pub struct X509Extension<'a> {
pub oid: Oid<'a>,
pub critical: bool,
pub value: &'a [u8],
/* private fields */
}
Expand description
X.509 version 3 extension
X.509 extensions allow adding attributes to objects like certificates or revocation lists.
Each extension in a certificate is designated as either critical or non-critical. A certificate using system MUST reject the certificate if it encounters a critical extension it does not recognize; however, a non-critical extension MAY be ignored if it is not recognized.
Each extension includes an OID and an ASN.1 structure. When an extension appears in a certificate, the OID appears as the field extnID and the corresponding ASN.1 encoded structure is the value of the octet string extnValue. A certificate MUST NOT include more than one instance of a particular extension.
When parsing an extension, the global extension structure (described above) is parsed,
and the object is returned if it succeeds.
During this step, it also attempts to parse the content of the extension, if known.
The returned object has a
X509Extension::parsed_extension()
method. The returned
enum is either a known extension, or the special value ParsedExtension::UnsupportedExtension
.
§Example
use x509_parser::prelude::FromDer;
use x509_parser::extensions::{X509Extension, ParsedExtension};
static DER: &[u8] = &[
0x30, 0x1D, 0x06, 0x03, 0x55, 0x1D, 0x0E, 0x04, 0x16, 0x04, 0x14, 0xA3, 0x05, 0x2F, 0x18,
0x60, 0x50, 0xC2, 0x89, 0x0A, 0xDD, 0x2B, 0x21, 0x4F, 0xFF, 0x8E, 0x4E, 0xA8, 0x30, 0x31,
0x36 ];
let res = X509Extension::from_der(DER);
match res {
Ok((_rem, ext)) => {
println!("Extension OID: {}", ext.oid);
println!(" Critical: {}", ext.critical);
let parsed_ext = ext.parsed_extension();
assert!(!parsed_ext.unsupported());
assert!(parsed_ext.error().is_none());
if let ParsedExtension::SubjectKeyIdentifier(key_id) = parsed_ext {
assert!(key_id.0.len() > 0);
} else {
panic!("Extension has wrong type");
}
},
_ => panic!("x509 extension parsing failed: {:?}", res),
}
Fields§
§oid: Oid<'a>
OID describing the extension content
critical: bool
Boolean value describing the ‘critical’ attribute of the extension
An extension includes the boolean critical, with a default value of FALSE.
value: &'a [u8]
Raw content of the extension
Implementations§
Source§impl<'a> X509Extension<'a>
impl<'a> X509Extension<'a>
Sourcepub const fn new(
oid: Oid<'a>,
critical: bool,
value: &'a [u8],
parsed_extension: ParsedExtension<'a>,
) -> X509Extension<'a>
pub const fn new( oid: Oid<'a>, critical: bool, value: &'a [u8], parsed_extension: ParsedExtension<'a>, ) -> X509Extension<'a>
Creates a new extension with the provided values.
Sourcepub fn parsed_extension(&self) -> &ParsedExtension<'a>
pub fn parsed_extension(&self) -> &ParsedExtension<'a>
Return the extension type or UnsupportedExtension
if the extension is not implemented.
Examples found in repository?
36fn print_x509_extension(oid: &Oid, ext: &X509Extension, level: usize) {
37 match ext.parsed_extension() {
38 ParsedExtension::CRLNumber(num) => {
39 println!("{:indent$}X509v3 CRL Number: {}", "", num, indent = level);
40 }
41 ParsedExtension::ReasonCode(code) => {
42 println!(
43 "{:indent$}X509v3 CRL Reason Code: {}",
44 "",
45 code,
46 indent = level
47 );
48 }
49 ParsedExtension::InvalidityDate(date) => {
50 println!("{:indent$}Invalidity Date: {}", "", date, indent = level);
51 }
52 ParsedExtension::AuthorityKeyIdentifier(aki) => {
53 println!(
54 "{:indent$}X509v3 Authority Key Identifier:",
55 "",
56 indent = level
57 );
58 print_authority_key_identifier(aki, level + 2);
59 }
60 x => {
61 print!("{:indent$}{}:", "", format_oid(oid), indent = level);
62 print!(" Critical={}", ext.critical);
63 print!(" len={}", ext.value.len());
64 println!();
65 println!(" {:indent$}{:?}", "", x, indent = level);
66 }
67 }
68}
More examples
46fn print_x509_extension(oid: &Oid, ext: &X509Extension) {
47 println!(
48 " [crit:{} l:{}] {}: ",
49 ext.critical,
50 ext.value.len(),
51 format_oid(oid)
52 );
53 match ext.parsed_extension() {
54 ParsedExtension::AuthorityKeyIdentifier(aki) => {
55 println!(" X509v3 Authority Key Identifier");
56 if let Some(key_id) = &aki.key_identifier {
57 println!(" Key Identifier: {:x}", key_id);
58 }
59 if let Some(issuer) = &aki.authority_cert_issuer {
60 for name in issuer {
61 println!(" Cert Issuer: {}", name);
62 }
63 }
64 if let Some(serial) = aki.authority_cert_serial {
65 println!(" Cert Serial: {}", format_serial(serial));
66 }
67 }
68 ParsedExtension::BasicConstraints(bc) => {
69 println!(" X509v3 CA: {}", bc.ca);
70 }
71 ParsedExtension::CRLDistributionPoints(points) => {
72 println!(" X509v3 CRL Distribution Points:");
73 for point in points.iter() {
74 if let Some(name) = &point.distribution_point {
75 println!(" Full Name: {:?}", name);
76 }
77 if let Some(reasons) = &point.reasons {
78 println!(" Reasons: {}", reasons);
79 }
80 if let Some(crl_issuer) = &point.crl_issuer {
81 print!(" CRL Issuer: ");
82 for gn in crl_issuer {
83 print!("{} ", generalname_to_string(gn));
84 }
85 println!();
86 }
87 println!();
88 }
89 }
90 ParsedExtension::KeyUsage(ku) => {
91 println!(" X509v3 Key Usage: {}", ku);
92 }
93 ParsedExtension::NSCertType(ty) => {
94 println!(" Netscape Cert Type: {}", ty);
95 }
96 ParsedExtension::SubjectAlternativeName(san) => {
97 for name in &san.general_names {
98 let s = match name {
99 GeneralName::DNSName(s) => {
100 format!("DNS:{}", s)
101 }
102 GeneralName::IPAddress(b) => {
103 let ip = match b.len() {
104 4 => {
105 let b = <[u8; 4]>::try_from(*b).unwrap();
106 let ip = Ipv4Addr::from(b);
107 format!("{}", ip)
108 }
109 16 => {
110 let b = <[u8; 16]>::try_from(*b).unwrap();
111 let ip = Ipv6Addr::from(b);
112 format!("{}", ip)
113 }
114 l => format!("invalid (len={})", l),
115 };
116 format!("IP Address:{}", ip)
117 }
118 _ => {
119 format!("{:?}", name)
120 }
121 };
122 println!(" X509v3 SAN: {}", s);
123 }
124 }
125 ParsedExtension::SubjectKeyIdentifier(id) => {
126 println!(" X509v3 Subject Key Identifier: {:x}", id);
127 }
128 x => println!(" {:?}", x),
129 }
130}
Trait Implementations§
Source§impl<'a> Clone for X509Extension<'a>
impl<'a> Clone for X509Extension<'a>
Source§fn clone(&self) -> X509Extension<'a>
fn clone(&self) -> X509Extension<'a>
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl<'a> Debug for X509Extension<'a>
impl<'a> Debug for X509Extension<'a>
Source§impl<'a> FromDer<'a, X509Error> for X509Extension<'a>
Extension ::= SEQUENCE {
extnID OBJECT IDENTIFIER,
critical BOOLEAN DEFAULT FALSE,
extnValue OCTET STRING }
impl<'a> FromDer<'a, X509Error> for X509Extension<'a>
Extension ::= SEQUENCE { extnID OBJECT IDENTIFIER, critical BOOLEAN DEFAULT FALSE, extnValue OCTET STRING }
Source§fn from_der(i: &'a [u8]) -> X509Result<'a, Self>
fn from_der(i: &'a [u8]) -> X509Result<'a, Self>
Source§impl<'a> Parser<&'a [u8], X509Extension<'a>, X509Error> for X509ExtensionParser
impl<'a> Parser<&'a [u8], X509Extension<'a>, X509Error> for X509ExtensionParser
Source§fn parse(
&mut self,
input: &'a [u8],
) -> IResult<&'a [u8], X509Extension<'a>, X509Error>
fn parse( &mut self, input: &'a [u8], ) -> IResult<&'a [u8], X509Extension<'a>, X509Error>
Result
containing
either the remaining input and the output value, or an error