Coverage Report

Created: 2025-12-28 06:31

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/rust/registry/src/index.crates.io-1949cf8c6b5b557f/x509-parser-0.17.0/src/extensions/sct.rs
Line
Count
Source
1
//! Certificate transparency [RFC6962](https://datatracker.ietf.org/doc/html/rfc6962)
2
//!
3
//! Code borrowed from tls-parser crate (file <https://github.com/rusticata/tls-parser/blob/tls-parser-0.11.0/src/certificate_transparency.rs>)
4
5
use std::convert::TryInto;
6
7
use asn1_rs::FromDer;
8
use der_parser::error::BerError;
9
use nom::bytes::streaming::take;
10
use nom::combinator::{complete, map_parser};
11
use nom::multi::{length_data, many1};
12
use nom::number::streaming::{be_u16, be_u64, be_u8};
13
use nom::IResult;
14
15
#[derive(Clone, Debug, PartialEq, Eq)]
16
pub struct SignedCertificateTimestamp<'a> {
17
    pub version: CtVersion,
18
    pub id: CtLogID<'a>,
19
    pub timestamp: u64,
20
    pub extensions: CtExtensions<'a>,
21
    pub signature: DigitallySigned<'a>,
22
}
23
24
/// Certificate Transparency Version as defined in
25
/// [RFC6962 Section 3.2](https://datatracker.ietf.org/doc/html/rfc6962#section-3.2)
26
#[derive(Clone, Copy, Debug, PartialEq, Eq)]
27
pub struct CtVersion(pub u8);
28
29
impl CtVersion {
30
    pub const V1: CtVersion = CtVersion(0);
31
}
32
33
/// LogID as defined in
34
/// [RFC6962 Section 3.2](https://datatracker.ietf.org/doc/html/rfc6962#section-3.2)
35
#[derive(Clone, Debug, PartialEq, Eq)]
36
pub struct CtLogID<'a> {
37
    pub key_id: &'a [u8; 32],
38
}
39
40
/// CtExtensions as defined in
41
/// [RFC6962 Section 3.2](https://datatracker.ietf.org/doc/html/rfc6962#section-3.2)
42
#[derive(Clone, Debug, PartialEq, Eq)]
43
pub struct CtExtensions<'a>(pub &'a [u8]);
44
45
#[derive(Clone, Debug, PartialEq, Eq)]
46
pub struct DigitallySigned<'a> {
47
    pub hash_alg_id: u8,
48
    pub sign_alg_id: u8,
49
    pub data: &'a [u8],
50
}
51
52
/// Parses a list of Signed Certificate Timestamp entries
53
0
pub fn parse_ct_signed_certificate_timestamp_list(
54
0
    i: &[u8],
55
0
) -> IResult<&[u8], Vec<SignedCertificateTimestamp>, BerError> {
56
    // use nom::HexDisplay;
57
    // eprintln!("{}", i.to_hex(16));
58
0
    let (rem, b) = <&[u8]>::from_der(i)?;
59
0
    let (b, sct_len) = be_u16(b)?;
60
0
    let (_, sct_list) = map_parser(
61
0
        take(sct_len as usize),
62
0
        many1(complete(parse_ct_signed_certificate_timestamp)),
63
0
    )(b)?;
64
0
    Ok((rem, sct_list))
65
0
}
66
67
/// Parses as single Signed Certificate Timestamp entry
68
0
pub fn parse_ct_signed_certificate_timestamp(
69
0
    i: &[u8],
70
0
) -> IResult<&[u8], SignedCertificateTimestamp, BerError> {
71
0
    map_parser(
72
0
        length_data(be_u16),
73
0
        parse_ct_signed_certificate_timestamp_content,
74
0
    )(i)
75
0
}
76
77
0
pub(crate) fn parse_ct_signed_certificate_timestamp_content(
78
0
    i: &[u8],
79
0
) -> IResult<&[u8], SignedCertificateTimestamp, BerError> {
80
0
    let (i, version) = be_u8(i)?;
81
0
    let (i, id) = parse_log_id(i)?;
82
0
    let (i, timestamp) = be_u64(i)?;
83
0
    let (i, extensions) = parse_ct_extensions(i)?;
84
0
    let (i, signature) = parse_digitally_signed(i)?;
85
0
    let sct = SignedCertificateTimestamp {
86
0
        version: CtVersion(version),
87
0
        id,
88
0
        timestamp,
89
0
        extensions,
90
0
        signature,
91
0
    };
92
0
    Ok((i, sct))
93
0
}
94
95
// Safety: cannot fail, take() returns exactly 32 bytes
96
0
fn parse_log_id(i: &[u8]) -> IResult<&[u8], CtLogID, BerError> {
97
0
    let (i, key_id) = take(32usize)(i)?;
98
0
    Ok((
99
0
        i,
100
0
        CtLogID {
101
0
            key_id: key_id
102
0
                .try_into()
103
0
                .expect("take(32) is in sync with key_id size"),
104
0
        },
105
0
    ))
106
0
}
107
108
0
fn parse_ct_extensions(i: &[u8]) -> IResult<&[u8], CtExtensions, BerError> {
109
0
    let (i, ext_len) = be_u16(i)?;
110
0
    let (i, ext_data) = take(ext_len as usize)(i)?;
111
0
    Ok((i, CtExtensions(ext_data)))
112
0
}
113
114
0
fn parse_digitally_signed(i: &[u8]) -> IResult<&[u8], DigitallySigned, BerError> {
115
0
    let (i, hash_alg_id) = be_u8(i)?;
116
0
    let (i, sign_alg_id) = be_u8(i)?;
117
0
    let (i, data) = length_data(be_u16)(i)?;
118
0
    let signed = DigitallySigned {
119
0
        hash_alg_id,
120
0
        sign_alg_id,
121
0
        data,
122
0
    };
123
0
    Ok((i, signed))
124
0
}