Add support for printing SCT extension data#85
Conversation
There was a problem hiding this comment.
Looks OK, but would be good to include a test cert. Could be the one you used in the test above, or one from web PKI.
Was triggered by the RFC6962 prefix in RFC6962 Certificate Transparency SCT, as that seems to be the first where we don't use . Scratch that; we have some X509v3, but apparently we already had that, so it's OKSigstore "domain" extensions too. I suppose we should be using something like Smallstep for our own ones instead, but that's for another time.
Any hint how to regenerate the test certificates? |
Can't you use the cert you used for testing the output? If not directly, maybe it can be done using some packages from our There's this generator: https://github.com/smallstep/certinfo/blob/master/test_certs/make-certs.sh. It doesn't generate all test files, though. I remember for Sigstore I did an actual signing operation and put the cert here. It was the quickest way to get an example Sigstore cert that way. |
Sure, I can do that. I thought we wanted to have something more "official", but we only care about the SCT extension in this test, so this should be fine. |
|
Part of what |
Tiled transparency logs use SCT extensions to encode the position of the certificate in the CT log.
This PR makes no attempt to decode the SCT extension (same as OpenSSL). It just makes us stop pretending that SCT extensions don't exist.
openssloutput:stepoutput: