Struct X509Certificate
pub struct X509Certificate<'a> {
pub tbs_certificate: TbsCertificate<'a>,
pub signature_algorithm: AlgorithmIdentifier<'a>,
pub signature_value: BitString<'a>,
/* private fields */
}
Expand description
An X.509 v3 Certificate.
X.509 v3 certificates are defined in RFC5280, section
4.1. This object uses the same structure for content, so for ex the subject can be accessed
using the path x509.tbs_certificate.subject
.
X509Certificate
also contains convenience methods to access the most common fields (subject,
issuer, etc.). These are provided using Deref<Target = TbsCertificate>
, so documentation for
these methods can be found in the TbsCertificate
object.
A X509Certificate
is a zero-copy view over a buffer, so the lifetime is the same as the
buffer containing the binary representation.
fn display_x509_info(x509: &X509Certificate<'_>) {
let subject = x509.subject();
let issuer = x509.issuer();
println!("X.509 Subject: {}", subject);
println!("X.509 Issuer: {}", issuer);
println!("X.509 serial: {}", x509.tbs_certificate.raw_serial_as_string());
}
Fields§
§tbs_certificate: TbsCertificate<'a>
§signature_algorithm: AlgorithmIdentifier<'a>
§signature_value: BitString<'a>
Implementations§
§impl<'a> X509Certificate<'a>
impl<'a> X509Certificate<'a>
pub fn as_raw(&self) -> &'a [u8] ⓘ
pub fn as_raw(&self) -> &'a [u8] ⓘ
Return the raw ASN.1 DER content of the complete signed certificate that was parsed.
This includes the to-be-signed (TBS) certificate, the signature algorithm, and the signature.
If you want just the ASN.1 DER of the TBS certificate, prefer TbsCertificate::as_ref()
.
We avoid the AsRef
trait in this instance to ensure the full lifetime of the X509Certificate
is used.
§impl X509Certificate<'_>
impl X509Certificate<'_>
pub fn walk<V>(&self, visitor: &mut V)where
V: X509CertificateVisitor,
pub fn walk<V>(&self, visitor: &mut V)where
V: X509CertificateVisitor,
Run the provided X509CertificateVisitor
over the X.509 Certificate (self
)
Methods from Deref<Target = TbsCertificate<'a>>§
pub fn version(&self) -> X509Version
pub fn version(&self) -> X509Version
Get the version of the encoded certificate
pub fn public_key(&self) -> &SubjectPublicKeyInfo<'_>
pub fn public_key(&self) -> &SubjectPublicKeyInfo<'_>
Get the certificate public key information.
pub fn extensions(&self) -> &[X509Extension<'a>]
pub fn extensions(&self) -> &[X509Extension<'a>]
Returns the certificate extensions
pub fn iter_extensions(&self) -> impl Iterator<Item = &X509Extension<'a>>
pub fn iter_extensions(&self) -> impl Iterator<Item = &X509Extension<'a>>
Returns an iterator over the certificate extensions
pub fn get_extension_unique(
&self,
oid: &Oid<'_>,
) -> Result<Option<&X509Extension<'a>>, X509Error>
pub fn get_extension_unique( &self, oid: &Oid<'_>, ) -> Result<Option<&X509Extension<'a>>, X509Error>
Searches for an extension with the given Oid
.
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error DuplicateExtensions
if the extension is present twice or more.
pub fn find_extension(&self, oid: &Oid<'_>) -> Option<&X509Extension<'a>>
👎Deprecated since 0.13.0: Do not use this function (duplicate extensions are not checked), use get_extension_unique
pub fn find_extension(&self, oid: &Oid<'_>) -> Option<&X509Extension<'a>>
get_extension_unique
Searches for an extension with the given Oid
.
§Duplicate extensions
Note: if there are several extensions with the same Oid
, the first one is returned, masking other values.
RFC5280 forbids having duplicate extensions, but does not specify how errors should be handled.
Because of this, the find_extension
method is not safe and should not be used!
The get_extension_unique
method checks for duplicate extensions and should be
preferred.
pub fn extensions_map(
&self,
) -> Result<HashMap<Oid<'_>, &X509Extension<'a>>, X509Error>
pub fn extensions_map( &self, ) -> Result<HashMap<Oid<'_>, &X509Extension<'a>>, X509Error>
Builds and returns a map of extensions.
If an extension is present twice, this will fail and return DuplicateExtensions
.
pub fn basic_constraints(
&self,
) -> Result<Option<BasicExtension<&BasicConstraints>>, X509Error>
pub fn basic_constraints( &self, ) -> Result<Option<BasicExtension<&BasicConstraints>>, X509Error>
Attempt to get the certificate Basic Constraints extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is present twice or more.
pub fn key_usage(&self) -> Result<Option<BasicExtension<&KeyUsage>>, X509Error>
pub fn key_usage(&self) -> Result<Option<BasicExtension<&KeyUsage>>, X509Error>
Attempt to get the certificate Key Usage extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn extended_key_usage(
&self,
) -> Result<Option<BasicExtension<&ExtendedKeyUsage<'_>>>, X509Error>
pub fn extended_key_usage( &self, ) -> Result<Option<BasicExtension<&ExtendedKeyUsage<'_>>>, X509Error>
Attempt to get the certificate Extended Key Usage extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn policy_constraints(
&self,
) -> Result<Option<BasicExtension<&PolicyConstraints>>, X509Error>
pub fn policy_constraints( &self, ) -> Result<Option<BasicExtension<&PolicyConstraints>>, X509Error>
Attempt to get the certificate Policy Constraints extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn inhibit_anypolicy(
&self,
) -> Result<Option<BasicExtension<&InhibitAnyPolicy>>, X509Error>
pub fn inhibit_anypolicy( &self, ) -> Result<Option<BasicExtension<&InhibitAnyPolicy>>, X509Error>
Attempt to get the certificate Policy Constraints extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn policy_mappings(
&self,
) -> Result<Option<BasicExtension<&PolicyMappings<'_>>>, X509Error>
pub fn policy_mappings( &self, ) -> Result<Option<BasicExtension<&PolicyMappings<'_>>>, X509Error>
Attempt to get the certificate Policy Mappings extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn subject_alternative_name(
&self,
) -> Result<Option<BasicExtension<&SubjectAlternativeName<'a>>>, X509Error>
pub fn subject_alternative_name( &self, ) -> Result<Option<BasicExtension<&SubjectAlternativeName<'a>>>, X509Error>
Attempt to get the certificate Subject Alternative Name extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn name_constraints(
&self,
) -> Result<Option<BasicExtension<&NameConstraints<'_>>>, X509Error>
pub fn name_constraints( &self, ) -> Result<Option<BasicExtension<&NameConstraints<'_>>>, X509Error>
Attempt to get the certificate Name Constraints extension
Return Ok(Some(extension))
if exactly one was found, Ok(None)
if none was found,
or an error if the extension is invalid, or is present twice or more.
pub fn raw_serial(&self) -> &'a [u8] ⓘ
pub fn raw_serial(&self) -> &'a [u8] ⓘ
Get the raw bytes of the certificate serial number
pub fn raw_serial_as_string(&self) -> String
pub fn raw_serial_as_string(&self) -> String
Get a formatted string of the certificate serial number, separated by ‘:’
pub fn walk<V>(&self, visitor: &mut V)where
V: X509CertificateVisitor,
pub fn walk<V>(&self, visitor: &mut V)where
V: X509CertificateVisitor,
Run the provided visitor
over the TbsCertificate
object
Trait Implementations§
§impl<'a> AsRef<[u8]> for X509Certificate<'a>
impl<'a> AsRef<[u8]> for X509Certificate<'a>
§impl<'a> Clone for X509Certificate<'a>
impl<'a> Clone for X509Certificate<'a>
§fn clone(&self) -> X509Certificate<'a>
fn clone(&self) -> X509Certificate<'a>
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more§impl<'a> Debug for X509Certificate<'a>
impl<'a> Debug for X509Certificate<'a>
§impl<'a> Deref for X509Certificate<'a>
impl<'a> Deref for X509Certificate<'a>
§type Target = TbsCertificate<'a>
type Target = TbsCertificate<'a>
§fn deref(&self) -> &<X509Certificate<'a> as Deref>::Target
fn deref(&self) -> &<X509Certificate<'a> as Deref>::Target
§impl<'a> FromDer<'a, X509Error> for X509Certificate<'a>
impl<'a> FromDer<'a, X509Error> for X509Certificate<'a>
§fn from_der(
i: &'a [u8],
) -> Result<(&'a [u8], X509Certificate<'a>), Err<X509Error>>
fn from_der( i: &'a [u8], ) -> Result<(&'a [u8], X509Certificate<'a>), Err<X509Error>>
Parse a DER-encoded X.509 Certificate, and return the remaining of the input and the built object.
The returned object uses zero-copy, and so has the same lifetime as the input.
Note that only parsing is done, not validation.
Certificate ::= SEQUENCE { tbsCertificate TBSCertificate, signatureAlgorithm AlgorithmIdentifier, signatureValue BIT STRING }
§Example
To parse a certificate and print the subject and issuer:
let res = parse_x509_certificate(DER);
match res {
Ok((_rem, x509)) => {
let subject = x509.subject();
let issuer = x509.issuer();
println!("X.509 Subject: {}", subject);
println!("X.509 Issuer: {}", issuer);
},
_ => panic!("x509 parsing failed: {:?}", res),
}
§impl<'a> Parser<&'a [u8], X509Certificate<'a>, X509Error> for X509CertificateParser
impl<'a> Parser<&'a [u8], X509Certificate<'a>, X509Error> for X509CertificateParser
§fn parse(
&mut self,
input: &'a [u8],
) -> Result<(&'a [u8], X509Certificate<'a>), Err<X509Error>>
fn parse( &mut self, input: &'a [u8], ) -> Result<(&'a [u8], X509Certificate<'a>), Err<X509Error>>
Result
containing
either the remaining input and the output value, or an error§fn flat_map<G, H, O2>(self, g: G) -> FlatMap<Self, G, O>
fn flat_map<G, H, O2>(self, g: G) -> FlatMap<Self, G, O>
§fn and_then<G, O2>(self, g: G) -> AndThen<Self, G, O>
fn and_then<G, O2>(self, g: G) -> AndThen<Self, G, O>
§fn and<G, O2>(self, g: G) -> And<Self, G>
fn and<G, O2>(self, g: G) -> And<Self, G>
§impl<'a> PartialEq for X509Certificate<'a>
impl<'a> PartialEq for X509Certificate<'a>
impl<'a> StructuralPartialEq for X509Certificate<'a>
Auto Trait Implementations§
impl<'a> Freeze for X509Certificate<'a>
impl<'a> RefUnwindSafe for X509Certificate<'a>
impl<'a> Send for X509Certificate<'a>
impl<'a> Sync for X509Certificate<'a>
impl<'a> Unpin for X509Certificate<'a>
impl<'a> UnwindSafe for X509Certificate<'a>
Blanket Implementations§
§impl<'a, T, E> AsTaggedExplicit<'a, E> for Twhere
T: 'a,
impl<'a, T, E> AsTaggedExplicit<'a, E> for Twhere
T: 'a,
§impl<'a, T, E> AsTaggedImplicit<'a, E> for Twhere
T: 'a,
impl<'a, T, E> AsTaggedImplicit<'a, E> for Twhere
T: 'a,
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
§impl<T> FutureExt for T
impl<T> FutureExt for T
§fn with_context(self, otel_cx: Context) -> WithContext<Self> ⓘ
fn with_context(self, otel_cx: Context) -> WithContext<Self> ⓘ
§fn with_current_context(self) -> WithContext<Self> ⓘ
fn with_current_context(self) -> WithContext<Self> ⓘ
§impl<T> Instrument for T
impl<T> Instrument for T
§fn instrument(self, span: Span) -> Instrumented<Self> ⓘ
fn instrument(self, span: Span) -> Instrumented<Self> ⓘ
§fn in_current_span(self) -> Instrumented<Self> ⓘ
fn in_current_span(self) -> Instrumented<Self> ⓘ
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self> ⓘ
fn into_either(self, into_left: bool) -> Either<Self, Self> ⓘ
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self> ⓘ
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self> ⓘ
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more§impl<T> Pointable for T
impl<T> Pointable for T
§impl<T> PolicyExt for Twhere
T: ?Sized,
impl<T> PolicyExt for Twhere
T: ?Sized,
§fn and<P, B, E>(self, other: P) -> And<T, P>
fn and<P, B, E>(self, other: P) -> And<T, P>
Policy
that returns Action::Follow
only if self
and other
return
Action::Follow
. Read more§impl<T, U> RamaTryInto<U> for Twhere
U: RamaTryFrom<T>,
impl<T, U> RamaTryInto<U> for Twhere
U: RamaTryFrom<T>,
type Error = <U as RamaTryFrom<T>>::Error
fn rama_try_into(self) -> Result<U, <U as RamaTryFrom<T>>::Error>
§impl<T, U> RamaTryInto<U> for Twhere
U: RamaTryFrom<T>,
impl<T, U> RamaTryInto<U> for Twhere
U: RamaTryFrom<T>,
type Error = <U as RamaTryFrom<T>>::Error
fn rama_try_into(self) -> Result<U, <U as RamaTryFrom<T>>::Error>
Source§impl<T> ToHex for T
impl<T> ToHex for T
Source§fn encode_hex<U>(&self) -> Uwhere
U: FromIterator<char>,
fn encode_hex<U>(&self) -> Uwhere
U: FromIterator<char>,
self
into the result. Lower case
letters are used (e.g. f9b4ca
)Source§fn encode_hex_upper<U>(&self) -> Uwhere
U: FromIterator<char>,
fn encode_hex_upper<U>(&self) -> Uwhere
U: FromIterator<char>,
self
into the result. Upper case
letters are used (e.g. F9B4CA
)