org.xipki.commons.security.shell.p12.P12ComplexCertRequestGenCmd.java Source code

Java tutorial

Introduction

Here is the source code for org.xipki.commons.security.shell.p12.P12ComplexCertRequestGenCmd.java

Source

/*
 *
 * Copyright (c) 2013 - 2016 Lijun Liao
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU Affero General Public License version 3
 * as published by the Free Software Foundation with the addition of the
 * following permission added to Section 15 as permitted in Section 7(a):
 *
 * FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
 * THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT
 * OF THIRD PARTY RIGHTS.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 * GNU Affero General Public License for more details.
 *
 * You should have received a copy of the GNU Affero General Public License
 * along with this program. If not, see <http://www.gnu.org/licenses/>.
 *
 * The interactive user interfaces in modified source and object code versions
 * of this program must display Appropriate Legal Notices, as required under
 * Section 5 of the GNU Affero General Public License.
 *
 * You can be released from the requirements of the license by purchasing
 * a commercial license. Buying such a license is mandatory as soon as you
 * develop commercial activities involving the XiPKI software without
 * disclosing the source code of your own applications.
 *
 * For more information, please contact Lijun Liao at this
 * address: lijun.liao@gmail.com
 */

package org.xipki.commons.security.shell.p12;

import java.io.FileInputStream;
import java.io.IOException;
import java.security.KeyStore;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.LinkedList;
import java.util.List;
import java.util.Vector;

import org.apache.karaf.shell.api.action.Command;
import org.apache.karaf.shell.api.action.Completion;
import org.apache.karaf.shell.api.action.Option;
import org.apache.karaf.shell.api.action.lifecycle.Service;
import org.bouncycastle.asn1.ASN1Encodable;
import org.bouncycastle.asn1.ASN1EncodableVector;
import org.bouncycastle.asn1.ASN1GeneralizedTime;
import org.bouncycastle.asn1.ASN1ObjectIdentifier;
import org.bouncycastle.asn1.ASN1OctetString;
import org.bouncycastle.asn1.ASN1Sequence;
import org.bouncycastle.asn1.DERGeneralizedTime;
import org.bouncycastle.asn1.DEROctetString;
import org.bouncycastle.asn1.DERPrintableString;
import org.bouncycastle.asn1.DERSequence;
import org.bouncycastle.asn1.DERSet;
import org.bouncycastle.asn1.DERTaggedObject;
import org.bouncycastle.asn1.DERUTF8String;
import org.bouncycastle.asn1.isismtt.x509.AdmissionSyntax;
import org.bouncycastle.asn1.isismtt.x509.Admissions;
import org.bouncycastle.asn1.isismtt.x509.ProfessionInfo;
import org.bouncycastle.asn1.x500.DirectoryString;
import org.bouncycastle.asn1.x500.RDN;
import org.bouncycastle.asn1.x500.X500Name;
import org.bouncycastle.asn1.x509.Attribute;
import org.bouncycastle.asn1.x509.Extension;
import org.bouncycastle.asn1.x509.GeneralName;
import org.bouncycastle.asn1.x509.GeneralNames;
import org.bouncycastle.asn1.x509.SubjectDirectoryAttributes;
import org.xipki.commons.common.ObjectCreationException;
import org.xipki.commons.common.util.ParamUtil;
import org.xipki.commons.console.karaf.completer.FilePathCompleter;
import org.xipki.commons.security.ConcurrentContentSigner;
import org.xipki.commons.security.HashAlgoType;
import org.xipki.commons.security.ObjectIdentifiers;
import org.xipki.commons.security.SignatureAlgoControl;
import org.xipki.commons.security.SignerConf;
import org.xipki.commons.security.exception.BadInputException;
import org.xipki.commons.security.shell.CertRequestGenCommandSupport;
import org.xipki.commons.security.util.KeyUtil;

/**
 * @author Lijun Liao
 * @since 2.0.0
 */

@Command(scope = "xipki-tk", name = "req-p12-complex", description = "generate complex CSR with PKCS#12 keystore (only for test)")
@Service
public class P12ComplexCertRequestGenCmd extends CertRequestGenCommandSupport {

    @Option(name = "--p12", required = true, description = "PKCS#12 keystore file\n" + "(required)")
    @Completion(FilePathCompleter.class)
    private String p12File;

    @Option(name = "--password", description = "password of the PKCS#12 file")
    private String password;

    @Option(name = "--complex-subject", description = "whether complex subject should be used")
    private Boolean complexSubject = Boolean.FALSE;

    private char[] getPassword() throws IOException {
        char[] pwdInChar = readPasswordIfNotSet(password);
        if (pwdInChar != null) {
            password = new String(pwdInChar);
        }
        return pwdInChar;
    }

    public KeyStore getKeyStore() throws IOException, KeyStoreException, NoSuchProviderException,
            NoSuchAlgorithmException, CertificateException {
        KeyStore ks;
        try (FileInputStream in = new FileInputStream(expandFilepath(p12File))) {
            ks = KeyUtil.getKeyStore("PKCS12");
            ks.load(in, getPassword());
        }
        return ks;
    }

    @Override
    protected ConcurrentContentSigner getSigner(final SignatureAlgoControl signatureAlgoControl)
            throws ObjectCreationException {
        ParamUtil.requireNonNull("signatureAlgoControl", signatureAlgoControl);
        char[] pwd;
        try {
            pwd = getPassword();
        } catch (IOException ex) {
            throw new ObjectCreationException("could not read password: " + ex.getMessage(), ex);
        }
        SignerConf signerConf = SignerConf.getKeystoreSignerConf(p12File, new String(pwd), 1,
                HashAlgoType.getNonNullHashAlgoType(hashAlgo), signatureAlgoControl);
        return securityFactory.createSigner("PKCS12", signerConf, (X509Certificate[]) null);
    }

    @Override
    protected X500Name getSubject(final String subject) {
        X500Name name = new X500Name(subject);
        List<RDN> list = new LinkedList<>();
        RDN[] rs = name.getRDNs();
        for (RDN m : rs) {
            list.add(m);
        }

        ASN1ObjectIdentifier id;

        // dateOfBirth
        if (complexSubject.booleanValue()) {
            id = ObjectIdentifiers.DN_DATE_OF_BIRTH;
            RDN[] rdns = name.getRDNs(id);

            if (rdns == null || rdns.length == 0) {
                ASN1Encodable atvValue = new DERGeneralizedTime("19950102120000Z");
                RDN rdn = new RDN(id, atvValue);
                list.add(rdn);
            }
        }

        // postalAddress
        if (complexSubject.booleanValue()) {
            id = ObjectIdentifiers.DN_POSTAL_ADDRESS;
            RDN[] rdns = name.getRDNs(id);

            if (rdns == null || rdns.length == 0) {
                ASN1EncodableVector vec = new ASN1EncodableVector();
                vec.add(new DERUTF8String("my street 1"));
                vec.add(new DERUTF8String("12345 Germany"));

                ASN1Sequence atvValue = new DERSequence(vec);
                RDN rdn = new RDN(id, atvValue);
                list.add(rdn);
            }
        }

        // DN_UNIQUE_IDENTIFIER
        id = ObjectIdentifiers.DN_UNIQUE_IDENTIFIER;
        RDN[] rdns = name.getRDNs(id);

        if (rdns == null || rdns.length == 0) {
            DERUTF8String atvValue = new DERUTF8String("abc-def-ghi");
            RDN rdn = new RDN(id, atvValue);
            list.add(rdn);
        }

        return new X500Name(list.toArray(new RDN[0]));
    }

    @Override
    protected ASN1OctetString createExtnValueSubjectAltName() throws BadInputException {
        if (!isEmpty(subjectAltNames)) {
            throw new BadInputException("subjectAltNames must be null");
        }
        GeneralNames names = createComplexGeneralNames("SAN-");
        try {
            return new DEROctetString(names);
        } catch (IOException ex) {
            throw new BadInputException(ex.getMessage(), ex);
        }
    }

    @Override
    protected ASN1OctetString createExtnValueSubjectInfoAccess() throws BadInputException {
        if (!isEmpty(subjectInfoAccesses)) {
            throw new BadInputException("subjectInfoAccess must be null");
        }
        ASN1EncodableVector vec = new ASN1EncodableVector();

        GeneralName[] names = createComplexGeneralNames("SIA-").getNames();

        ASN1EncodableVector vec2 = new ASN1EncodableVector();
        vec2.add(ObjectIdentifiers.id_ad_caRepository);
        vec2.add(names[0]);
        vec.add(new DERSequence(vec2));

        for (int i = 1; i < names.length; i++) {
            vec2 = new ASN1EncodableVector();
            vec2.add(new ASN1ObjectIdentifier("2.3.4." + i));
            vec2.add(names[i]);
            vec.add(new DERSequence(vec2));
        }

        try {
            return new DEROctetString(new DERSequence(vec));
        } catch (IOException ex) {
            throw new BadInputException(ex.getMessage(), ex);
        }
    }

    private static GeneralNames createComplexGeneralNames(String prefix) {
        List<GeneralName> list = new LinkedList<>();
        // otherName
        ASN1EncodableVector vec = new ASN1EncodableVector();
        vec.add(new ASN1ObjectIdentifier("1.2.3.1"));
        vec.add(new DERTaggedObject(true, 0, new DERUTF8String(prefix + "I am otherName 1.2.3.1")));
        list.add(new GeneralName(GeneralName.otherName, new DERSequence(vec)));

        vec = new ASN1EncodableVector();
        vec.add(new ASN1ObjectIdentifier("1.2.3.2"));
        vec.add(new DERTaggedObject(true, 0, new DERUTF8String(prefix + "I am otherName 1.2.3.2")));
        list.add(new GeneralName(GeneralName.otherName, new DERSequence(vec)));

        // rfc822Name
        list.add(new GeneralName(GeneralName.rfc822Name, prefix + "info@example.org"));

        // dNSName
        list.add(new GeneralName(GeneralName.dNSName, prefix + "dns.example.org"));

        // directoryName
        list.add(new GeneralName(GeneralName.directoryName, new X500Name("CN=demo,C=DE")));

        // ediPartyName
        vec = new ASN1EncodableVector();
        vec.add(new DERTaggedObject(false, 0, new DirectoryString(prefix + "assigner1")));
        vec.add(new DERTaggedObject(false, 1, new DirectoryString(prefix + "party1")));
        list.add(new GeneralName(GeneralName.ediPartyName, new DERSequence(vec)));

        // uniformResourceIdentifier
        list.add(new GeneralName(GeneralName.uniformResourceIdentifier, prefix + "uri.example.org"));

        // iPAddress
        list.add(new GeneralName(GeneralName.iPAddress, "69.1.2.190"));

        // registeredID
        list.add(new GeneralName(GeneralName.registeredID, "2.3.4.5"));

        return new GeneralNames(list.toArray(new GeneralName[0]));
    }

    @Override
    protected List<Extension> getAdditionalExtensions() throws BadInputException {
        List<Extension> extensions = new LinkedList<>();

        // extension admission (Germany standard commonpki)
        ASN1EncodableVector vec = new ASN1EncodableVector();

        DirectoryString[] dummyItems = new DirectoryString[] { new DirectoryString("dummy") };
        ProfessionInfo pi = new ProfessionInfo(null, dummyItems, null, "aaaab", null);
        Admissions admissions = new Admissions(null, null, new ProfessionInfo[] { pi });
        vec.add(admissions);

        AdmissionSyntax adSyn = new AdmissionSyntax(null, new DERSequence(vec));

        try {
            extensions.add(new Extension(ObjectIdentifiers.id_extension_admission, false, adSyn.getEncoded()));
        } catch (IOException ex) {
            throw new BadInputException(ex.getMessage(), ex);
        }

        // extension subjectDirectoryAttributes (RFC 3739)
        Vector<Attribute> attrs = new Vector<>();
        ASN1GeneralizedTime dateOfBirth = new ASN1GeneralizedTime("19800122120000Z");
        attrs.add(new Attribute(ObjectIdentifiers.DN_DATE_OF_BIRTH, new DERSet(dateOfBirth)));

        DERPrintableString gender = new DERPrintableString("M");
        attrs.add(new Attribute(ObjectIdentifiers.DN_GENDER, new DERSet(gender)));

        DERUTF8String placeOfBirth = new DERUTF8String("Berlin");
        attrs.add(new Attribute(ObjectIdentifiers.DN_PLACE_OF_BIRTH, new DERSet(placeOfBirth)));

        String[] countryOfCitizenshipList = new String[] { "DE", "FR" };
        for (String country : countryOfCitizenshipList) {
            DERPrintableString val = new DERPrintableString(country);
            attrs.add(new Attribute(ObjectIdentifiers.DN_COUNTRY_OF_CITIZENSHIP, new DERSet(val)));
        }

        String[] countryOfResidenceList = new String[] { "DE" };
        for (String country : countryOfResidenceList) {
            DERPrintableString val = new DERPrintableString(country);
            attrs.add(new Attribute(ObjectIdentifiers.DN_COUNTRY_OF_RESIDENCE, new DERSet(val)));
        }

        SubjectDirectoryAttributes subjectDirAttrs = new SubjectDirectoryAttributes(attrs);
        try {
            extensions
                    .add(new Extension(Extension.subjectDirectoryAttributes, false, subjectDirAttrs.getEncoded()));
        } catch (IOException ex) {
            throw new BadInputException(ex.getMessage(), ex);
        }

        return extensions;
    }

}