/*
 * Copyright (c) 2009, 2018, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.  Oracle designates this
 * particular file as subject to the "Classpath" exception as provided
 * by Oracle in the LICENSE file that accompanied this code.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

package sun.security.x509;

import java.io.IOException;
import java.io.OutputStream;
import java.util.Enumeration;

import sun.security.util.*;

Represent the OCSP NoCheck Extension from RFC2560.

A CA may specify that an OCSP client can trust a responder for the lifetime of the responder's certificate. The CA does so by including the extension id-pkix-ocsp-nocheck. This SHOULD be a non-critical extension. The value of the extension should be NULL. CAs issuing such a certificate should realize that a compromise of the responder's key is as serious as the compromise of a CA key used to sign CRLs, at least for the validity period of this certificate. CA's may choose to issue this type of certificate with a very short lifetime and renew it frequently.

id-pkix-ocsp-nocheck OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 }
Author:Xuelei Fan
See Also:
/** * Represent the OCSP NoCheck Extension from RFC2560. * <p> * A CA may specify that an OCSP client can trust a responder for the * lifetime of the responder's certificate. The CA does so by including * the extension id-pkix-ocsp-nocheck. This SHOULD be a non-critical * extension. The value of the extension should be NULL. CAs issuing * such a certificate should realize that a compromise of the * responder's key is as serious as the compromise of a CA key used to * sign CRLs, at least for the validity period of this certificate. CA's * may choose to issue this type of certificate with a very short * lifetime and renew it frequently. * <pre> * id-pkix-ocsp-nocheck OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 } * </pre> * * @author Xuelei Fan * @see Extension * @see CertAttrSet */
public class OCSPNoCheckExtension extends Extension implements CertAttrSet<String> {
Identifier for this attribute, to be used with the get, set, delete methods of Certificate, x509 type.
/** * Identifier for this attribute, to be used with the * get, set, delete methods of Certificate, x509 type. */
public static final String IDENT = "x509.info.extensions.OCSPNoCheck";
Attribute names.
/** * Attribute names. */
public static final String NAME = "OCSPNoCheck";
Create a OCSPNoCheckExtension
/** * Create a OCSPNoCheckExtension */
public OCSPNoCheckExtension() throws IOException { this.extensionId = PKIXExtensions.OCSPNoCheck_Id; this.critical = false; this.extensionValue = new byte[0]; }
Create the extension from the passed DER encoded value.
Params:
  • critical – true if the extension is to be treated as critical.
  • value – an array of DER encoded bytes of the actual value.
Throws:
/** * Create the extension from the passed DER encoded value. * * @param critical true if the extension is to be treated as critical. * @param value an array of DER encoded bytes of the actual value. * @exception IOException on error. */
public OCSPNoCheckExtension(Boolean critical, Object value) throws IOException { this.extensionId = PKIXExtensions.OCSPNoCheck_Id; this.critical = critical.booleanValue(); // the value should be null, just ignore it here. this.extensionValue = new byte[0]; }
Set the attribute value.
/** * Set the attribute value. */
public void set(String name, Object obj) throws IOException { throw new IOException("No attribute is allowed by " + "CertAttrSet:OCSPNoCheckExtension."); }
Get the attribute value.
/** * Get the attribute value. */
public Object get(String name) throws IOException { throw new IOException("No attribute is allowed by " + "CertAttrSet:OCSPNoCheckExtension."); }
Delete the attribute value.
/** * Delete the attribute value. */
public void delete(String name) throws IOException { throw new IOException("No attribute is allowed by " + "CertAttrSet:OCSPNoCheckExtension."); }
Return an enumeration of names of attributes existing within this attribute.
/** * Return an enumeration of names of attributes existing within this * attribute. */
public Enumeration<String> getElements() { return (new AttributeNameEnumeration()).elements(); }
Return the name of this attribute.
/** * Return the name of this attribute. */
public String getName() { return NAME; } }