1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189
//! [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](./LICENSE-MIT) //! [![Apache License 2.0](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](./LICENSE-APACHE) //! [![docs.rs](https://docs.rs/x509-parser/badge.svg)](https://docs.rs/x509-parser) //! [![crates.io](https://img.shields.io/crates/v/x509-parser.svg)](https://crates.io/crates/x509-parser) //! [![Download numbers](https://img.shields.io/crates/d/x509-parser.svg)](https://crates.io/crates/x509-parser) //! [![Github CI](https://github.com/rusticata/x509-parser/workflows/Continuous%20integration/badge.svg)](https://github.com/rusticata/x509-parser/actions) //! [![Minimum rustc version](https://img.shields.io/badge/rustc-1.45.0+-lightgray.svg)](#rust-version-requirements) //! //! # X.509 Parser //! //! A X.509 v3 ([RFC5280]) parser, implemented with the [nom](https://github.com/Geal/nom) //! parser combinator framework. //! //! It is written in pure Rust, fast, and makes extensive use of zero-copy. A lot of care is taken //! to ensure security and safety of this crate, including design (recursion limit, defensive //! programming), tests, and fuzzing. It also aims to be panic-free. //! //! The code is available on [Github](https://github.com/rusticata/x509-parser) //! and is part of the [Rusticata](https://github.com/rusticata) project. //! //! Certificates are usually encoded in two main formats: PEM (usually the most common format) or //! DER. A PEM-encoded certificate is a container, storing a DER object. See the //! [`pem`](pem/index.html) module for more documentation. //! //! To decode a DER-encoded certificate, the main parsing method is //! [`parse_x509_certificate`](fn.parse_x509_certificate.html), which builds a //! [`X509Certificate`](x509/struct.X509Certificate.html) object. //! //! The returned objects for parsers follow the definitions of the RFC. This means that accessing //! fields is done by accessing struct members recursively. Some helper functions are provided, for //! example [X509Certificate::issuer()](x509/struct.X509Certificate.html#method.issuer) returns the //! same as accessing `<object>.tbs_certificate.issuer`. //! //! For PEM-encoded certificates, use the [`pem`](pem/index.html) module. //! //! # Examples //! //! Parsing a certificate in DER format: //! //! ```rust //! use x509_parser::prelude::*; //! //! static IGCA_DER: &[u8] = include_bytes!("../assets/IGC_A.der"); //! //! # fn main() { //! let res = parse_x509_certificate(IGCA_DER); //! match res { //! Ok((rem, cert)) => { //! assert!(rem.is_empty()); //! // //! assert_eq!(cert.tbs_certificate.version, X509Version::V3); //! }, //! _ => panic!("x509 parsing failed: {:?}", res), //! } //! # } //! ``` //! //! To parse a CRL and print information about revoked certificates: //! //! ```rust //! # use x509_parser::parse_x509_crl; //! # //! # static DER: &[u8] = include_bytes!("../assets/example.crl"); //! # //! # fn main() { //! let res = parse_x509_crl(DER); //! match res { //! Ok((_rem, crl)) => { //! for revoked in crl.iter_revoked_certificates() { //! println!("Revoked certificate serial: {}", revoked.raw_serial_as_string()); //! println!(" Reason: {}", revoked.reason_code().unwrap_or_default().1); //! } //! }, //! _ => panic!("CRL parsing failed: {:?}", res), //! } //! # } //! ``` //! //! See also `examples/print-cert.rs`. //! //! # Features //! //! - The `verify` feature adds support for (cryptographic) signature verification, based on `ring`. //! It adds the //! [X509Certificate::verify_signature()](x509/struct.X509Certificate.html#method.verify_signature) //! to `X509Certificate`. //! //! ```rust //! # #[cfg(feature = "verify")] //! # use x509_parser::certificate::X509Certificate; //! /// Cryptographic signature verification: returns true if certificate was signed by issuer //! #[cfg(feature = "verify")] //! pub fn check_signature(cert: &X509Certificate<'_>, issuer: &X509Certificate<'_>) -> bool { //! let issuer_public_key = &issuer.tbs_certificate.subject_pki; //! cert //! .verify_signature(Some(issuer_public_key)) //! .is_ok() //! } //! ``` //! //! ## Rust version requirements //! //! `x509-parser` requires **Rustc version 1.45 or greater**, based on nom 6 //! dependencies and for proc-macro attributes support. //! //! [RFC5280]: https://tools.ietf.org/html/rfc5280 #![deny(/*missing_docs,*/ unstable_features, unused_import_braces, unused_qualifications)] #![warn( missing_debug_implementations, /* missing_docs, rust_2018_idioms,*/ unreachable_pub )] #![forbid(unsafe_code)] #![deny(broken_intra_doc_links)] #![doc(test( no_crate_inject, attr(deny(warnings, rust_2018_idioms), allow(dead_code, unused_variables)) ))] #![cfg_attr(docsrs, feature(doc_cfg))] pub mod certificate; pub mod certification_request; pub mod cri_attributes; pub mod error; pub mod extensions; pub mod objects; pub mod pem; pub mod prelude; pub mod revocation_list; pub mod time; pub mod x509; // reexports pub use der_parser; pub use der_parser::num_bigint; pub use nom; pub use oid_registry; use certificate::X509Certificate; use error::X509Result; use revocation_list::CertificateRevocationList; /// Parse a **DER-encoded** X.509 Certificate, and return the remaining of the input and the built /// object. /// /// /// This function is an alias to [X509Certificate::from_der](x509/struct.X509Certificate.html#method.from_der). See this function /// for more information. /// /// For PEM-encoded certificates, use the [`pem`](pem/index.html) module. #[inline] pub fn parse_x509_certificate<'a>(i: &'a [u8]) -> X509Result<X509Certificate<'a>> { X509Certificate::from_der(i) } /// Parse a DER-encoded X.509 v2 CRL, and return the remaining of the input and the built /// object. /// /// This function is an alias to [CertificateRevocationList::from_der](x509/struct.CertificateRevocationList.html#method.from_der). See this function /// for more information. #[inline] pub fn parse_x509_crl(i: &[u8]) -> X509Result<CertificateRevocationList> { CertificateRevocationList::from_der(i) } /// Parse a DER-encoded X.509 Certificate, and return the remaining of the input and the built #[deprecated( since = "0.9.0", note = "please use `parse_x509_certificate` or `X509Certificate::from_der` instead" )] #[inline] pub fn parse_x509_der<'a>(i: &'a [u8]) -> X509Result<X509Certificate<'a>> { X509Certificate::from_der(i) } /// Parse a DER-encoded X.509 v2 CRL, and return the remaining of the input and the built /// object. #[deprecated( since = "0.9.0", note = "please use `parse_x509_crl` or `CertificateRevocationList::from_der` instead" )] #[inline] pub fn parse_crl_der(i: &[u8]) -> X509Result<CertificateRevocationList> { CertificateRevocationList::from_der(i) }