Conversation
842a112 to
e918319
Compare
| #[allow(dead_code)] // pending sct verification | ||
| extensions: untrusted::Input<'a>, | ||
| #[allow(dead_code)] // pending sct verification | ||
| signature_algorithm: u16, | ||
| #[allow(dead_code)] // pending sct verification | ||
| signature: untrusted::Input<'a>, |
There was a problem hiding this comment.
What kind of verification needs to happen? Thoughts on a testing strategy?
There was a problem hiding this comment.
Verification here would be a separate feature, taking a set of valid CT logs (their IDs, public keys, etc) and checking each SCT purported to come from a valid known log is correctly signed. Doing this verification is a future upki feature, mainly because tracking "valid CT logs" requires ongoing, current knowledge.
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #423 +/- ##
==========================================
- Coverage 96.78% 96.78% -0.01%
==========================================
Files 19 20 +1
Lines 3797 3950 +153
==========================================
+ Hits 3675 3823 +148
- Misses 122 127 +5 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Need to make sure to fuse the iterator if there's an unrecoverable error. (Personally not sure I mind |
What do you think about the opposite change -- Anyway, not married to this either way. I have one more addition to make on this PR then we can squash. |
Uh, do we allocate after the first pass, or |
I was thinking unwrap() -- I have dropped this commit just now. |
|
|
||
| /// Reconstitutes the given trust anchor's SubjectPublicKeyInfo. | ||
| #[cfg(feature = "alloc")] | ||
| pub fn spki_for_anchor(anchor: &TrustAnchor<'_>) -> SubjectPublicKeyInfoDer<'static> { |
There was a problem hiding this comment.
This is not really great, but the alternatives don't seem great either:
- copying
der::asn1_wrapinto pki-types and having an accessor fn onTrustAnchor - moving
der::asn1_wrapinto pki-types and then reexposing it (though perhaps as aSubjectPublicKeyInfoDer::from_interior_bytes()or whatever)
There was a problem hiding this comment.
Seems okay to me. Might be nice if we can move some of this reusable logic into pki-types some day -- I forget the other place recently where I was copying similar stuff around.
|
✅ (I submitted the PR, so can't formally approve). |
This (or precisely the hash of it) is used as an identifier to scope the serial number of a given end-entity cert.
Co-authored-by: Dirkjan Ochtman <dirkjan@ochtman.nl>
No description provided.