diff --git a/src/crl.rs b/src/crl.rs index ad431600..c2e9a355 100644 --- a/src/crl.rs +++ b/src/crl.rs @@ -4,13 +4,10 @@ use time::OffsetDateTime; use yasna::DERWriter; use yasna::Tag; -use crate::oid::*; +use crate::ext::Extensions; #[cfg(feature = "pem")] use crate::ENCODE_CONFIG; -use crate::{ - write_distinguished_name, write_dt_utc_or_generalized, write_x509_authority_key_identifier, - write_x509_extension, -}; +use crate::{ext, write_distinguished_name, write_dt_utc_or_generalized}; use crate::{ Certificate, KeyIdMethod, KeyUsagePurpose, RcgenError, SerialNumber, SignatureAlgorithm, }; @@ -247,37 +244,40 @@ impl CertificateRevocationListParams { // RFC 5280 §5.1.2.7: // This field may only appear if the version is 2 (Section 5.1.2.1). If // present, this field is a sequence of one or more CRL extensions. - // RFC 5280 §5.2: - // Conforming CRL issuers are REQUIRED to include the authority key - // identifier (Section 5.2.1) and the CRL number (Section 5.2.3) - // extensions in all CRLs issued. writer.next().write_tagged(Tag::context(0), |writer| { - writer.write_sequence(|writer| { - // Write authority key identifier. - write_x509_authority_key_identifier(writer.next(), ca); - - // Write CRL number. - write_x509_extension(writer.next(), OID_CRL_NUMBER, false, |writer| { - writer.write_bigint_bytes(self.crl_number.as_ref(), true); - }); - - // Write issuing distribution point (if present). - if let Some(issuing_distribution_point) = &self.issuing_distribution_point { - write_x509_extension( - writer.next(), - OID_CRL_ISSUING_DISTRIBUTION_POINT, - true, - |writer| { - issuing_distribution_point.write_der(writer); - }, - ); - } - }); + self.extensions(ca).write_der(writer); }); Ok(()) }) } + /// Returns the X.509 extensions that the [CertificateRevocationListParams] describe. + /// + /// Additional extensions specific to the issuer [Certificate] will also be included + /// (e.g. the authority key identifier). + fn extensions(&self, issuer: &Certificate) -> Extensions { + let mut exts = Extensions::default(); + + // RFC 5280 §5.2: + // Conforming CRL issuers are REQUIRED to include the authority key + // identifier (Section 5.2.1) and the CRL number (Section 5.2.3) + // extensions in all CRLs issued. + // Safety: `exts` is empty at this point - there can be no duplicate AKI ext OID. + exts.add_extension(ext::authority_key_identifier(issuer)) + .unwrap(); + + // Safety: there can be no duplicate CRL number ext OID. + exts.add_extension(ext::crl_number(&self.crl_number)) + .unwrap(); + + if let Some(distribution_point) = &self.issuing_distribution_point { + // Safety: there can be no duplicate IDP ext OID. + exts.add_extension(ext::issuing_distribution_point(distribution_point)) + .unwrap(); + } + + exts + } } /// A certificate revocation list (CRL) issuing distribution point, to be included in a CRL's @@ -291,7 +291,7 @@ pub struct CrlIssuingDistributionPoint { } impl CrlIssuingDistributionPoint { - fn write_der(&self, writer: DERWriter) { + pub(crate) fn write_der(&self, writer: DERWriter) { // IssuingDistributionPoint SEQUENCE writer.write_sequence(|writer| { // distributionPoint [0] DistributionPointName OPTIONAL @@ -361,31 +361,27 @@ impl RevokedCertParams { // optional for conforming CRL issuers and applications. However, CRL // issuers SHOULD include reason codes (Section 5.3.1) and invalidity // dates (Section 5.3.2) whenever this information is available. - let has_reason_code = - matches!(self.reason_code, Some(reason) if reason != RevocationReason::Unspecified); - let has_invalidity_date = self.invalidity_date.is_some(); - if has_reason_code || has_invalidity_date { - writer.next().write_sequence(|writer| { - // Write reason code if present. - self.reason_code.map(|reason_code| { - write_x509_extension(writer.next(), OID_CRL_REASONS, false, |writer| { - writer.write_enum(reason_code as i64); - }); - }); - - // Write invalidity date if present. - self.invalidity_date.map(|invalidity_date| { - write_x509_extension( - writer.next(), - OID_CRL_INVALIDITY_DATE, - false, - |writer| { - write_dt_utc_or_generalized(writer, invalidity_date); - }, - ) - }); - }); + let extensions = self.extensions(); + if !extensions.is_empty() { + extensions.write_der(writer.next()); } }) } + /// Returns the X.509 extensions that the [RevokedCertParams] describe. + fn extensions(&self) -> Extensions { + let mut exts = Extensions::default(); + + if let Some(code) = self.reason_code { + // Safety: there can be no duplicate reason code ext OID. + exts.add_extension(ext::reason_code(code)).unwrap(); + } + + if let Some(invalidity_date) = self.invalidity_date { + // Safety: there can be no duplicate invalidity date ext OID. + exts.add_extension(ext::invalidity_date(invalidity_date)) + .unwrap(); + } + + exts + } } diff --git a/src/csr.rs b/src/csr.rs index 62ad99f4..0fc36d21 100644 --- a/src/csr.rs +++ b/src/csr.rs @@ -1,5 +1,5 @@ #[cfg(feature = "x509-parser")] -use crate::{DistinguishedName, SanType}; +use crate::{CustomExtension, DistinguishedName, SanType}; #[cfg(feature = "pem")] use pem::Pem; use std::hash::Hash; @@ -67,17 +67,48 @@ impl CertificateSigningRequest { params.distinguished_name = DistinguishedName::from_name(&info.subject)?; let raw = info.subject_pki.subject_public_key.data.to_vec(); - if let Some(extensions) = csr.requested_extensions() { - for ext in extensions { - match ext { + // Pull out the extension requests attributes from the CSR. + // Note: we avoid using csr.requested_extensions() here because it maps to the parsed + // extension value and we want the raw extension value to handle unknown extensions + // ourselves. + let requested_exts = csr + .certification_request_info + .iter_attributes() + .filter_map(|attr| { + if let x509_parser::prelude::ParsedCriAttribute::ExtensionRequest(requested) = + &attr.parsed_attribute() + { + Some(requested.extensions.iter().collect::>()) + } else { + None + } + }) + .flatten() + .collect::>(); + + if !requested_exts.is_empty() { + for ext in requested_exts { + let supported = match ext.parsed_extension() { x509_parser::extensions::ParsedExtension::SubjectAlternativeName(san) => { for name in &san.general_names { params .subject_alt_names .push(SanType::try_from_general(name)?); } + true + }, + x509_parser::extensions::ParsedExtension::SubjectKeyIdentifier(ski) => { + params.key_identifier = ski.0.to_vec(); + true }, - _ => return Err(RcgenError::UnsupportedExtension), + _ => false, + }; + if !supported { + params.custom_extensions.push(CustomExtension { + oid: ext.oid.iter().unwrap().collect(), + critical: ext.critical, + content: ext.value.to_vec(), + }) } } } diff --git a/src/error.rs b/src/error.rs index 40982430..9f8d6bac 100644 --- a/src/error.rs +++ b/src/error.rs @@ -5,45 +5,47 @@ use std::fmt; #[non_exhaustive] /// The error type of the rcgen crate pub enum RcgenError { + /// The provided certificate's signature algorithm + /// is incompatible with the given key pair + CertificateKeyPairMismatch, /// The given certificate couldn't be parsed CouldNotParseCertificate, /// The given certificate signing request couldn't be parsed CouldNotParseCertificationRequest, /// The given key pair couldn't be parsed CouldNotParseKeyPair, - #[cfg(feature = "x509-parser")] - /// Invalid subject alternative name type - InvalidNameType, + /// Duplicate extension OID + DuplicateExtension(String), + /// Invalid certificate revocation list (CRL) next update. + InvalidCrlNextUpdate, /// An IP address was provided as a byte array, but the byte array was an invalid length. InvalidIpAddressOctetLength(usize), + /// Invalid subject alternative name type + #[cfg(feature = "x509-parser")] + InvalidNameType, + /// CRL issuer specifies Key Usages that don't include cRLSign. + IssuerNotCrlSigner, /// There is no support for generating /// keys for the given algorithm KeyGenerationUnavailable, - #[cfg(feature = "x509-parser")] - /// Unsupported extension requested in CSR - UnsupportedExtension, - /// The requested signature algorithm is not supported - UnsupportedSignatureAlgorithm, - /// Unspecified `ring` error - RingUnspecified, - /// The `ring` library rejected the key upon loading - RingKeyRejected(&'static str), - /// The provided certificate's signature algorithm - /// is incompatible with the given key pair - CertificateKeyPairMismatch, - /// Time conversion related errors - Time, - #[cfg(feature = "pem")] /// Error from the pem crate + #[cfg(feature = "pem")] PemError(pem::PemError), /// Error generated by a remote key operation RemoteKeyError, + /// The `ring` library rejected the key upon loading + RingKeyRejected(&'static str), + /// Unspecified `ring` error + RingUnspecified, + /// Time conversion related errors + Time, + /// Unsupported extension requested in CSR + #[cfg(feature = "x509-parser")] + UnsupportedExtension, /// Unsupported field when generating a CSR UnsupportedInCsr, - /// Invalid certificate revocation list (CRL) next update. - InvalidCrlNextUpdate, - /// CRL issuer specifies Key Usages that don't include cRLSign. - IssuerNotCrlSigner, + /// The requested signature algorithm is not supported + UnsupportedSignatureAlgorithm, } impl fmt::Display for RcgenError { @@ -92,6 +94,9 @@ impl fmt::Display for RcgenError { f, "CRL issuer must specify no key usage, or key usage including cRLSign" )?, + DuplicateExtension(oid) => { + write!(f, "Extension with OID {oid} present multiple times")? + }, }; Ok(()) } diff --git a/src/ext.rs b/src/ext.rs new file mode 100644 index 00000000..f10161a0 --- /dev/null +++ b/src/ext.rs @@ -0,0 +1,436 @@ +use std::collections::BTreeMap; +use std::net::IpAddr; + +use time::OffsetDateTime; +use yasna::models::ObjectIdentifier; +use yasna::{DERWriter, Tag}; + +use crate::key_pair::PublicKeyData; +use crate::oid::{ + OID_AUTHORITY_KEY_IDENTIFIER, OID_BASIC_CONSTRAINTS, OID_CRL_DISTRIBUTION_POINTS, + OID_CRL_INVALIDITY_DATE, OID_CRL_ISSUING_DISTRIBUTION_POINT, OID_CRL_NUMBER, OID_CRL_REASONS, + OID_EXT_KEY_USAGE, OID_KEY_USAGE, OID_NAME_CONSTRAINTS, OID_SUBJECT_ALT_NAME, + OID_SUBJECT_KEY_IDENTIFIER, +}; +use crate::RcgenError; +use crate::{ + write_distinguished_name, write_dt_utc_or_generalized, BasicConstraints, Certificate, + CertificateParams, CrlDistributionPoint, CrlIssuingDistributionPoint, CustomExtension, + ExtendedKeyUsagePurpose, GeneralSubtree, IsCa, KeyUsagePurpose, NameConstraints, + RevocationReason, SanType, SerialNumber, +}; + +#[derive(Copy, Clone, Debug, PartialEq, Eq)] +pub(crate) enum Criticality { + Critical, + NonCritical, +} + +#[derive(Clone, Debug)] +pub(crate) struct Extension { + oid: ObjectIdentifier, + criticality: Criticality, + der_value: Vec, +} + +impl Extension { + pub(crate) fn write_der(&self, writer: DERWriter) { + // Extension specification: + // Extension ::= SEQUENCE { + // extnID OBJECT IDENTIFIER, + // critical BOOLEAN DEFAULT FALSE, + // extnValue OCTET STRING + // -- contains the DER encoding of an ASN.1 value + // -- corresponding to the extension type identified + // -- by extnID + // } + writer.write_sequence(|writer| { + writer.next().write_oid(&self.oid); + writer + .next() + .write_bool(matches!(self.criticality, Criticality::Critical)); + writer.next().write_bytes(&self.der_value); + }) + } +} + +#[derive(Default)] +pub(crate) struct Extensions(BTreeMap); + +impl Extensions { + pub(crate) fn add_extension(&mut self, extension: Extension) -> Result<(), RcgenError> { + if self.0.get(&extension.oid).is_some() { + return Err(RcgenError::DuplicateExtension(extension.oid.to_string())); + } + + self.0.insert(extension.oid.clone(), extension); + Ok(()) + } + + pub(crate) fn add_custom_extensions( + &mut self, + extensions: &Vec, + ) -> Result<(), RcgenError> { + for custom_ext in extensions { + self.add_extension(Extension { + oid: ObjectIdentifier::from_slice(&custom_ext.oid), + criticality: if custom_ext.critical { + Criticality::Critical + } else { + Criticality::NonCritical + }, + der_value: yasna::construct_der(|writer| writer.write_der(&custom_ext.content)), + })?; + } + Ok(()) + } + + pub(crate) fn write_der(&self, writer: DERWriter) { + writer.write_sequence(|writer| { + for extension in self.0.values() { + extension.write_der(writer.next()); + } + }) + } + + pub(crate) fn is_empty(&self) -> bool { + self.0.is_empty() + } +} + +/// An X.509v3 authority key identifier extension according to +/// [RFC 5280 4.2.1.1](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.1). +pub(crate) fn authority_key_identifier(cert: &Certificate) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_AUTHORITY_KEY_IDENTIFIER), + // Conforming CAs MUST mark this extension as non-critical. + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + /* + AuthorityKeyIdentifier ::= SEQUENCE { + keyIdentifier [0] KeyIdentifier OPTIONAL, + authorityCertIssuer [1] GeneralNames OPTIONAL, + authorityCertSerialNumber [2] CertificateSerialNumber OPTIONAL } + + KeyIdentifier ::= OCTET STRING + */ + writer.write_sequence(|writer| { + writer + .next() + .write_tagged_implicit(Tag::context(0), |writer| { + writer.write_bytes(cert.get_key_identifier().as_ref()) + }) + }); + }), + } +} + +/// An X.509v3 subject alternative name extension according to +/// [RFC 5280 4.2.1.6](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.6). +pub(crate) fn subject_alternative_names(names: &Vec) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_SUBJECT_ALT_NAME), + // TODO(XXX): For now we mark the SAN extension as non-critical, matching the pre-existing + // handling, however per 5280 this extension's criticality is determined based + // on whether or not the subject contains an empty sequence. If it does, the + // SAN MUST be critical. If it has a non-empty subject distinguished name, + // the SAN SHOULD be non-critical. + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + /* + SubjectAltName ::= GeneralNames + GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName + */ + writer.write_sequence(|writer| { + for san in names { + writer.next().write_tagged_implicit( + Tag::context(san.tag()), + |writer| match san { + SanType::Rfc822Name(name) + | SanType::DnsName(name) + | SanType::URI(name) => writer.write_ia5_string(&name), + SanType::IpAddress(IpAddr::V4(addr)) => { + writer.write_bytes(&addr.octets()) + }, + SanType::IpAddress(IpAddr::V6(addr)) => { + writer.write_bytes(&addr.octets()) + }, + }, + ); + } + }); + }), + } +} + +/// An X.509v3 key usage extension according to +/// [RFC 5280 4.2.1.3](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.3). +pub(crate) fn key_usage(usages: &Vec) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_KEY_USAGE), + // When present, conforming CAs SHOULD mark this extension as critical. + criticality: Criticality::Critical, + der_value: yasna::construct_der(|writer| { + /* + KeyUsage ::= BIT STRING { + digitalSignature (0), + nonRepudiation (1), -- recent editions of X.509 have + -- renamed this bit to contentCommitment + keyEncipherment (2), + dataEncipherment (3), + keyAgreement (4), + keyCertSign (5), + cRLSign (6), + encipherOnly (7), + decipherOnly (8) } + */ + let mut bits: u16 = 0; + + for entry in usages.iter() { + // Map the index to a value + let index = match entry { + KeyUsagePurpose::DigitalSignature => 0, + KeyUsagePurpose::ContentCommitment => 1, + KeyUsagePurpose::KeyEncipherment => 2, + KeyUsagePurpose::DataEncipherment => 3, + KeyUsagePurpose::KeyAgreement => 4, + KeyUsagePurpose::KeyCertSign => 5, + KeyUsagePurpose::CrlSign => 6, + KeyUsagePurpose::EncipherOnly => 7, + KeyUsagePurpose::DecipherOnly => 8, + }; + + bits |= 1 << index; + } + + // Compute the 1-based most significant bit + let msb = 16 - bits.leading_zeros(); + let nb = if msb <= 8 { 1 } else { 2 }; + + let bits = bits.reverse_bits().to_be_bytes(); + + // Finally take only the bytes != 0 + let bits = &bits[..nb]; + + writer.write_bitvec_bytes(&bits, msb as usize) + }), + } +} + +/// An X.509v3 extended key usage extension according to +/// [RFC 5280 4.2.1.12](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.12). +pub(crate) fn extended_key_usage(usages: &Vec) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_EXT_KEY_USAGE), + // This extension MAY, at the option of the certificate issuer, be + // either critical or non-critical. + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + /* + ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId + KeyPurposeId ::= OBJECT IDENTIFIER + */ + writer.write_sequence(|writer| { + for usage in usages.iter() { + let oid = ObjectIdentifier::from_slice(usage.oid()); + writer.next().write_oid(&oid); + } + }); + }), + } +} + +/// An X.509v3 name constraints extension according to +/// [RFC 5280 4.2.1.10](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10). +pub(crate) fn name_constraints(constraints: &NameConstraints) -> Extension { + fn write_general_subtrees(writer: DERWriter, tag: u64, general_subtrees: &[GeneralSubtree]) { + /* + GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree + + GeneralSubtree ::= SEQUENCE { + base GeneralName, + minimum [0] BaseDistance DEFAULT 0, + maximum [1] BaseDistance OPTIONAL } + + BaseDistance ::= INTEGER (0..MAX) + */ + writer.write_tagged_implicit(Tag::context(tag), |writer| { + writer.write_sequence(|writer| { + for subtree in general_subtrees.iter() { + writer.next().write_sequence(|writer| { + writer.next().write_tagged_implicit( + Tag::context(subtree.tag()), + |writer| match subtree { + GeneralSubtree::Rfc822Name(name) + | GeneralSubtree::DnsName(name) => writer.write_ia5_string(name), + GeneralSubtree::DirectoryName(name) => { + write_distinguished_name(writer, name) + }, + GeneralSubtree::IpAddress(subnet) => { + writer.write_bytes(&subnet.to_bytes()) + }, + }, + ); + // minimum must be 0 (the default) and maximum must be absent + }); + } + }); + }); + } + + Extension { + oid: ObjectIdentifier::from_slice(OID_NAME_CONSTRAINTS), + // Conforming CAs MUST mark this extension as critical + criticality: Criticality::Critical, + der_value: yasna::construct_der(|writer| { + /* + NameConstraints ::= SEQUENCE { + permittedSubtrees [0] GeneralSubtrees OPTIONAL, + excludedSubtrees [1] GeneralSubtrees OPTIONAL } + */ + writer.write_sequence(|writer| { + if !constraints.permitted_subtrees.is_empty() { + write_general_subtrees(writer.next(), 0, &constraints.permitted_subtrees); + } + if !constraints.excluded_subtrees.is_empty() { + write_general_subtrees(writer.next(), 1, &constraints.excluded_subtrees); + } + }); + }), + } +} + +/// An X.509v3 CRL distribution points extension according to +/// [RFC 5280 4.2.1.13](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.13). +pub(crate) fn crl_distribution_points( + crl_distribution_points: &Vec, +) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_CRL_DISTRIBUTION_POINTS), + // The extension SHOULD be non-critical + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + writer.write_sequence(|writer| { + for distribution_point in crl_distribution_points { + distribution_point.write_der(writer.next()); + } + }) + }), + } +} + +/// An X.509v3 subject key identifier extension according to +/// [RFC 5280 4.2.1.2](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.2). +pub(crate) fn subject_key_identifier( + params: &CertificateParams, + pub_key: &K, +) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_SUBJECT_KEY_IDENTIFIER), + // Conforming CAs MUST mark this extension as non-critical. + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + // SubjectKeyIdentifier ::= KeyIdentifier + // KeyIdentifier ::= OCTET STRING + writer.write_bytes(¶ms.key_identifier(pub_key)); + }), + } +} + +/// An X.509v3 basic constraints extension according to +/// [RFC 5280 4.2.1.9](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.9). +pub(crate) fn basic_constraints(is_ca: &IsCa) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_BASIC_CONSTRAINTS), + // Conforming CAs MUST include this extension in all CA certificates + // that contain public keys used to validate digital signatures on + // certificates and MUST mark the extension as critical in such + // certificates + criticality: Criticality::Critical, + der_value: yasna::construct_der(|writer| { + /* + BasicConstraints ::= SEQUENCE { + cA BOOLEAN DEFAULT FALSE, + pathLenConstraint INTEGER (0..MAX) OPTIONAL } + */ + writer.write_sequence(|writer| { + writer.next().write_bool(matches!(is_ca, IsCa::Ca(_))); + if let IsCa::Ca(BasicConstraints::Constrained(path_len_constraint)) = is_ca { + writer.next().write_u8(*path_len_constraint); + } + }); + }), + } +} + +/// An X.509v3 CRL number extension according to +/// [RFC 5280 5.2.3](https://www.rfc-editor.org/rfc/rfc5280#section-5.2.3) +pub(crate) fn crl_number(number: &SerialNumber) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_CRL_NUMBER), + // CRL issuers conforming to this profile MUST include this extension in all + // CRLs and MUST mark this extension as non-critical. + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + // CRLNumber ::= INTEGER (0..MAX) + writer.write_bigint_bytes(number.as_ref(), true); + }), + } +} + +/// An X.509v3 issuing distribution point extension according to +/// [RFC 5280 5.2.5](https://www.rfc-editor.org/rfc/rfc5280#section-5.2.5) +pub(crate) fn issuing_distribution_point( + distribution_point: &CrlIssuingDistributionPoint, +) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_CRL_ISSUING_DISTRIBUTION_POINT), + // Although the extension is critical, conforming implementations are not required to support this + // extension. + criticality: Criticality::Critical, + der_value: yasna::construct_der(|writer| { + distribution_point.write_der(writer); + }), + } +} + +/// An X.509v3 reason code extension according to +/// [RFC 5280 5.3.1](https://www.rfc-editor.org/rfc/rfc5280#section-5.3.1). +pub(crate) fn reason_code(code: RevocationReason) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_CRL_REASONS), + // The reasonCode is a non-critical CRL entry extension + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + /* + CRLReason ::= ENUMERATED { + unspecified (0), + keyCompromise (1), + cACompromise (2), + affiliationChanged (3), + superseded (4), + cessationOfOperation (5), + certificateHold (6), + -- value 7 is not used + removeFromCRL (8), + privilegeWithdrawn (9), + aACompromise (10) } + */ + writer.write_enum(code as i64); + }), + } +} + +/// An X.509v3 invalidity date extension according to +/// [RFC 5280 5.3.2](https://www.rfc-editor.org/rfc/rfc5280#section-5.3.2). +pub(crate) fn invalidity_date(date: OffsetDateTime) -> Extension { + Extension { + oid: ObjectIdentifier::from_slice(OID_CRL_INVALIDITY_DATE), + // The invalidity date is a non-critical CRL entry extension + criticality: Criticality::NonCritical, + der_value: yasna::construct_der(|writer| { + // InvalidityDate ::= GeneralizedTime + write_dt_utc_or_generalized(writer, date); + }), + } +} diff --git a/src/lib.rs b/src/lib.rs index c04c6c8e..97ca83f3 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -57,6 +57,7 @@ pub use crate::crl::{ }; pub use crate::csr::{CertificateSigningRequest, PublicKey}; pub use crate::error::RcgenError; +use crate::ext::Extensions; use crate::key_pair::PublicKeyData; pub use crate::key_pair::{KeyPair, RemoteKeyPair}; use crate::oid::*; @@ -108,6 +109,7 @@ pub fn generate_simple_self_signed( mod crl; mod csr; mod error; +mod ext; mod key_pair; mod oid; mod sign_algo; @@ -533,10 +535,14 @@ pub struct CertificateParams { pub key_pair: Option, /// If `true`, the 'Authority Key Identifier' extension will be added to the generated cert pub use_authority_key_identifier_extension: bool, - /// Method to generate key identifiers from public keys + /// Method to generate key identifiers from public keys if an explicit key identifier is + /// not provided. /// /// Defaults to SHA-256. pub key_identifier_method: KeyIdMethod, + /// Optional identifier to use for the subject key identifier (SKI) extension. If empty, + /// a SKI value will be generated using the [CertificateParams::key_identifier_method]. + pub key_identifier: Vec, } impl Default for CertificateParams { @@ -562,6 +568,7 @@ impl Default for CertificateParams { key_pair: None, use_authority_key_identifier_extension: false, key_identifier_method: KeyIdMethod::Sha256, + key_identifier: Vec::new(), } } } @@ -812,28 +819,7 @@ impl CertificateParams { } Ok(result) } - fn write_subject_alt_names(&self, writer: DERWriter) { - write_x509_extension(writer, OID_SUBJECT_ALT_NAME, false, |writer| { - writer.write_sequence(|writer| { - for san in self.subject_alt_names.iter() { - writer.next().write_tagged_implicit( - Tag::context(san.tag()), - |writer| match san { - SanType::Rfc822Name(name) - | SanType::DnsName(name) - | SanType::URI(name) => writer.write_ia5_string(name), - SanType::IpAddress(IpAddr::V4(addr)) => { - writer.write_bytes(&addr.octets()) - }, - SanType::IpAddress(IpAddr::V6(addr)) => { - writer.write_bytes(&addr.octets()) - }, - }, - ); - } - }); - }); - } + fn write_request( &self, pub_key: &K, @@ -846,33 +832,23 @@ impl CertificateParams { not_before, not_after, serial_number, - subject_alt_names, + subject_alt_names: _, distinguished_name, - is_ca, - key_usages, - extended_key_usages, - name_constraints, - crl_distribution_points, - custom_extensions, + is_ca: _, + key_usages: _, + extended_key_usages: _, + name_constraints: _, + crl_distribution_points: _, + custom_extensions: _, key_pair, - use_authority_key_identifier_extension, - key_identifier_method, + use_authority_key_identifier_extension: _, + key_identifier_method: _, + key_identifier: _, } = self; // - alg and key_pair will be used by the caller // - not_before and not_after cannot be put in a CSR - // - There might be a use case for specifying the key identifier - // in the CSR, but in the current API it can't be distinguished - // from the defaults so this is left for a later version if - // needed. - let _ = (alg, key_pair, not_before, not_after, key_identifier_method); - if serial_number.is_some() - || *is_ca != IsCa::NoCa - || !key_usages.is_empty() - || !extended_key_usages.is_empty() - || name_constraints.is_some() - || !crl_distribution_points.is_empty() - || *use_authority_key_identifier_extension - { + let _ = (alg, key_pair, not_before, not_after); + if serial_number.is_some() { return Err(RcgenError::UnsupportedInCsr); } writer.write_sequence(|writer| { @@ -914,31 +890,19 @@ impl CertificateParams { // Write extensions // According to the spec in RFC 2986, even if attributes are empty we need the empty attribute tag writer.next().write_tagged(Tag::context(0), |writer| { - if !subject_alt_names.is_empty() || !custom_extensions.is_empty() { + let extensions = self.extensions(None, pub_key)?; + if !extensions.is_empty() { writer.write_sequence(|writer| { let oid = ObjectIdentifier::from_slice(OID_PKCS_9_AT_EXTENSION_REQUEST); writer.next().write_oid(&oid); writer.next().write_set(|writer| { - writer.next().write_sequence(|writer| { - // Write subject_alt_names - self.write_subject_alt_names(writer.next()); - - // Write custom extensions - for ext in custom_extensions { - write_x509_extension( - writer.next(), - &ext.oid, - ext.critical, - |writer| writer.write_der(ext.content()), - ); - } - }); + extensions.write_der(writer.next()); }); }); } - }); - }); - Ok(()) + Ok(()) + }) + }) } fn write_cert( &self, @@ -977,180 +941,10 @@ impl CertificateParams { // Write subjectPublicKeyInfo pub_key.serialize_public_key_der(writer.next()); // write extensions - let should_write_exts = self.use_authority_key_identifier_extension - || !self.subject_alt_names.is_empty() - || !self.extended_key_usages.is_empty() - || self.name_constraints.iter().any(|c| !c.is_empty()) - || matches!(self.is_ca, IsCa::ExplicitNoCa) - || matches!(self.is_ca, IsCa::Ca(_)) - || !self.custom_extensions.is_empty(); - if should_write_exts { + let extensions = self.extensions(Some(ca), pub_key)?; + if !extensions.is_empty() { writer.next().write_tagged(Tag::context(3), |writer| { - writer.write_sequence(|writer| { - if self.use_authority_key_identifier_extension { - write_x509_authority_key_identifier(writer.next(), ca) - } - // Write subject_alt_names - if !self.subject_alt_names.is_empty() { - self.write_subject_alt_names(writer.next()); - } - - // Write standard key usage - if !self.key_usages.is_empty() { - write_x509_extension(writer.next(), OID_KEY_USAGE, true, |writer| { - let mut bits: u16 = 0; - - for entry in self.key_usages.iter() { - // Map the index to a value - let index = match entry { - KeyUsagePurpose::DigitalSignature => 0, - KeyUsagePurpose::ContentCommitment => 1, - KeyUsagePurpose::KeyEncipherment => 2, - KeyUsagePurpose::DataEncipherment => 3, - KeyUsagePurpose::KeyAgreement => 4, - KeyUsagePurpose::KeyCertSign => 5, - KeyUsagePurpose::CrlSign => 6, - KeyUsagePurpose::EncipherOnly => 7, - KeyUsagePurpose::DecipherOnly => 8, - }; - - bits |= 1 << index; - } - - // Compute the 1-based most significant bit - let msb = 16 - bits.leading_zeros(); - let nb = if msb <= 8 { 1 } else { 2 }; - - let bits = bits.reverse_bits().to_be_bytes(); - - // Finally take only the bytes != 0 - let bits = &bits[..nb]; - - writer.write_bitvec_bytes(&bits, msb as usize) - }); - } - - // Write extended key usage - if !self.extended_key_usages.is_empty() { - write_x509_extension( - writer.next(), - OID_EXT_KEY_USAGE, - false, - |writer| { - writer.write_sequence(|writer| { - for usage in self.extended_key_usages.iter() { - let oid = ObjectIdentifier::from_slice(usage.oid()); - writer.next().write_oid(&oid); - } - }); - }, - ); - } - if let Some(name_constraints) = &self.name_constraints { - // If both trees are empty, the extension must be omitted. - if !name_constraints.is_empty() { - write_x509_extension( - writer.next(), - OID_NAME_CONSTRAINTS, - true, - |writer| { - writer.write_sequence(|writer| { - if !name_constraints.permitted_subtrees.is_empty() { - write_general_subtrees( - writer.next(), - 0, - &name_constraints.permitted_subtrees, - ); - } - if !name_constraints.excluded_subtrees.is_empty() { - write_general_subtrees( - writer.next(), - 1, - &name_constraints.excluded_subtrees, - ); - } - }); - }, - ); - } - } - if !self.crl_distribution_points.is_empty() { - write_x509_extension( - writer.next(), - OID_CRL_DISTRIBUTION_POINTS, - false, - |writer| { - writer.write_sequence(|writer| { - for distribution_point in &self.crl_distribution_points { - distribution_point.write_der(writer.next()); - } - }) - }, - ); - } - match self.is_ca { - IsCa::Ca(ref constraint) => { - // Write subject_key_identifier - write_x509_extension( - writer.next(), - OID_SUBJECT_KEY_IDENTIFIER, - false, - |writer| { - let key_identifier = self.key_identifier(pub_key); - writer.write_bytes(key_identifier.as_ref()); - }, - ); - // Write basic_constraints - write_x509_extension( - writer.next(), - OID_BASIC_CONSTRAINTS, - true, - |writer| { - writer.write_sequence(|writer| { - writer.next().write_bool(true); // cA flag - if let BasicConstraints::Constrained( - path_len_constraint, - ) = constraint - { - writer.next().write_u8(*path_len_constraint); - } - }); - }, - ); - }, - IsCa::ExplicitNoCa => { - // Write subject_key_identifier - write_x509_extension( - writer.next(), - OID_SUBJECT_KEY_IDENTIFIER, - false, - |writer| { - let key_identifier = self.key_identifier(pub_key); - writer.write_bytes(key_identifier.as_ref()); - }, - ); - // Write basic_constraints - write_x509_extension( - writer.next(), - OID_BASIC_CONSTRAINTS, - true, - |writer| { - writer.write_sequence(|writer| { - writer.next().write_bool(false); // cA flag - }); - }, - ); - }, - IsCa::NoCa => {}, - } - - // Write the custom extensions - for ext in &self.custom_extensions { - write_x509_extension(writer.next(), &ext.oid, ext.critical, |writer| { - writer.write_der(ext.content()) - }); - } - }); + extensions.write_der(writer); }); } Ok(()) @@ -1193,6 +987,55 @@ impl CertificateParams { }) }) } + /// Returns the X.509 extensions that the [CertificateParams] describe, or an [RcgenError] + /// if the described extensions are invalid. The returned extensions will include a subject + /// public key identifier extension for the provided [PublicKeyData]. + /// + /// If an issuer [Certificate] is provided, additional extensions specific to the issuer will + /// be included (e.g. the authority key identifier). + fn extensions( + &self, + issuer: Option<&Certificate>, + pub_key: &K, + ) -> Result { + let mut exts = Extensions::default(); + + if let Some(issuer) = issuer { + exts.add_extension(ext::authority_key_identifier(issuer))?; + } + + if !self.subject_alt_names.is_empty() { + exts.add_extension(ext::subject_alternative_names(&self.subject_alt_names))?; + } + + if !self.key_usages.is_empty() { + exts.add_extension(ext::key_usage(&self.key_usages))?; + } + + if !self.extended_key_usages.is_empty() { + exts.add_extension(ext::extended_key_usage(&self.extended_key_usages))?; + } + + if let Some(name_constraints) = &self.name_constraints { + if !name_constraints.is_empty() { + exts.add_extension(ext::name_constraints(name_constraints))?; + } + } + + if !self.crl_distribution_points.is_empty() { + exts.add_extension(ext::crl_distribution_points(&self.crl_distribution_points))?; + } + + exts.add_extension(ext::subject_key_identifier(&self, pub_key))?; + + if matches!(self.is_ca, IsCa::Ca(_) | IsCa::ExplicitNoCa) { + exts.add_extension(ext::basic_constraints(&self.is_ca))?; + } + + exts.add_custom_extensions(&self.custom_extensions)?; + + Ok(exts) + } } /// Whether the certificate is allowed to sign other certificates @@ -1462,33 +1305,6 @@ fn write_distinguished_name(writer: DERWriter, dn: &DistinguishedName) { }); } -fn write_general_subtrees(writer: DERWriter, tag: u64, general_subtrees: &[GeneralSubtree]) { - writer.write_tagged_implicit(Tag::context(tag), |writer| { - writer.write_sequence(|writer| { - for subtree in general_subtrees.iter() { - writer.next().write_sequence(|writer| { - writer - .next() - .write_tagged_implicit( - Tag::context(subtree.tag()), - |writer| match subtree { - GeneralSubtree::Rfc822Name(name) - | GeneralSubtree::DnsName(name) => writer.write_ia5_string(name), - GeneralSubtree::DirectoryName(name) => { - write_distinguished_name(writer, name) - }, - GeneralSubtree::IpAddress(subnet) => { - writer.write_bytes(&subnet.to_bytes()) - }, - }, - ); - // minimum must be 0 (the default) and maximum must be absent - }); - } - }); - }); -} - impl Certificate { /// Generates a new certificate from the given parameters. /// @@ -1512,7 +1328,10 @@ impl Certificate { /// Calculates a subject key identifier for the certificate subject's public key. /// This key identifier is used in the SubjectKeyIdentifier X.509v3 extension. pub fn get_key_identifier(&self) -> Vec { - self.params.key_identifier(&self.key_pair) + match self.params.key_identifier.is_empty() { + true => self.params.key_identifier(&self.key_pair), + false => self.params.key_identifier.clone(), + } } /// Serializes the certificate to the binary DER format pub fn serialize_der(&self) -> Result, RcgenError> { @@ -1581,57 +1400,6 @@ impl Certificate { } } -/// Serializes an X.509v3 extension according to RFC 5280 -fn write_x509_extension( - writer: DERWriter, - extension_oid: &[u64], - is_critical: bool, - value_serializer: impl FnOnce(DERWriter), -) { - // Extension specification: - // Extension ::= SEQUENCE { - // extnID OBJECT IDENTIFIER, - // critical BOOLEAN DEFAULT FALSE, - // extnValue OCTET STRING - // -- contains the DER encoding of an ASN.1 value - // -- corresponding to the extension type identified - // -- by extnID - // } - - writer.write_sequence(|writer| { - let oid = ObjectIdentifier::from_slice(extension_oid); - writer.next().write_oid(&oid); - if is_critical { - writer.next().write_bool(true); - } - let bytes = yasna::construct_der(value_serializer); - writer.next().write_bytes(&bytes); - }) -} - -/// Serializes an X.509v3 authority key identifier extension according to RFC 5280. -fn write_x509_authority_key_identifier(writer: DERWriter, ca: &Certificate) { - // Write Authority Key Identifier - // RFC 5280 states: - // 'The keyIdentifier field of the authorityKeyIdentifier extension MUST - // be included in all certificates generated by conforming CAs to - // facilitate certification path construction. There is one exception; - // where a CA distributes its public key in the form of a "self-signed" - // certificate, the authority key identifier MAY be omitted.' - // In addition, for CRLs: - // 'Conforming CRL issuers MUST use the key identifier method, and MUST - // include this extension in all CRLs issued.' - write_x509_extension(writer, OID_AUTHORITY_KEY_IDENTIFIER, false, |writer| { - writer.write_sequence(|writer| { - writer - .next() - .write_tagged_implicit(Tag::context(0), |writer| { - writer.write_bytes(ca.get_key_identifier().as_ref()) - }) - }); - }); -} - #[cfg(feature = "zeroize")] impl zeroize::Zeroize for KeyPair { fn zeroize(&mut self) { diff --git a/tests/generic.rs b/tests/generic.rs index 30555418..8b7f9bdd 100644 --- a/tests/generic.rs +++ b/tests/generic.rs @@ -89,11 +89,253 @@ mod test_convert_x509_subject_alternative_name { } } +#[cfg(feature = "x509-parser")] +mod test_csr_exts { + use crate::util; + use rcgen::{ + BasicConstraints, Certificate, CrlDistributionPoint, GeneralSubtree, KeyUsagePurpose, + SanType, + }; + use x509_parser::prelude::{ + FromDer, ParsedExtension, X509Certificate, X509CertificationRequest, + }; + + #[test] + fn test_rcgen_extensions() { + // Create a certificate that has several rcgen managed extensions (e.g. not custom extensions). + let mut params = util::default_params(); + let san_name = "san.example.com"; + params.subject_alt_names = vec![SanType::DnsName(san_name.into())]; + let path_len_constraint = 3; + params.is_ca = rcgen::IsCa::Ca(BasicConstraints::Constrained(path_len_constraint)); + params.key_usages = vec![ + KeyUsagePurpose::DigitalSignature, + KeyUsagePurpose::KeyEncipherment, + ]; + params.extended_key_usages = vec![ + rcgen::ExtendedKeyUsagePurpose::ServerAuth, + rcgen::ExtendedKeyUsagePurpose::ClientAuth, + ]; + let permitted_subtree_dns = "example.com"; + let excluded_subtree_dns = "example.org"; + params.name_constraints = Some(rcgen::NameConstraints { + permitted_subtrees: vec![GeneralSubtree::DnsName(permitted_subtree_dns.into())], + excluded_subtrees: vec![GeneralSubtree::DnsName(excluded_subtree_dns.into())], + }); + let distribution_point_uri = "http://example.com"; + params.crl_distribution_points = vec![CrlDistributionPoint { + uris: vec![distribution_point_uri.into()], + }]; + let cert = Certificate::from_params(params).unwrap(); + let cert_der = cert.serialize_der().unwrap(); + let csr_der = cert.serialize_request_der().unwrap(); + + // Parse the self-signed test certificate, and a CSR generated from the test certificate with x509-parser. + let (_, x509_cert) = X509Certificate::from_der(&cert_der).unwrap(); + let (_, x509_csr) = X509CertificationRequest::from_der(&csr_der).unwrap(); + + // Helper macro that tests both the parsed cert and CSR have an extension with specific + // properties. + macro_rules! assert_paired_ext { + ($oid:ident, $critical:expr, $pattern:pat, $parsed_expr:expr) => {{ + // 1. Find the extension in the certificate. + let cert_ext = x509_cert + .get_extension_unique(&x509_parser::oid_registry::$oid) + .expect(concat!("malformed cert ext for ", stringify!($oid))) + .expect(concat!("missing cert ext for ", stringify!($oid))); + + // 2. Verify criticality. + assert_eq!( + cert_ext.critical, $critical, + concat!("wrong criticality for ", stringify!($oid)) + ); + + // 3. Verify the parsed representation of the extension. + match cert_ext.parsed_extension() { + $pattern => $parsed_expr, + _ => panic!(concat!( + "unexpected parsed extension for ", + stringify!($oid) + )), + }; + + // 4. Verify the parsed CSR has the extension, and that it has the correct + // parsed representation. + x509_csr + .requested_extensions() + .expect("missing CSR requested extensions") + .find_map(|ext| match ext { + $pattern => Some($parsed_expr), + _ => None, + }) + .expect(concat!("missing CSR extension for ", stringify!($oid))) + }}; + } + + assert_paired_ext!( + OID_X509_EXT_SUBJECT_ALT_NAME, + false, + ParsedExtension::SubjectAlternativeName(san), + { + san.general_names + .iter() + .find(|name| match name { + x509_parser::prelude::GeneralName::DNSName(name) => name == &san_name, + _ => false, + }) + .expect("missing expected SAN"); + } + ); + + assert_paired_ext!( + OID_X509_EXT_BASIC_CONSTRAINTS, + true, + ParsedExtension::BasicConstraints(bc), + { + assert!(bc.ca); + assert_eq!( + bc.path_len_constraint.expect("missing path len constraint"), + path_len_constraint as u32 + ); + } + ); + + fn assert_subtree_dns( + subtrees: Vec, + expected_dns: &str, + ) { + subtrees + .iter() + .find( + |subtree| + matches!(subtree.base, x509_parser::prelude::GeneralName::DNSName(dns) if dns == expected_dns) + ) + .expect("missing expected subtree URI"); + } + assert_paired_ext!( + OID_X509_EXT_NAME_CONSTRAINTS, + true, + ParsedExtension::NameConstraints(name_constraints), + { + assert_subtree_dns( + name_constraints + .permitted_subtrees + .clone() + .expect("missing permitted subtrees"), + &permitted_subtree_dns, + ); + assert_subtree_dns( + name_constraints + .excluded_subtrees + .clone() + .expect("missing excluded subtrees"), + &excluded_subtree_dns, + ); + } + ); + + fn assert_crl_dps_uri( + crl_dps: &x509_parser::prelude::CRLDistributionPoints, + expected: &str, + ) { + crl_dps + .iter() + .find(|dp| { + let full_names = match dp + .distribution_point + .clone() + .expect("missing distribution point name") + { + x509_parser::prelude::DistributionPointName::FullName(full_names) => { + full_names + }, + _ => panic!("missing full names"), + }; + + full_names.iter().find(|general_name| + matches!(general_name, x509_parser::prelude::GeneralName::URI(uri) if uri == &expected)).is_some() + }) + .expect("missing expected CRL distribution point URI"); + } + assert_paired_ext!( + OID_X509_EXT_CRL_DISTRIBUTION_POINTS, + false, + ParsedExtension::CRLDistributionPoints(crl_dps), + assert_crl_dps_uri(crl_dps, &distribution_point_uri) + ); + + assert_paired_ext!( + OID_X509_EXT_KEY_USAGE, + true, + ParsedExtension::KeyUsage(ku), + { + assert!(ku.digital_signature()); + assert!(ku.key_encipherment()); + assert!(!ku.non_repudiation()); + assert!(!ku.key_agreement()); + assert!(!ku.key_cert_sign()); + assert!(!ku.encipher_only()); + assert!(!ku.decipher_only()); + } + ); + + assert_paired_ext!( + OID_X509_EXT_EXTENDED_KEY_USAGE, + false, + ParsedExtension::ExtendedKeyUsage(eku), + { + assert!(eku.server_auth); + assert!(eku.client_auth); + assert!(!eku.any); + assert!(eku.other.is_empty()); + assert!(!eku.code_signing); + assert!(!eku.ocsp_signing); + assert!(!eku.email_protection); + assert!(!eku.time_stamping); + } + ); + + assert_paired_ext!( + OID_X509_EXT_SUBJECT_KEY_IDENTIFIER, + false, + ParsedExtension::SubjectKeyIdentifier(ski), + assert_eq!(ski.0, &cert.get_key_identifier()) + ); + + // We should find the AKI extension in the self-signed certificate. + let aki = x509_cert + .get_extension_unique(&x509_parser::oid_registry::OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER) + .expect("malformed OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER") + .expect("missing OID_X509_EXT_AUTHORITY_KEY_IDENTIFIER"); + assert!(!aki.critical); + match aki.parsed_extension() { + ParsedExtension::AuthorityKeyIdentifier(aki) => assert_eq!( + aki.clone() + .key_identifier + .expect("missing key identifier") + .0, + &cert.get_key_identifier() + ), + _ => panic!("unexpected parsed extension type"), + }; + + // We should not find the AKI extension in the CSR. That's provided by an issuer + // when issuing the certificate. + assert_eq!( + x509_csr + .requested_extensions() + .unwrap() + .find(|ext| { matches!(ext, ParsedExtension::AuthorityKeyIdentifier(_)) }), + None + ); + } +} + #[cfg(feature = "x509-parser")] mod test_x509_custom_ext { use crate::util; - use rcgen::{Certificate, CustomExtension}; + use rcgen::{Certificate, CertificateSigningRequest, CustomExtension}; use x509_parser::oid_registry::asn1_rs; use x509_parser::prelude::{ FromDer, ParsedCriAttribute, X509Certificate, X509CertificationRequest, @@ -154,8 +396,20 @@ mod test_x509_custom_ext { .iter() .find(|ext| ext.oid == test_oid) .expect("missing requested custom extension"); - assert_eq!(custom_ext.critical, true); + assert!(custom_ext.critical); assert_eq!(custom_ext.value, test_ext); + + // We should be able to create an rcgen CSR from the serialized CSR. + let rcgen_csr = CertificateSigningRequest::from_der(&test_cert_csr_der).unwrap(); + // The custom extensions should be present in the CSR. + let custom_ext = rcgen_csr + .params + .custom_extensions + .iter() + .find(|ext| Iterator::eq(ext.oid_components(), test_oid.iter().unwrap())) + .expect("missing requested custom extension"); + assert!(custom_ext.criticality()); + assert_eq!(custom_ext.content(), test_ext); } }