You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use x509.ParseCertificate(derBytes) to parse the der certificate
For X.509 extensions with incorrect tags, golang only checks the correctness of Authority Key Identifier, Subject Key Identifier, Key Usage, Certificate Policies, Subject Alternative Name, Basic Constrains, Name Constraints, Extended key usage, CRL Distribution Points, and AIA extensions, and identifies invalid extensions, while Policy Mappings, Policy Constrains, Inhibit anyPolicy, Freshest CRL, and Subject Information Access lack this check.
What did you see happen?
Some invalid extensions were accepted
What did you expect to see?
Correctly detect invalid extensions and reject them
The text was updated successfully, but these errors were encountered:
(Emoji vote if this was helpful or unhelpful; more detailed feedback welcome in this discussion.)
gabyhelp
added
the
LibraryProposal
Issues describing a requested change to the Go standard library or x/ libraries, but not to a tool
label
Jan 31, 2025
Go version
go version go1.23.2 linux/amd64
Output of
go env
in your module/workspace:What did you do?
Use x509.ParseCertificate(derBytes) to parse the der certificate
For X.509 extensions with incorrect tags, golang only checks the correctness of Authority Key Identifier, Subject Key Identifier, Key Usage, Certificate Policies, Subject Alternative Name, Basic Constrains, Name Constraints, Extended key usage, CRL Distribution Points, and AIA extensions, and identifies invalid extensions, while Policy Mappings, Policy Constrains, Inhibit anyPolicy, Freshest CRL, and Subject Information Access lack this check.
What did you see happen?
Some invalid extensions were accepted
What did you expect to see?
Correctly detect invalid extensions and reject them
The text was updated successfully, but these errors were encountered: