/*
 * Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.  Oracle designates this
 * particular file as subject to the "Classpath" exception as provided
 * by Oracle in the LICENSE file that accompanied this code.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

package sun.security.x509;

import java.io.IOException;
import java.io.OutputStream;
import java.util.Enumeration;

import sun.security.util.*;

This class defines the certificate extension which specifies the Policy constraints.

The policy constraints extension can be used in certificates issued to CAs. The policy constraints extension constrains path validation in two ways. It can be used to prohibit policy mapping or require that each certificate in a path contain an acceptable policy identifier.

The ASN.1 syntax for this is (IMPLICIT tagging is defined in the module definition):

PolicyConstraints ::= SEQUENCE {
    requireExplicitPolicy [0] SkipCerts OPTIONAL,
    inhibitPolicyMapping  [1] SkipCerts OPTIONAL
}
SkipCerts ::= INTEGER (0..MAX)
Author:Amit Kapoor, Hemma Prafullchandra
See Also:
/** * This class defines the certificate extension which specifies the * Policy constraints. * <p> * The policy constraints extension can be used in certificates issued * to CAs. The policy constraints extension constrains path validation * in two ways. It can be used to prohibit policy mapping or require * that each certificate in a path contain an acceptable policy * identifier.<p> * The ASN.1 syntax for this is (IMPLICIT tagging is defined in the * module definition): * <pre> * PolicyConstraints ::= SEQUENCE { * requireExplicitPolicy [0] SkipCerts OPTIONAL, * inhibitPolicyMapping [1] SkipCerts OPTIONAL * } * SkipCerts ::= INTEGER (0..MAX) * </pre> * @author Amit Kapoor * @author Hemma Prafullchandra * @see Extension * @see CertAttrSet */
public class PolicyConstraintsExtension extends Extension implements CertAttrSet<String> {
Identifier for this attribute, to be used with the get, set, delete methods of Certificate, x509 type.
/** * Identifier for this attribute, to be used with the * get, set, delete methods of Certificate, x509 type. */
public static final String IDENT = "x509.info.extensions.PolicyConstraints";
Attribute names.
/** * Attribute names. */
public static final String NAME = "PolicyConstraints"; public static final String REQUIRE = "require"; public static final String INHIBIT = "inhibit"; private static final byte TAG_REQUIRE = 0; private static final byte TAG_INHIBIT = 1; private int require = -1; private int inhibit = -1; // Encode this extension value. private void encodeThis() throws IOException { if (require == -1 && inhibit == -1) { this.extensionValue = null; return; } DerOutputStream tagged = new DerOutputStream(); DerOutputStream seq = new DerOutputStream(); if (require != -1) { DerOutputStream tmp = new DerOutputStream(); tmp.putInteger(require); tagged.writeImplicit(DerValue.createTag(DerValue.TAG_CONTEXT, false, TAG_REQUIRE), tmp); } if (inhibit != -1) { DerOutputStream tmp = new DerOutputStream(); tmp.putInteger(inhibit); tagged.writeImplicit(DerValue.createTag(DerValue.TAG_CONTEXT, false, TAG_INHIBIT), tmp); } seq.write(DerValue.tag_Sequence, tagged); this.extensionValue = seq.toByteArray(); }
Create a PolicyConstraintsExtension object with both require explicit policy and inhibit policy mapping. The extension is marked non-critical.
Params:
  • require – require explicit policy (-1 for optional).
  • inhibit – inhibit policy mapping (-1 for optional).
/** * Create a PolicyConstraintsExtension object with both * require explicit policy and inhibit policy mapping. The * extension is marked non-critical. * * @param require require explicit policy (-1 for optional). * @param inhibit inhibit policy mapping (-1 for optional). */
public PolicyConstraintsExtension(int require, int inhibit) throws IOException { this(Boolean.TRUE, require, inhibit); }
Create a PolicyConstraintsExtension object with specified criticality and both require explicit policy and inhibit policy mapping.
Params:
  • critical – true if the extension is to be treated as critical.
  • require – require explicit policy (-1 for optional).
  • inhibit – inhibit policy mapping (-1 for optional).
/** * Create a PolicyConstraintsExtension object with specified * criticality and both require explicit policy and inhibit * policy mapping. * * @param critical true if the extension is to be treated as critical. * @param require require explicit policy (-1 for optional). * @param inhibit inhibit policy mapping (-1 for optional). */
public PolicyConstraintsExtension(Boolean critical, int require, int inhibit) throws IOException { this.require = require; this.inhibit = inhibit; this.extensionId = PKIXExtensions.PolicyConstraints_Id; this.critical = critical.booleanValue(); encodeThis(); }
Create the extension from its DER encoded value and criticality.
Params:
  • critical – true if the extension is to be treated as critical.
  • value – an array of DER encoded bytes of the actual value.
Throws:
/** * Create the extension from its DER encoded value and criticality. * * @param critical true if the extension is to be treated as critical. * @param value an array of DER encoded bytes of the actual value. * @exception ClassCastException if value is not an array of bytes * @exception IOException on error. */
public PolicyConstraintsExtension(Boolean critical, Object value) throws IOException { this.extensionId = PKIXExtensions.PolicyConstraints_Id; this.critical = critical.booleanValue(); this.extensionValue = (byte[]) value; DerValue val = new DerValue(this.extensionValue); if (val.tag != DerValue.tag_Sequence) { throw new IOException("Sequence tag missing for PolicyConstraint."); } DerInputStream in = val.data; while (in != null && in.available() != 0) { DerValue next = in.getDerValue(); if (next.isContextSpecific(TAG_REQUIRE) && !next.isConstructed()) { if (this.require != -1) throw new IOException("Duplicate requireExplicitPolicy" + "found in the PolicyConstraintsExtension"); next.resetTag(DerValue.tag_Integer); this.require = next.getInteger(); } else if (next.isContextSpecific(TAG_INHIBIT) && !next.isConstructed()) { if (this.inhibit != -1) throw new IOException("Duplicate inhibitPolicyMapping" + "found in the PolicyConstraintsExtension"); next.resetTag(DerValue.tag_Integer); this.inhibit = next.getInteger(); } else throw new IOException("Invalid encoding of PolicyConstraint"); } }
Return the extension as user readable string.
/** * Return the extension as user readable string. */
public String toString() { StringBuilder sb = new StringBuilder(); sb.append(super.toString()) .append("PolicyConstraints: [") .append(" Require: "); if (require == -1) { sb.append("unspecified;"); } else { sb.append(require) .append(';'); } sb.append("\tInhibit: "); if (inhibit == -1) { sb.append("unspecified"); } else { sb.append(inhibit); } sb.append(" ]\n"); return sb.toString(); }
Write the extension to the DerOutputStream.
Params:
  • out – the DerOutputStream to write the extension to.
Throws:
/** * Write the extension to the DerOutputStream. * * @param out the DerOutputStream to write the extension to. * @exception IOException on encoding errors. */
public void encode(OutputStream out) throws IOException { DerOutputStream tmp = new DerOutputStream(); if (extensionValue == null) { extensionId = PKIXExtensions.PolicyConstraints_Id; critical = true; encodeThis(); } super.encode(tmp); out.write(tmp.toByteArray()); }
Set the attribute value.
/** * Set the attribute value. */
public void set(String name, Object obj) throws IOException { if (!(obj instanceof Integer)) { throw new IOException("Attribute value should be of type Integer."); } if (name.equalsIgnoreCase(REQUIRE)) { require = ((Integer)obj).intValue(); } else if (name.equalsIgnoreCase(INHIBIT)) { inhibit = ((Integer)obj).intValue(); } else { throw new IOException("Attribute name " + "[" + name + "]" + " not recognized by " + "CertAttrSet:PolicyConstraints."); } encodeThis(); }
Get the attribute value.
/** * Get the attribute value. */
public Integer get(String name) throws IOException { if (name.equalsIgnoreCase(REQUIRE)) { return require; } else if (name.equalsIgnoreCase(INHIBIT)) { return inhibit; } else { throw new IOException("Attribute name not recognized by " + "CertAttrSet:PolicyConstraints."); } }
Delete the attribute value.
/** * Delete the attribute value. */
public void delete(String name) throws IOException { if (name.equalsIgnoreCase(REQUIRE)) { require = -1; } else if (name.equalsIgnoreCase(INHIBIT)) { inhibit = -1; } else { throw new IOException("Attribute name not recognized by " + "CertAttrSet:PolicyConstraints."); } encodeThis(); }
Return an enumeration of names of attributes existing within this attribute.
/** * Return an enumeration of names of attributes existing within this * attribute. */
public Enumeration<String> getElements() { AttributeNameEnumeration elements = new AttributeNameEnumeration(); elements.addElement(REQUIRE); elements.addElement(INHIBIT); return (elements.elements()); }
Return the name of this attribute.
/** * Return the name of this attribute. */
public String getName() { return (NAME); } }