#x509 #asn1 #cryptography #pki


Low-level X.509 parsing and signature verification library

4 releases (breaking)

0.5.0 Jul 8, 2020
0.4.0 May 1, 2020
0.3.3 Apr 21, 2020
0.2.0 Apr 8, 2020
0.1.0 Apr 8, 2020

#398 in Cryptography

Download history 302/week @ 2021-08-10 395/week @ 2021-08-17 392/week @ 2021-08-24 256/week @ 2021-08-31 309/week @ 2021-09-07 264/week @ 2021-09-14 227/week @ 2021-09-21 200/week @ 2021-09-28 248/week @ 2021-10-05 323/week @ 2021-10-12 219/week @ 2021-10-19 318/week @ 2021-10-26 273/week @ 2021-11-02 310/week @ 2021-11-09 283/week @ 2021-11-16 280/week @ 2021-11-23

1,246 downloads per month
Used in 3 crates (via gemini-fetch)


942 lines

A low-level X.509 parsing and certificate signature verification library.

x509-signature can verify the signatures of X.509 certificates, as well as certificates made by their private keys. It can also verify that a certificate is valid for the given time. However, it is (by design) very low-level: it does not know about any X.509 extensions, and does not parse distinguished names at all. It also provides no path-building facilities. As such, it is not intended for use with the web PKI; use webpki for that.

x509-signature’s flexibiity is a double-edged sword: it allows it to be used in situations where webpki cannot be used, but it also makes it significantly more dangerous. As a general rule, x509-signature will accept any certificate that webpki will, but it will also accept certificates that webpki will reject. If you find a certificate that x509-signature rejects and webpki rejects, please report it as a bug.

x509-signature was developed for use with libp2p, which uses certificates that webpki cannot handle. Its bare-bones design ensures that it can handle almost any conforming X.509 certificate, but it also means that the application is responsible for ensuring that the certificate has valid X.509 extensions. x509-signature cannot distinguish between a certificate valid for mozilla.org and one for evilmalware.com! However, x509-signature does provide the hooks needed for higher-level libraries to be built on top of it.

Like webpki, x509-signature is zero-copy and #![no_std] friendly. If built without the alloc feature, x509-signature will not rely on features of ring that require heap allocation, specifically RSA. x509-signature should never panic on any input.


x509-signature is dual-licensed under the MIT license and the Apache License, Version 2.0, at your option.


~179K SLoC