Java 类org.bouncycastle.asn1.cmp.PKIStatus 实例源码

项目:irma_future_id    文件:ParseTest.java   
private void unacceptableResponseParse(
    byte[]  response) 
    throws Exception
{
    TimeStampResponse resp = new TimeStampResponse(response);

    if (resp.getStatus() != PKIStatus.REJECTION)
    {
        fail("request not rejected.");
    }

    if (resp.getFailInfo().intValue() != PKIFailureInfo.unacceptedPolicy)
    {
        fail("request not rejected.");
    }
}
项目:bc-java    文件:ParseTest.java   
private void unacceptableResponseParse(
    byte[]  response) 
    throws Exception
{
    TimeStampResponse resp = new TimeStampResponse(response);

    if (resp.getStatus() != PKIStatus.REJECTION)
    {
        fail("request not rejected.");
    }

    if (resp.getFailInfo().intValue() != PKIFailureInfo.unacceptedPolicy)
    {
        fail("request not rejected.");
    }
}
项目:ipack    文件:TimeStampResponseGenerator.java   
/**
 * Generate a generic rejection response based on a TSPValidationException or
 * an Exception. Exceptions which are not an instance of TSPValidationException
 * will be treated as systemFailure. The return value of exception.getMessage() will
 * be used as the status string for the response.
 *
 * @param exception the exception thrown on validating the request.
 * @return a TimeStampResponse.
 * @throws TSPException if a failure response cannot be generated.
 */
public TimeStampResponse generateRejectedResponse(Exception exception)
    throws TSPException
{
    if (exception instanceof TSPValidationException)
    {
        return generateFailResponse(PKIStatus.REJECTION, ((TSPValidationException)exception).getFailureCode(), exception.getMessage());
    }
    else
    {
        return generateFailResponse(PKIStatus.REJECTION, PKIFailureInfo.systemFailure, exception.getMessage());
    }
}
项目:gwt-crypto    文件:TimeStampResponseGenerator.java   
/**
 * Generate a generic rejection response based on a TSPValidationException or
 * an Exception. Exceptions which are not an instance of TSPValidationException
 * will be treated as systemFailure. The return value of exception.getMessage() will
 * be used as the status string for the response.
 *
 * @param exception the exception thrown on validating the request.
 * @return a TimeStampResponse.
 * @throws TSPException if a failure response cannot be generated.
 */
public TimeStampResponse generateRejectedResponse(Exception exception)
    throws TSPException
{
    if (exception instanceof TSPValidationException)
    {
        return generateFailResponse(PKIStatus.REJECTION, ((TSPValidationException)exception).getFailureCode(), exception.getMessage());
    }
    else
    {
        return generateFailResponse(PKIStatus.REJECTION, PKIFailureInfo.systemFailure, exception.getMessage());
    }
}
项目:Aki-SSL    文件:TimeStampResponseGenerator.java   
/**
 * Generate a generic rejection response based on a TSPValidationException or
 * an Exception. Exceptions which are not an instance of TSPValidationException
 * will be treated as systemFailure. The return value of exception.getMessage() will
 * be used as the status string for the response.
 *
 * @param exception the exception thrown on validating the request.
 * @return a TimeStampResponse.
 * @throws TSPException if a failure response cannot be generated.
 */
public TimeStampResponse generateRejectedResponse(Exception exception)
    throws TSPException
{
    if (exception instanceof TSPValidationException)
    {
        return generateFailResponse(PKIStatus.REJECTION, ((TSPValidationException)exception).getFailureCode(), exception.getMessage());
    }
    else
    {
        return generateFailResponse(PKIStatus.REJECTION, PKIFailureInfo.systemFailure, exception.getMessage());
    }
}
项目:xipki    文件:X509CaCmpResponderImpl.java   
private static PKIBody buildErrorMsgPkiBody(PKIStatus pkiStatus, int failureInfo,
        String statusMessage) {
    PKIFreeText pkiStatusMsg = (statusMessage == null) ? null : new PKIFreeText(statusMessage);
    ErrorMsgContent emc = new ErrorMsgContent(
            new PKIStatusInfo(pkiStatus, pkiStatusMsg, new PKIFailureInfo(failureInfo)));
    return new PKIBody(PKIBody.TYPE_ERROR, emc);
}
项目:irma_future_id    文件:TimeStampResponseGenerator.java   
/**
 * Generate a generic rejection response based on a TSPValidationException or
 * an Exception. Exceptions which are not an instance of TSPValidationException
 * will be treated as systemFailure. The return value of exception.getMessage() will
 * be used as the status string for the response.
 *
 * @param exception the exception thrown on validating the request.
 * @return a TimeStampResponse.
 * @throws TSPException if a failure response cannot be generated.
 */
public TimeStampResponse generateRejectedResponse(Exception exception)
    throws TSPException
{
    if (exception instanceof TSPValidationException)
    {
        return generateFailResponse(PKIStatus.REJECTION, ((TSPValidationException)exception).getFailureCode(), exception.getMessage());
    }
    else
    {
        return generateFailResponse(PKIStatus.REJECTION, PKIFailureInfo.systemFailure, exception.getMessage());
    }
}
项目:irma_future_id    文件:ParseTest.java   
private void generalizedTimeParse(
    byte[]  response) 
    throws Exception
{
    TimeStampResponse resp = new TimeStampResponse(response);

    if (resp.getStatus() != PKIStatus.GRANTED)
    {
        fail("request not rejected.");
    }
}
项目:bc-java    文件:TimeStampResponseGenerator.java   
/**
 * Generate a generic rejection response based on a TSPValidationException or
 * an Exception. Exceptions which are not an instance of TSPValidationException
 * will be treated as systemFailure. The return value of exception.getMessage() will
 * be used as the status string for the response.
 *
 * @param exception the exception thrown on validating the request.
 * @return a TimeStampResponse.
 * @throws TSPException if a failure response cannot be generated.
 */
public TimeStampResponse generateRejectedResponse(Exception exception)
    throws TSPException
{
    if (exception instanceof TSPValidationException)
    {
        return generateFailResponse(PKIStatus.REJECTION, ((TSPValidationException)exception).getFailureCode(), exception.getMessage());
    }
    else
    {
        return generateFailResponse(PKIStatus.REJECTION, PKIFailureInfo.systemFailure, exception.getMessage());
    }
}
项目:bc-java    文件:ParseTest.java   
private void generalizedTimeParse(
    byte[]  response) 
    throws Exception
{
    TimeStampResponse resp = new TimeStampResponse(response);

    if (resp.getStatus() != PKIStatus.GRANTED)
    {
        fail("request not rejected.");
    }
}
项目:ipack    文件:TimeStampResponse.java   
/**
 * Check this response against to see if it a well formed response for 
 * the passed in request. Validation will include checking the time stamp
 * token if the response status is GRANTED or GRANTED_WITH_MODS.
 * 
 * @param request the request to be checked against
 * @throws TSPException if the request can not match this response.
 */
public void validate(
    TimeStampRequest    request)
    throws TSPException
{
    TimeStampToken tok = this.getTimeStampToken();

    if (tok != null)
    {
        TimeStampTokenInfo  tstInfo = tok.getTimeStampInfo();

        if (request.getNonce() != null && !request.getNonce().equals(tstInfo.getNonce()))
        {
            throw new TSPValidationException("response contains wrong nonce value.");
        }

        if (this.getStatus() != PKIStatus.GRANTED && this.getStatus() != PKIStatus.GRANTED_WITH_MODS)
        {
            throw new TSPValidationException("time stamp token found in failed request.");
        }

        if (!Arrays.constantTimeAreEqual(request.getMessageImprintDigest(), tstInfo.getMessageImprintDigest()))
        {
            throw new TSPValidationException("response for different message imprint digest.");
        }

        if (!tstInfo.getMessageImprintAlgOID().equals(request.getMessageImprintAlgOID()))
        {
            throw new TSPValidationException("response for different message imprint algorithm.");
        }

        Attribute scV1 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificate);
        Attribute scV2 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificateV2);

        if (scV1 == null && scV2 == null)
        {
            throw new TSPValidationException("no signing certificate attribute present.");
        }

        if (scV1 != null && scV2 != null)
        {
            /*
             * RFC 5035 5.4. If both attributes exist in a single message,
             * they are independently evaluated. 
             */
        }

        if (request.getReqPolicy() != null && !request.getReqPolicy().equals(tstInfo.getPolicy()))
        {
            throw new TSPValidationException("TSA policy wrong for request.");
        }
    }
    else if (this.getStatus() == PKIStatus.GRANTED || this.getStatus() == PKIStatus.GRANTED_WITH_MODS)
    {
        throw new TSPValidationException("no time stamp token found and one expected.");
    }
}
项目:gwt-crypto    文件:TimeStampResponse.java   
/**
 * Check this response against to see if it a well formed response for 
 * the passed in request. Validation will include checking the time stamp
 * token if the response status is GRANTED or GRANTED_WITH_MODS.
 * 
 * @param request the request to be checked against
 * @throws TSPException if the request can not match this response.
 */
public void validate(
    TimeStampRequest    request)
    throws TSPException
{
    TimeStampToken tok = this.getTimeStampToken();

    if (tok != null)
    {
        TimeStampTokenInfo  tstInfo = tok.getTimeStampInfo();

        if (request.getNonce() != null && !request.getNonce().equals(tstInfo.getNonce()))
        {
            throw new TSPValidationException("response contains wrong nonce value.");
        }

        if (this.getStatus() != PKIStatus.GRANTED && this.getStatus() != PKIStatus.GRANTED_WITH_MODS)
        {
            throw new TSPValidationException("time stamp token found in failed request.");
        }

        if (!Arrays.constantTimeAreEqual(request.getMessageImprintDigest(), tstInfo.getMessageImprintDigest()))
        {
            throw new TSPValidationException("response for different message imprint digest.");
        }

        if (!tstInfo.getMessageImprintAlgOID().equals(request.getMessageImprintAlgOID()))
        {
            throw new TSPValidationException("response for different message imprint algorithm.");
        }

        Attribute scV1 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificate);
        Attribute scV2 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificateV2);

        if (scV1 == null && scV2 == null)
        {
            throw new TSPValidationException("no signing certificate attribute present.");
        }

        if (scV1 != null && scV2 != null)
        {
            /*
             * RFC 5035 5.4. If both attributes exist in a single message,
             * they are independently evaluated. 
             */
        }

        if (request.getReqPolicy() != null && !request.getReqPolicy().equals(tstInfo.getPolicy()))
        {
            throw new TSPValidationException("TSA policy wrong for request.");
        }
    }
    else if (this.getStatus() == PKIStatus.GRANTED || this.getStatus() == PKIStatus.GRANTED_WITH_MODS)
    {
        throw new TSPValidationException("no time stamp token found and one expected.");
    }
}
项目:Aki-SSL    文件:TimeStampResponse.java   
/**
 * Check this response against to see if it a well formed response for 
 * the passed in request. Validation will include checking the time stamp
 * token if the response status is GRANTED or GRANTED_WITH_MODS.
 * 
 * @param request the request to be checked against
 * @throws TSPException if the request can not match this response.
 */
public void validate(
    TimeStampRequest    request)
    throws TSPException
{
    TimeStampToken tok = this.getTimeStampToken();

    if (tok != null)
    {
        TimeStampTokenInfo  tstInfo = tok.getTimeStampInfo();

        if (request.getNonce() != null && !request.getNonce().equals(tstInfo.getNonce()))
        {
            throw new TSPValidationException("response contains wrong nonce value.");
        }

        if (this.getStatus() != PKIStatus.GRANTED && this.getStatus() != PKIStatus.GRANTED_WITH_MODS)
        {
            throw new TSPValidationException("time stamp token found in failed request.");
        }

        if (!Arrays.constantTimeAreEqual(request.getMessageImprintDigest(), tstInfo.getMessageImprintDigest()))
        {
            throw new TSPValidationException("response for different message imprint digest.");
        }

        if (!tstInfo.getMessageImprintAlgOID().equals(request.getMessageImprintAlgOID()))
        {
            throw new TSPValidationException("response for different message imprint algorithm.");
        }

        Attribute scV1 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificate);
        Attribute scV2 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificateV2);

        if (scV1 == null && scV2 == null)
        {
            throw new TSPValidationException("no signing certificate attribute present.");
        }

        if (scV1 != null && scV2 != null)
        {
            /*
             * RFC 5035 5.4. If both attributes exist in a single message,
             * they are independently evaluated. 
             */
        }

        if (request.getReqPolicy() != null && !request.getReqPolicy().equals(tstInfo.getPolicy()))
        {
            throw new TSPValidationException("TSA policy wrong for request.");
        }
    }
    else if (this.getStatus() == PKIStatus.GRANTED || this.getStatus() == PKIStatus.GRANTED_WITH_MODS)
    {
        throw new TSPValidationException("no time stamp token found and one expected.");
    }
}
项目:xipki    文件:X509CaCmpResponderImpl.java   
private PKIBody confirmCertificates(ASN1OctetString transactionId, CertConfirmContent certConf,
        String msgId) {
    CertStatus[] certStatuses = certConf.toCertStatusArray();

    boolean successful = true;
    for (CertStatus certStatus : certStatuses) {
        ASN1Integer certReqId = certStatus.getCertReqId();
        byte[] certHash = certStatus.getCertHash().getOctets();
        X509CertificateInfo certInfo = pendingCertPool.removeCertificate(
                transactionId.getOctets(), certReqId.getPositiveValue(), certHash);
        if (certInfo == null) {
            if (LOG.isWarnEnabled()) {
                LOG.warn("no cert under transactionId={}, certReqId={} and certHash=0X{}",
                        transactionId, certReqId.getPositiveValue(),
                        Hex.encode(certHash));
            }
            continue;
        }

        PKIStatusInfo statusInfo = certStatus.getStatusInfo();
        boolean accept = true;
        if (statusInfo != null) {
            int status = statusInfo.getStatus().intValue();
            if (PKIStatus.GRANTED != status && PKIStatus.GRANTED_WITH_MODS != status) {
                accept = false;
            }
        }

        if (accept) {
            continue;
        }

        BigInteger serialNumber = certInfo.cert().cert().getSerialNumber();
        X509Ca ca = getCa();
        try {
            ca.revokeCertificate(serialNumber, CrlReason.CESSATION_OF_OPERATION, new Date(),
                    msgId);
        } catch (OperationException ex) {
            LogUtil.warn(LOG, ex,
                    "could not revoke certificate ca=" + ca.caInfo().ident()
                    + " serialNumber=" + LogUtil.formatCsn(serialNumber));
        }

        successful = false;
    }

    // all other certificates should be revoked
    if (revokePendingCertificates(transactionId, msgId)) {
        successful = false;
    }

    if (successful) {
        return new PKIBody(PKIBody.TYPE_CONFIRM, DERNull.INSTANCE);
    }

    ErrorMsgContent emc = new ErrorMsgContent(
            new PKIStatusInfo(PKIStatus.rejection, null,
                    new PKIFailureInfo(PKIFailureInfo.systemFailure)));

    return new PKIBody(PKIBody.TYPE_ERROR, emc);
}
项目:xipki    文件:X509CaCmpResponderImpl.java   
private PKIBody cmpUnRevokeRemoveCertificates(PKIMessage request, PKIHeaderBuilder respHeader,
        CmpControl cmpControl, PKIHeader reqHeader, PKIBody reqBody, CmpRequestorInfo requestor,
        String msgId, AuditEvent event) {
    Integer requiredPermission = null;
    boolean allRevdetailsOfSameType = true;

    RevReqContent rr = RevReqContent.getInstance(reqBody.getContent());
    RevDetails[] revContent = rr.toRevDetailsArray();

    int len = revContent.length;
    for (int i = 0; i < len; i++) {
        RevDetails revDetails = revContent[i];
        Extensions crlDetails = revDetails.getCrlEntryDetails();
        int reasonCode = CrlReason.UNSPECIFIED.code();
        if (crlDetails != null) {
            ASN1ObjectIdentifier extId = Extension.reasonCode;
            ASN1Encodable extValue = crlDetails.getExtensionParsedValue(extId);
            if (extValue != null) {
                reasonCode = ASN1Enumerated.getInstance(extValue).getValue().intValue();
            }
        }

        if (reasonCode == XiSecurityConstants.CMP_CRL_REASON_REMOVE) {
            if (requiredPermission == null) {
                event.addEventType(CaAuditConstants.TYPE_CMP_rr_remove);
                requiredPermission = PermissionConstants.REMOVE_CERT;
            } else if (requiredPermission != PermissionConstants.REMOVE_CERT) {
                allRevdetailsOfSameType = false;
                break;
            }
        } else if (reasonCode == CrlReason.REMOVE_FROM_CRL.code()) {
            if (requiredPermission == null) {
                event.addEventType(CaAuditConstants.TYPE_CMP_rr_unrevoke);
                requiredPermission = PermissionConstants.UNREVOKE_CERT;
            } else if (requiredPermission != PermissionConstants.UNREVOKE_CERT) {
                allRevdetailsOfSameType = false;
                break;
            }
        } else {
            if (requiredPermission == null) {
                event.addEventType(CaAuditConstants.TYPE_CMP_rr_revoke);
                requiredPermission = PermissionConstants.REVOKE_CERT;
            } else if (requiredPermission != PermissionConstants.REVOKE_CERT) {
                allRevdetailsOfSameType = false;
                break;
            }
        }
    } // end for

    if (!allRevdetailsOfSameType) {
        ErrorMsgContent emc = new ErrorMsgContent(
                new PKIStatusInfo(PKIStatus.rejection,
                new PKIFreeText("not all revDetails are of the same type"),
                new PKIFailureInfo(PKIFailureInfo.badRequest)));

        return new PKIBody(PKIBody.TYPE_ERROR, emc);
    } else {
        try {
            checkPermission(requestor, requiredPermission);
        } catch (InsuffientPermissionException ex) {
            event.setStatus(AuditStatus.FAILED);
            event.addEventData(CaAuditConstants.NAME_message, "NOT_PERMITTED");
            return buildErrorMsgPkiBody(PKIStatus.rejection, PKIFailureInfo.notAuthorized,
                    null);
        }
        return unRevokeRemoveCertificates(request, rr, requiredPermission, cmpControl, msgId);
    }
}
项目:xipki    文件:CmpResponder.java   
protected PKIStatusInfo generateRejectionStatus(Integer info, String errorMessage) {
    return generateRejectionStatus(PKIStatus.rejection, info, errorMessage);
}
项目:xipki    文件:CmpResponder.java   
protected PKIStatusInfo generateRejectionStatus(PKIStatus status, Integer info,
        String errorMessage) {
    PKIFreeText statusMessage = (errorMessage == null) ? null : new PKIFreeText(errorMessage);
    PKIFailureInfo failureInfo = (info == null) ? null : new PKIFailureInfo(info);
    return new PKIStatusInfo(status, statusMessage, failureInfo);
}
项目:irma_future_id    文件:TimeStampResponse.java   
/**
 * Check this response against to see if it a well formed response for 
 * the passed in request. Validation will include checking the time stamp
 * token if the response status is GRANTED or GRANTED_WITH_MODS.
 * 
 * @param request the request to be checked against
 * @throws TSPException if the request can not match this response.
 */
public void validate(
    TimeStampRequest    request)
    throws TSPException
{
    TimeStampToken tok = this.getTimeStampToken();

    if (tok != null)
    {
        TimeStampTokenInfo  tstInfo = tok.getTimeStampInfo();

        if (request.getNonce() != null && !request.getNonce().equals(tstInfo.getNonce()))
        {
            throw new TSPValidationException("response contains wrong nonce value.");
        }

        if (this.getStatus() != PKIStatus.GRANTED && this.getStatus() != PKIStatus.GRANTED_WITH_MODS)
        {
            throw new TSPValidationException("time stamp token found in failed request.");
        }

        if (!Arrays.constantTimeAreEqual(request.getMessageImprintDigest(), tstInfo.getMessageImprintDigest()))
        {
            throw new TSPValidationException("response for different message imprint digest.");
        }

        if (!tstInfo.getMessageImprintAlgOID().equals(request.getMessageImprintAlgOID()))
        {
            throw new TSPValidationException("response for different message imprint algorithm.");
        }

        Attribute scV1 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificate);
        Attribute scV2 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificateV2);

        if (scV1 == null && scV2 == null)
        {
            throw new TSPValidationException("no signing certificate attribute present.");
        }

        if (scV1 != null && scV2 != null)
        {
            /*
             * RFC 5035 5.4. If both attributes exist in a single message,
             * they are independently evaluated. 
             */
        }

        if (request.getReqPolicy() != null && !request.getReqPolicy().equals(tstInfo.getPolicy()))
        {
            throw new TSPValidationException("TSA policy wrong for request.");
        }
    }
    else if (this.getStatus() == PKIStatus.GRANTED || this.getStatus() == PKIStatus.GRANTED_WITH_MODS)
    {
        throw new TSPValidationException("no time stamp token found and one expected.");
    }
}
项目:bc-java    文件:TimeStampResponse.java   
/**
 * Check this response against to see if it a well formed response for 
 * the passed in request. Validation will include checking the time stamp
 * token if the response status is GRANTED or GRANTED_WITH_MODS.
 * 
 * @param request the request to be checked against
 * @throws TSPException if the request can not match this response.
 */
public void validate(
    TimeStampRequest    request)
    throws TSPException
{
    TimeStampToken tok = this.getTimeStampToken();

    if (tok != null)
    {
        TimeStampTokenInfo  tstInfo = tok.getTimeStampInfo();

        if (request.getNonce() != null && !request.getNonce().equals(tstInfo.getNonce()))
        {
            throw new TSPValidationException("response contains wrong nonce value.");
        }

        if (this.getStatus() != PKIStatus.GRANTED && this.getStatus() != PKIStatus.GRANTED_WITH_MODS)
        {
            throw new TSPValidationException("time stamp token found in failed request.");
        }

        if (!Arrays.constantTimeAreEqual(request.getMessageImprintDigest(), tstInfo.getMessageImprintDigest()))
        {
            throw new TSPValidationException("response for different message imprint digest.");
        }

        if (!tstInfo.getMessageImprintAlgOID().equals(request.getMessageImprintAlgOID()))
        {
            throw new TSPValidationException("response for different message imprint algorithm.");
        }

        Attribute scV1 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificate);
        Attribute scV2 = tok.getSignedAttributes().get(PKCSObjectIdentifiers.id_aa_signingCertificateV2);

        if (scV1 == null && scV2 == null)
        {
            throw new TSPValidationException("no signing certificate attribute present.");
        }

        if (scV1 != null && scV2 != null)
        {
            /*
             * RFC 5035 5.4. If both attributes exist in a single message,
             * they are independently evaluated. 
             */
        }

        if (request.getReqPolicy() != null && !request.getReqPolicy().equals(tstInfo.getPolicy()))
        {
            throw new TSPValidationException("TSA policy wrong for request.");
        }
    }
    else if (this.getStatus() == PKIStatus.GRANTED || this.getStatus() == PKIStatus.GRANTED_WITH_MODS)
    {
        throw new TSPValidationException("no time stamp token found and one expected.");
    }
}