123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303 |
- package x509
- import "fmt"
- // To preserve error IDs, only append to this list, never insert.
- const (
- ErrInvalidID ErrorID = iota
- ErrInvalidCertList
- ErrTrailingCertList
- ErrUnexpectedlyCriticalCertListExtension
- ErrUnexpectedlyNonCriticalCertListExtension
- ErrInvalidCertListAuthKeyID
- ErrTrailingCertListAuthKeyID
- ErrInvalidCertListIssuerAltName
- ErrInvalidCertListCRLNumber
- ErrTrailingCertListCRLNumber
- ErrNegativeCertListCRLNumber
- ErrInvalidCertListDeltaCRL
- ErrTrailingCertListDeltaCRL
- ErrNegativeCertListDeltaCRL
- ErrInvalidCertListIssuingDP
- ErrTrailingCertListIssuingDP
- ErrCertListIssuingDPMultipleTypes
- ErrCertListIssuingDPInvalidFullName
- ErrInvalidCertListFreshestCRL
- ErrInvalidCertListAuthInfoAccess
- ErrTrailingCertListAuthInfoAccess
- ErrUnhandledCriticalCertListExtension
- ErrUnexpectedlyCriticalRevokedCertExtension
- ErrUnexpectedlyNonCriticalRevokedCertExtension
- ErrInvalidRevocationReason
- ErrTrailingRevocationReason
- ErrInvalidRevocationInvalidityDate
- ErrTrailingRevocationInvalidityDate
- ErrInvalidRevocationIssuer
- ErrUnhandledCriticalRevokedCertExtension
- ErrMaxID
- )
- // idToError gives a template x509.Error for each defined ErrorID; where the Summary
- // field may hold format specifiers that take field parameters.
- var idToError map[ErrorID]Error
- var errorInfo = []Error{
- {
- ID: ErrInvalidCertList,
- Summary: "x509: failed to parse CertificateList: %v",
- Field: "CertificateList",
- SpecRef: "RFC 5280 s5.1",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingCertList,
- Summary: "x509: trailing data after CertificateList",
- Field: "CertificateList",
- SpecRef: "RFC 5280 s5.1",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrUnexpectedlyCriticalCertListExtension,
- Summary: "x509: certificate list extension %v marked critical but expected to be non-critical",
- Field: "tbsCertList.crlExtensions.*.critical",
- SpecRef: "RFC 5280 s5.2",
- Category: MalformedCRL,
- },
- {
- ID: ErrUnexpectedlyNonCriticalCertListExtension,
- Summary: "x509: certificate list extension %v marked non-critical but expected to be critical",
- Field: "tbsCertList.crlExtensions.*.critical",
- SpecRef: "RFC 5280 s5.2",
- Category: MalformedCRL,
- },
- {
- ID: ErrInvalidCertListAuthKeyID,
- Summary: "x509: failed to unmarshal certificate-list authority key-id: %v",
- Field: "tbsCertList.crlExtensions.*.AuthorityKeyIdentifier",
- SpecRef: "RFC 5280 s5.2.1",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingCertListAuthKeyID,
- Summary: "x509: trailing data after certificate list auth key ID",
- Field: "tbsCertList.crlExtensions.*.AuthorityKeyIdentifier",
- SpecRef: "RFC 5280 s5.2.1",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrInvalidCertListIssuerAltName,
- Summary: "x509: failed to parse CRL issuer alt name: %v",
- Field: "tbsCertList.crlExtensions.*.IssuerAltName",
- SpecRef: "RFC 5280 s5.2.2",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrInvalidCertListCRLNumber,
- Summary: "x509: failed to unmarshal certificate-list crl-number: %v",
- Field: "tbsCertList.crlExtensions.*.CRLNumber",
- SpecRef: "RFC 5280 s5.2.3",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingCertListCRLNumber,
- Summary: "x509: trailing data after certificate list crl-number",
- Field: "tbsCertList.crlExtensions.*.CRLNumber",
- SpecRef: "RFC 5280 s5.2.3",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrNegativeCertListCRLNumber,
- Summary: "x509: negative certificate list crl-number: %d",
- Field: "tbsCertList.crlExtensions.*.CRLNumber",
- SpecRef: "RFC 5280 s5.2.3",
- Category: MalformedCRL,
- Fatal: true,
- },
- {
- ID: ErrInvalidCertListDeltaCRL,
- Summary: "x509: failed to unmarshal certificate-list delta-crl: %v",
- Field: "tbsCertList.crlExtensions.*.BaseCRLNumber",
- SpecRef: "RFC 5280 s5.2.4",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingCertListDeltaCRL,
- Summary: "x509: trailing data after certificate list delta-crl",
- Field: "tbsCertList.crlExtensions.*.BaseCRLNumber",
- SpecRef: "RFC 5280 s5.2.4",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrNegativeCertListDeltaCRL,
- Summary: "x509: negative certificate list base-crl-number: %d",
- Field: "tbsCertList.crlExtensions.*.BaseCRLNumber",
- SpecRef: "RFC 5280 s5.2.4",
- Category: MalformedCRL,
- Fatal: true,
- },
- {
- ID: ErrInvalidCertListIssuingDP,
- Summary: "x509: failed to unmarshal certificate list issuing distribution point: %v",
- Field: "tbsCertList.crlExtensions.*.IssuingDistributionPoint",
- SpecRef: "RFC 5280 s5.2.5",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingCertListIssuingDP,
- Summary: "x509: trailing data after certificate list issuing distribution point",
- Field: "tbsCertList.crlExtensions.*.IssuingDistributionPoint",
- SpecRef: "RFC 5280 s5.2.5",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrCertListIssuingDPMultipleTypes,
- Summary: "x509: multiple cert types set in issuing-distribution-point: user:%v CA:%v attr:%v",
- Field: "tbsCertList.crlExtensions.*.IssuingDistributionPoint",
- SpecRef: "RFC 5280 s5.2.5",
- SpecText: "at most one of onlyContainsUserCerts, onlyContainsCACerts, and onlyContainsAttributeCerts may be set to TRUE.",
- Category: MalformedCRL,
- Fatal: true,
- },
- {
- ID: ErrCertListIssuingDPInvalidFullName,
- Summary: "x509: failed to parse CRL issuing-distribution-point fullName: %v",
- Field: "tbsCertList.crlExtensions.*.IssuingDistributionPoint.distributionPoint",
- SpecRef: "RFC 5280 s5.2.5",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrInvalidCertListFreshestCRL,
- Summary: "x509: failed to unmarshal certificate list freshestCRL: %v",
- Field: "tbsCertList.crlExtensions.*.FreshestCRL",
- SpecRef: "RFC 5280 s5.2.6",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrInvalidCertListAuthInfoAccess,
- Summary: "x509: failed to unmarshal certificate list authority info access: %v",
- Field: "tbsCertList.crlExtensions.*.AuthorityInfoAccess",
- SpecRef: "RFC 5280 s5.2.7",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingCertListAuthInfoAccess,
- Summary: "x509: trailing data after certificate list authority info access",
- Field: "tbsCertList.crlExtensions.*.AuthorityInfoAccess",
- SpecRef: "RFC 5280 s5.2.7",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrUnhandledCriticalCertListExtension,
- Summary: "x509: unhandled critical extension in certificate list: %v",
- Field: "tbsCertList.revokedCertificates.crlExtensions.*",
- SpecRef: "RFC 5280 s5.2",
- SpecText: "If a CRL contains a critical extension that the application cannot process, then the application MUST NOT use that CRL to determine the status of certificates.",
- Category: MalformedCRL,
- Fatal: true,
- },
- {
- ID: ErrUnexpectedlyCriticalRevokedCertExtension,
- Summary: "x509: revoked certificate extension %v marked critical but expected to be non-critical",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.critical",
- SpecRef: "RFC 5280 s5.3",
- Category: MalformedCRL,
- },
- {
- ID: ErrUnexpectedlyNonCriticalRevokedCertExtension,
- Summary: "x509: revoked certificate extension %v marked non-critical but expected to be critical",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.critical",
- SpecRef: "RFC 5280 s5.3",
- Category: MalformedCRL,
- },
- {
- ID: ErrInvalidRevocationReason,
- Summary: "x509: failed to parse revocation reason: %v",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.CRLReason",
- SpecRef: "RFC 5280 s5.3.1",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingRevocationReason,
- Summary: "x509: trailing data after revoked certificate reason",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.CRLReason",
- SpecRef: "RFC 5280 s5.3.1",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrInvalidRevocationInvalidityDate,
- Summary: "x509: failed to parse revoked certificate invalidity date: %v",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.InvalidityDate",
- SpecRef: "RFC 5280 s5.3.2",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrTrailingRevocationInvalidityDate,
- Summary: "x509: trailing data after revoked certificate invalidity date",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.InvalidityDate",
- SpecRef: "RFC 5280 s5.3.2",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrInvalidRevocationIssuer,
- Summary: "x509: failed to parse revocation issuer %v",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*.CertificateIssuer",
- SpecRef: "RFC 5280 s5.3.3",
- Category: InvalidASN1Content,
- Fatal: true,
- },
- {
- ID: ErrUnhandledCriticalRevokedCertExtension,
- Summary: "x509: unhandled critical extension in revoked certificate: %v",
- Field: "tbsCertList.revokedCertificates.crlEntryExtensions.*",
- SpecRef: "RFC 5280 s5.3",
- SpecText: "If a CRL contains a critical CRL entry extension that the application cannot process, then the application MUST NOT use that CRL to determine the status of any certificates.",
- Category: MalformedCRL,
- Fatal: true,
- },
- }
- func init() {
- idToError = make(map[ErrorID]Error, len(errorInfo))
- for _, info := range errorInfo {
- idToError[info.ID] = info
- }
- }
- // NewError builds a new x509.Error based on the template for the given id.
- func NewError(id ErrorID, args ...interface{}) Error {
- var err Error
- if id >= ErrMaxID {
- err.ID = id
- err.Summary = fmt.Sprintf("Unknown error ID %v: args %+v", id, args)
- err.Fatal = true
- } else {
- err = idToError[id]
- err.Summary = fmt.Sprintf(err.Summary, args...)
- }
- return err
- }
|