2022-09-05 03:06:08 -04:00
|
|
|
/*
|
|
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
*/
|
|
|
|
|
2023-01-19 09:57:50 -05:00
|
|
|
// aTLS provides config generation functions to bootstrap attested TLS connections.
|
2022-03-22 11:03:15 -04:00
|
|
|
package atls
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/elliptic"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"crypto/x509/pkix"
|
2022-06-02 11:22:11 -04:00
|
|
|
"encoding/asn1"
|
2022-03-22 11:03:15 -04:00
|
|
|
"encoding/base64"
|
2022-06-15 09:58:23 -04:00
|
|
|
"encoding/json"
|
2022-03-22 11:03:15 -04:00
|
|
|
"errors"
|
2022-06-02 11:22:11 -04:00
|
|
|
"fmt"
|
|
|
|
"math/big"
|
2022-03-22 11:03:15 -04:00
|
|
|
"time"
|
|
|
|
|
2022-09-21 07:47:57 -04:00
|
|
|
"github.com/edgelesssys/constellation/v2/internal/crypto"
|
|
|
|
"github.com/edgelesssys/constellation/v2/internal/oid"
|
2022-03-22 11:03:15 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// CreateAttestationServerTLSConfig creates a tls.Config object with a self-signed certificate and an embedded attestation document.
|
2022-05-24 10:33:44 -04:00
|
|
|
// Pass a list of validators to enable mutual aTLS.
|
2022-05-25 03:34:05 -04:00
|
|
|
// If issuer is nil, no attestation will be embedded.
|
2022-05-24 10:33:44 -04:00
|
|
|
func CreateAttestationServerTLSConfig(issuer Issuer, validators []Validator) (*tls.Config, error) {
|
|
|
|
getConfigForClient, err := getATLSConfigForClientFunc(issuer, validators)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
|
|
|
|
return &tls.Config{
|
|
|
|
GetConfigForClient: getConfigForClient,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateAttestationClientTLSConfig creates a tls.Config object that verifies a certificate with an embedded attestation document.
|
2022-06-02 11:22:11 -04:00
|
|
|
//
|
|
|
|
// ATTENTION: The tls.Config ensures freshness of the server's attestation only for the first connection it is used for.
|
|
|
|
// If freshness is required, you must create a new tls.Config for each connection or ensure freshness on the protocol level.
|
|
|
|
// If freshness is not required, you can reuse this tls.Config.
|
|
|
|
//
|
2022-05-24 10:33:44 -04:00
|
|
|
// If no validators are set, the server's attestation document will not be verified.
|
2022-05-25 03:34:05 -04:00
|
|
|
// If issuer is nil, the client will be unable to perform mutual aTLS.
|
2022-05-24 10:33:44 -04:00
|
|
|
func CreateAttestationClientTLSConfig(issuer Issuer, validators []Validator) (*tls.Config, error) {
|
2022-07-26 04:58:39 -04:00
|
|
|
clientNonce, err := crypto.GenerateRandomBytes(crypto.RNGLengthDefault)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
clientConn := &clientConnection{
|
|
|
|
issuer: issuer,
|
|
|
|
validators: validators,
|
2022-06-02 11:18:42 -04:00
|
|
|
clientNonce: clientNonce,
|
2022-05-24 10:33:44 -04:00
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
return &tls.Config{
|
|
|
|
VerifyPeerCertificate: clientConn.verify,
|
2022-06-02 11:18:42 -04:00
|
|
|
GetClientCertificate: clientConn.getCertificate, // use custom certificate for mutual aTLS connections
|
|
|
|
InsecureSkipVerify: true, // disable default verification because we use our own verify func
|
|
|
|
ServerName: base64.StdEncoding.EncodeToString(clientNonce), // abuse ServerName as a channel to transmit the nonce
|
2022-05-24 10:33:44 -04:00
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
}, nil
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-11-09 09:57:54 -05:00
|
|
|
// Issuer issues an attestation document.
|
2022-05-24 10:33:44 -04:00
|
|
|
type Issuer interface {
|
|
|
|
oid.Getter
|
|
|
|
Issue(userData []byte, nonce []byte) (quote []byte, err error)
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-11-09 09:57:54 -05:00
|
|
|
// Validator is able to validate an attestation document.
|
2022-05-24 10:33:44 -04:00
|
|
|
type Validator interface {
|
|
|
|
oid.Getter
|
|
|
|
Validate(attDoc []byte, nonce []byte) ([]byte, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getATLSConfigForClientFunc returns a config setup function that is called once for every client connecting to the server.
|
|
|
|
// This allows for different server configuration for every client.
|
2022-06-02 11:22:11 -04:00
|
|
|
// In aTLS this is used to generate unique nonces for every client.
|
2022-05-24 10:33:44 -04:00
|
|
|
func getATLSConfigForClientFunc(issuer Issuer, validators []Validator) (func(*tls.ClientHelloInfo) (*tls.Config, error), error) {
|
|
|
|
// generate key for the server
|
|
|
|
priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// this function will be called once for every client
|
|
|
|
return func(chi *tls.ClientHelloInfo) (*tls.Config, error) {
|
|
|
|
// generate nonce for this connection
|
2022-07-26 04:58:39 -04:00
|
|
|
serverNonce, err := crypto.GenerateRandomBytes(crypto.RNGLengthDefault)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
serverConn := &serverConnection{
|
2022-06-02 11:18:42 -04:00
|
|
|
privKey: priv,
|
|
|
|
issuer: issuer,
|
|
|
|
validators: validators,
|
|
|
|
serverNonce: serverNonce,
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
|
2022-06-02 11:22:11 -04:00
|
|
|
cfg := &tls.Config{
|
|
|
|
VerifyPeerCertificate: serverConn.verify,
|
|
|
|
GetCertificate: serverConn.getCertificate,
|
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// enable mutual aTLS if any validators are set
|
|
|
|
if len(validators) > 0 {
|
2022-06-02 11:22:11 -04:00
|
|
|
cfg.ClientAuth = tls.RequireAnyClientCert // validity of certificate will be checked by our custom verify function
|
|
|
|
|
|
|
|
// ugly hack: abuse acceptable client CAs as a channel to transmit the nonce
|
|
|
|
if cfg.ClientCAs, err = encodeNonceToCertPool(serverNonce, priv); err != nil {
|
|
|
|
return nil, fmt.Errorf("encode nonce: %w", err)
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-06-02 11:22:11 -04:00
|
|
|
return cfg, nil
|
2022-05-24 10:33:44 -04:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getCertificate creates a client or server certificate for aTLS connections.
|
2022-06-02 11:22:11 -04:00
|
|
|
// The certificate uses certificate extensions to embed an attestation document generated using nonce.
|
|
|
|
func getCertificate(issuer Issuer, priv, pub any, nonce []byte) (*tls.Certificate, error) {
|
2022-07-26 04:58:39 -04:00
|
|
|
serialNumber, err := crypto.GenerateCertificateSerialNumber()
|
2022-05-24 10:33:44 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-05-25 03:34:05 -04:00
|
|
|
var extensions []pkix.Extension
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-05-25 03:34:05 -04:00
|
|
|
// create and embed attestation if quote Issuer is available
|
|
|
|
if issuer != nil {
|
|
|
|
hash, err := hashPublicKey(pub)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// create attestation document using the nonce send by the remote party
|
2022-06-02 11:22:11 -04:00
|
|
|
attDoc, err := issuer.Issue(hash, nonce)
|
2022-05-25 03:34:05 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
extensions = append(extensions, pkix.Extension{Id: issuer.OID(), Value: attDoc})
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-06-02 11:22:11 -04:00
|
|
|
// create certificate that includes the attestation document as extension
|
2022-05-24 10:33:44 -04:00
|
|
|
now := time.Now()
|
|
|
|
template := &x509.Certificate{
|
|
|
|
SerialNumber: serialNumber,
|
|
|
|
Subject: pkix.Name{CommonName: "Constellation"},
|
|
|
|
NotBefore: now.Add(-2 * time.Hour),
|
|
|
|
NotAfter: now.Add(2 * time.Hour),
|
|
|
|
ExtraExtensions: extensions,
|
|
|
|
}
|
|
|
|
cert, err := x509.CreateCertificate(rand.Reader, template, template, pub, priv)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
return &tls.Certificate{Certificate: [][]byte{cert}, PrivateKey: priv}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// processCertificate parses the certificate and verifies it.
|
|
|
|
// If successful returns the certificate and its hashed public key, an error otherwise.
|
2022-07-20 10:44:41 -04:00
|
|
|
func processCertificate(rawCerts [][]byte, _ [][]*x509.Certificate) (*x509.Certificate, []byte, error) {
|
2022-05-24 10:33:44 -04:00
|
|
|
// parse certificate
|
|
|
|
if len(rawCerts) == 0 {
|
|
|
|
return nil, nil, errors.New("rawCerts is empty")
|
|
|
|
}
|
|
|
|
cert, err := x509.ParseCertificate(rawCerts[0])
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// verify self-signed certificate
|
|
|
|
roots := x509.NewCertPool()
|
|
|
|
roots.AddCert(cert)
|
|
|
|
_, err = cert.Verify(x509.VerifyOptions{Roots: roots})
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// hash of certificates public key is used as userData in the embedded attestation document
|
|
|
|
hash, err := hashPublicKey(cert.PublicKey)
|
|
|
|
return cert, hash, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// verifyEmbeddedReport verifies an aTLS certificate by validating the attestation document embedded in the TLS certificate.
|
|
|
|
func verifyEmbeddedReport(validators []Validator, cert *x509.Certificate, hash, nonce []byte) error {
|
|
|
|
for _, ex := range cert.Extensions {
|
|
|
|
for _, validator := range validators {
|
|
|
|
if ex.Id.Equal(validator.OID()) {
|
|
|
|
userData, err := validator.Validate(ex.Value, nonce)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !bytes.Equal(userData, hash) {
|
|
|
|
return errors.New("certificate hash does not match user data")
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
return nil
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
return errors.New("certificate does not contain attestation document")
|
|
|
|
}
|
|
|
|
|
|
|
|
func hashPublicKey(pub any) ([]byte, error) {
|
|
|
|
pubBytes, err := x509.MarshalPKIXPublicKey(pub)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
result := sha256.Sum256(pubBytes)
|
|
|
|
return result[:], nil
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
2022-06-02 11:22:11 -04:00
|
|
|
// encodeNonceToCertPool returns a cert pool that contains a certificate whose CN is the base64-encoded nonce.
|
|
|
|
func encodeNonceToCertPool(nonce []byte, privKey *ecdsa.PrivateKey) (*x509.CertPool, error) {
|
|
|
|
template := &x509.Certificate{
|
|
|
|
SerialNumber: &big.Int{},
|
|
|
|
Subject: pkix.Name{CommonName: base64.StdEncoding.EncodeToString(nonce)},
|
|
|
|
}
|
|
|
|
der, err := x509.CreateCertificate(rand.Reader, template, template, &privKey.PublicKey, privKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
cert, err := x509.ParseCertificate(der)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pool := x509.NewCertPool()
|
|
|
|
pool.AddCert(cert)
|
|
|
|
return pool, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// decodeNonceFromAcceptableCAs interprets the CN of acceptableCAs[0] as base64-encoded nonce and returns the decoded nonce.
|
|
|
|
// acceptableCAs should have been received by a client where the server used encodeNonceToCertPool to transmit the nonce.
|
|
|
|
func decodeNonceFromAcceptableCAs(acceptableCAs [][]byte) ([]byte, error) {
|
|
|
|
if len(acceptableCAs) != 1 {
|
|
|
|
return nil, errors.New("unexpected acceptableCAs length")
|
|
|
|
}
|
|
|
|
var rdnSeq pkix.RDNSequence
|
|
|
|
if _, err := asn1.Unmarshal(acceptableCAs[0], &rdnSeq); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// https://github.com/golang/go/blob/19309779ac5e2f5a2fd3cbb34421dafb2855ac21/src/crypto/x509/pkix/pkix.go#L188
|
|
|
|
oidCommonName := asn1.ObjectIdentifier{2, 5, 4, 3}
|
|
|
|
|
|
|
|
for _, rdnSet := range rdnSeq {
|
|
|
|
for _, rdn := range rdnSet {
|
|
|
|
if rdn.Type.Equal(oidCommonName) {
|
|
|
|
nonce, ok := rdn.Value.(string)
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("unexpected RDN type")
|
|
|
|
}
|
|
|
|
return base64.StdEncoding.DecodeString(nonce)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, errors.New("CN not found")
|
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// clientConnection holds state for client to server connections.
|
|
|
|
type clientConnection struct {
|
|
|
|
issuer Issuer
|
|
|
|
validators []Validator
|
|
|
|
clientNonce []byte
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// verify the validity of an aTLS server certificate.
|
|
|
|
func (c *clientConnection) verify(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
|
|
|
cert, hash, err := processCertificate(rawCerts, verifiedChains)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// don't perform verification of attestation document if no validators are set
|
|
|
|
if len(c.validators) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return verifyEmbeddedReport(c.validators, cert, hash, c.clientNonce)
|
|
|
|
}
|
|
|
|
|
|
|
|
// getCertificate generates a client certificate for mutual aTLS connections.
|
2022-06-02 11:22:11 -04:00
|
|
|
func (c *clientConnection) getCertificate(cri *tls.CertificateRequestInfo) (*tls.Certificate, error) {
|
2022-05-24 10:33:44 -04:00
|
|
|
// generate and hash key
|
|
|
|
priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-06-02 11:22:11 -04:00
|
|
|
// ugly hack: abuse acceptable client CAs as a channel to receive the nonce
|
|
|
|
serverNonce, err := decodeNonceFromAcceptableCAs(cri.AcceptableCAs)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("decode nonce: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return getCertificate(c.issuer, priv, &priv.PublicKey, serverNonce)
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// serverConnection holds state for server to client connections.
|
|
|
|
type serverConnection struct {
|
2022-06-02 11:18:42 -04:00
|
|
|
issuer Issuer
|
|
|
|
validators []Validator
|
|
|
|
privKey *ecdsa.PrivateKey
|
|
|
|
serverNonce []byte
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// verify the validity of a clients aTLS certificate.
|
|
|
|
// Only needed for mutual aTLS.
|
|
|
|
func (c *serverConnection) verify(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
|
|
|
cert, hash, err := processCertificate(rawCerts, verifiedChains)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-06-02 11:18:42 -04:00
|
|
|
return verifyEmbeddedReport(c.validators, cert, hash, c.serverNonce)
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-05-24 10:33:44 -04:00
|
|
|
// getCertificate generates a client certificate for aTLS connections.
|
|
|
|
// Can be used for mutual as well as basic aTLS.
|
|
|
|
func (c *serverConnection) getCertificate(chi *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
|
|
// abuse ServerName as a channel to receive the nonce
|
|
|
|
clientNonce, err := base64.StdEncoding.DecodeString(chi.ServerName)
|
2022-03-22 11:03:15 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-05-24 10:33:44 -04:00
|
|
|
|
|
|
|
// create aTLS certificate using the nonce as extracted from the client-hello message
|
2022-06-02 11:22:11 -04:00
|
|
|
return getCertificate(c.issuer, c.privKey, &c.privKey.PublicKey, clientNonce)
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
2022-06-15 09:58:23 -04:00
|
|
|
|
|
|
|
// FakeIssuer fakes an issuer and can be used for tests.
|
|
|
|
type FakeIssuer struct {
|
|
|
|
oid.Getter
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewFakeIssuer creates a new FakeIssuer with the given OID.
|
|
|
|
func NewFakeIssuer(oid oid.Getter) *FakeIssuer {
|
|
|
|
return &FakeIssuer{oid}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Issue marshals the user data and returns it.
|
|
|
|
func (FakeIssuer) Issue(userData []byte, nonce []byte) ([]byte, error) {
|
|
|
|
return json.Marshal(FakeAttestationDoc{UserData: userData, Nonce: nonce})
|
|
|
|
}
|
|
|
|
|
|
|
|
// FakeValidator fakes a validator and can be used for tests.
|
|
|
|
type FakeValidator struct {
|
|
|
|
oid.Getter
|
|
|
|
err error // used for package internal testing only
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewFakeValidator creates a new FakeValidator with the given OID.
|
|
|
|
func NewFakeValidator(oid oid.Getter) *FakeValidator {
|
|
|
|
return &FakeValidator{oid, nil}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewFakeValidators returns a slice with a single FakeValidator.
|
|
|
|
func NewFakeValidators(oid oid.Getter) []Validator {
|
|
|
|
return []Validator{NewFakeValidator(oid)}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate unmarshals the attestation document and verifies the nonce.
|
|
|
|
func (v FakeValidator) Validate(attDoc []byte, nonce []byte) ([]byte, error) {
|
|
|
|
var doc FakeAttestationDoc
|
|
|
|
if err := json.Unmarshal(attDoc, &doc); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(doc.Nonce, nonce) {
|
|
|
|
return nil, fmt.Errorf("invalid nonce: expected %x, got %x", doc.Nonce, nonce)
|
|
|
|
}
|
|
|
|
|
|
|
|
return doc.UserData, v.err
|
|
|
|
}
|
|
|
|
|
|
|
|
// FakeAttestationDoc is a fake attestation document used for testing.
|
|
|
|
type FakeAttestationDoc struct {
|
|
|
|
UserData []byte
|
|
|
|
Nonce []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type fakeOID struct {
|
|
|
|
asn1.ObjectIdentifier
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o fakeOID) OID() asn1.ObjectIdentifier {
|
|
|
|
return o.ObjectIdentifier
|
|
|
|
}
|