1 package org.cacert.gigi.dbObjects;
4 import java.io.FileInputStream;
5 import java.io.FileOutputStream;
6 import java.io.IOException;
7 import java.io.InputStream;
8 import java.security.GeneralSecurityException;
9 import java.security.cert.CertificateFactory;
10 import java.security.cert.X509Certificate;
12 import java.util.Arrays;
13 import java.util.Collections;
14 import java.util.LinkedList;
15 import java.util.List;
17 import org.cacert.gigi.GigiApiException;
18 import org.cacert.gigi.database.DatabaseConnection;
19 import org.cacert.gigi.database.GigiPreparedStatement;
20 import org.cacert.gigi.database.GigiResultSet;
21 import org.cacert.gigi.util.Job;
22 import org.cacert.gigi.util.KeyStorage;
23 import org.cacert.gigi.util.Notary;
25 public class Certificate {
28 EMAIL("email"), DNS("DNS");
30 private final String opensslName;
32 private SANType(String opensslName) {
33 this.opensslName = opensslName;
36 public String getOpensslName() {
41 public static class SubjectAlternateName implements Comparable<SubjectAlternateName> {
47 public SubjectAlternateName(SANType type, String name) {
52 public String getName() {
56 public SANType getType() {
61 public int compareTo(SubjectAlternateName o) {
62 int i = type.compareTo(o.type);
66 return name.compareTo(o.name);
70 public int hashCode() {
73 result = prime * result + ((name == null) ? 0 : name.hashCode());
74 result = prime * result + ((type == null) ? 0 : type.hashCode());
79 public boolean equals(Object obj) {
86 if (getClass() != obj.getClass()) {
89 SubjectAlternateName other = (SubjectAlternateName) obj;
91 if (other.name != null) {
94 } else if ( !name.equals(other.name)) {
97 if (type != other.type) {
105 public enum CSRType {
113 private String serial;
119 private String csrName;
121 private String crtName;
123 private String csr = null;
125 private CSRType csrType;
127 private List<SubjectAlternateName> sans;
129 private CertificateProfile profile;
131 public Certificate(User owner, String dn, String md, String csr, CSRType csrType, CertificateProfile profile, SubjectAlternateName... sans) {
136 this.csrType = csrType;
137 this.profile = profile;
138 this.sans = Arrays.asList(sans);
141 private Certificate(String serial) {
142 GigiPreparedStatement ps = DatabaseConnection.getInstance().prepare("SELECT id,subject, md, csr_name, crt_name,memid, profile FROM `certs` WHERE serial=?");
143 ps.setString(1, serial);
144 GigiResultSet rs = ps.executeQuery();
146 throw new IllegalArgumentException("Invalid mid " + serial);
148 this.id = rs.getInt(1);
149 dn = rs.getString(2);
150 md = rs.getString(3);
151 csrName = rs.getString(4);
152 crtName = rs.getString(5);
153 owner = User.getById(rs.getInt(6));
154 profile = CertificateProfile.getById(rs.getInt(7));
155 this.serial = serial;
157 GigiPreparedStatement ps2 = DatabaseConnection.getInstance().prepare("SELECT contents, type FROM `subjectAlternativeNames` WHERE certId=?");
159 GigiResultSet rs2 = ps2.executeQuery();
160 sans = new LinkedList<>();
162 sans.add(new SubjectAlternateName(SANType.valueOf(rs2.getString("type").toUpperCase()), rs2.getString("contents")));
169 public enum CertificateStatus {
171 * This certificate is not in the database, has no id and only exists as
176 * The certificate has been signed. It is stored in the database.
177 * {@link Certificate#cert()} is valid.
182 * The certificate has been revoked.
187 * If this certificate cannot be updated because an error happened in
192 private CertificateStatus() {}
196 public CertificateStatus getStatus() {
198 return CertificateStatus.DRAFT;
200 GigiPreparedStatement searcher = DatabaseConnection.getInstance().prepare("SELECT crt_name, created, revoked, serial FROM certs WHERE id=?");
201 searcher.setInt(1, id);
202 GigiResultSet rs = searcher.executeQuery();
204 throw new IllegalStateException("Certificate not in Database");
207 crtName = rs.getString(1);
208 serial = rs.getString(4);
209 if (rs.getTime(2) == null) {
210 return CertificateStatus.DRAFT;
212 if (rs.getTime(2) != null && rs.getTime(3) == null) {
213 return CertificateStatus.ISSUED;
215 return CertificateStatus.REVOKED;
220 * the date from which on the certificate should be valid. (or
221 * null if it should be valid instantly)
223 * the period for which the date should be valid. (a
224 * <code>yyyy-mm-dd</code> or a "2y" (2 calendar years), "6m" (6
226 * @return A job which can be used to monitor the progress of this task.
227 * @throws IOException
228 * for problems with writing the CSR/SPKAC
229 * @throws GigiApiException
230 * if the period is bogus
232 public Job issue(Date start, String period) throws IOException, GigiApiException {
233 if (getStatus() != CertificateStatus.DRAFT) {
234 throw new IllegalStateException();
236 Notary.writeUserAgreement(owner, "CCA", "issue certificate", "", true, 0);
238 GigiPreparedStatement inserter = DatabaseConnection.getInstance().prepare("INSERT INTO certs SET md=?, subject=?, csr_type=?, crt_name='', memid=?, profile=?");
239 inserter.setString(1, md);
240 inserter.setString(2, dn);
241 inserter.setString(3, csrType.toString());
242 inserter.setInt(4, owner.getId());
243 inserter.setInt(5, profile.getId());
245 id = inserter.lastInsertId();
246 File csrFile = KeyStorage.locateCsr(id);
247 csrName = csrFile.getPath();
248 FileOutputStream fos = new FileOutputStream(csrFile);
249 fos.write(csr.getBytes());
252 // TODO draft to insert SANs
253 GigiPreparedStatement san = DatabaseConnection.getInstance().prepare("INSERT INTO subjectAlternativeNames SET certId=?, contents=?, type=?");
254 for (SubjectAlternateName subjectAlternateName : sans) {
256 san.setString(2, subjectAlternateName.getName());
257 san.setString(3, subjectAlternateName.getType().getOpensslName());
261 GigiPreparedStatement updater = DatabaseConnection.getInstance().prepare("UPDATE certs SET csr_name=? WHERE id=?");
262 updater.setString(1, csrName);
263 updater.setInt(2, id);
265 return Job.sign(this, start, period);
269 public Job revoke() {
270 if (getStatus() != CertificateStatus.ISSUED) {
271 throw new IllegalStateException();
273 return Job.revoke(this);
277 public X509Certificate cert() throws IOException, GeneralSecurityException {
278 CertificateStatus status = getStatus();
279 if (status != CertificateStatus.ISSUED) {
280 throw new IllegalStateException(status + " is not wanted here.");
282 InputStream is = null;
283 X509Certificate crt = null;
285 is = new FileInputStream(crtName);
286 CertificateFactory cf = CertificateFactory.getInstance("X.509");
287 crt = (X509Certificate) cf.generateCertificate(is);
296 public Certificate renew() {
304 public String getSerial() {
310 public String getDistinguishedName() {
314 public String getMessageDigest() {
318 public User getOwner() {
322 public List<SubjectAlternateName> getSANs() {
323 return Collections.unmodifiableList(sans);
326 public CertificateProfile getProfile() {
330 public static Certificate getBySerial(String serial) {
333 return new Certificate(serial);
334 } catch (IllegalArgumentException e) {