", null, null, -1,
|
||||
PKIXReason.PATH_TOO_LONG);
|
||||
}
|
||||
maxPathLength--;
|
||||
}
|
||||
if (pathLenConstraint < maxPathLength)
|
||||
maxPathLength = pathLenConstraint;
|
||||
}
|
||||
|
||||
if (debug != null) {
|
||||
debug.println("after processing, maxPathLength = " + maxPathLength);
|
||||
debug.println(msg + " verified.");
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Merges the specified maxPathLength with the pathLenConstraint
|
||||
* obtained from the certificate.
|
||||
*
|
||||
* @param cert the <code>X509Certificate</code>
|
||||
* @param maxPathLength the previous maximum path length
|
||||
* @return the new maximum path length constraint (-1 means no more
|
||||
* certificates can follow, Integer.MAX_VALUE means path length is
|
||||
* unconstrained)
|
||||
*/
|
||||
static int mergeBasicConstraints(X509Certificate cert, int maxPathLength) {
|
||||
|
||||
int pathLenConstraint = cert.getBasicConstraints();
|
||||
|
||||
if (!X509CertImpl.isSelfIssued(cert)) {
|
||||
maxPathLength--;
|
||||
}
|
||||
|
||||
if (pathLenConstraint < maxPathLength) {
|
||||
maxPathLength = pathLenConstraint;
|
||||
}
|
||||
|
||||
return maxPathLength;
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user