repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequence | docstring
stringlengths 6
2.61k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 85
252
| partition
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|
cloudflare/cfssl | api/client/client.go | Sign | func (ar *AuthRemote) Sign(req []byte) ([]byte, error) {
return ar.AuthSign(req, nil, ar.provider)
} | go | func (ar *AuthRemote) Sign(req []byte) ([]byte, error) {
return ar.AuthSign(req, nil, ar.provider)
} | [
"func",
"(",
"ar",
"*",
"AuthRemote",
")",
"Sign",
"(",
"req",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"return",
"ar",
".",
"AuthSign",
"(",
"req",
",",
"nil",
",",
"ar",
".",
"provider",
")",
"\n",
"}"
] | // Sign is overloaded to perform an AuthSign request using the default auth provider. | [
"Sign",
"is",
"overloaded",
"to",
"perform",
"an",
"AuthSign",
"request",
"using",
"the",
"default",
"auth",
"provider",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/client/client.go#L327-L329 | train |
cloudflare/cfssl | cmd/multirootca/api.go | incRequests | func incRequests() {
stats.TotalRequestRate.Mark(1)
eCtr := float64(stats.ErrorRate.Count())
rCtr := float64(stats.TotalRequestRate.Count())
stats.ErrorPercent.Update(eCtr / rCtr * 100)
} | go | func incRequests() {
stats.TotalRequestRate.Mark(1)
eCtr := float64(stats.ErrorRate.Count())
rCtr := float64(stats.TotalRequestRate.Count())
stats.ErrorPercent.Update(eCtr / rCtr * 100)
} | [
"func",
"incRequests",
"(",
")",
"{",
"stats",
".",
"TotalRequestRate",
".",
"Mark",
"(",
"1",
")",
"\n",
"eCtr",
":=",
"float64",
"(",
"stats",
".",
"ErrorRate",
".",
"Count",
"(",
")",
")",
"\n",
"rCtr",
":=",
"float64",
"(",
"stats",
".",
"TotalRequestRate",
".",
"Count",
"(",
")",
")",
"\n",
"stats",
".",
"ErrorPercent",
".",
"Update",
"(",
"eCtr",
"/",
"rCtr",
"*",
"100",
")",
"\n",
"}"
] | // incRequests increments the request count and updates the error percentage. | [
"incRequests",
"increments",
"the",
"request",
"count",
"and",
"updates",
"the",
"error",
"percentage",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cmd/multirootca/api.go#L69-L74 | train |
cloudflare/cfssl | log/log.go | Fatalf | func Fatalf(format string, v ...interface{}) {
outputf(LevelFatal, format, v)
os.Exit(1)
} | go | func Fatalf(format string, v ...interface{}) {
outputf(LevelFatal, format, v)
os.Exit(1)
} | [
"func",
"Fatalf",
"(",
"format",
"string",
",",
"v",
"...",
"interface",
"{",
"}",
")",
"{",
"outputf",
"(",
"LevelFatal",
",",
"format",
",",
"v",
")",
"\n",
"os",
".",
"Exit",
"(",
"1",
")",
"\n",
"}"
] | // Fatalf logs a formatted message at the "fatal" level and then exits. The
// arguments are handled in the same manner as fmt.Printf. | [
"Fatalf",
"logs",
"a",
"formatted",
"message",
"at",
"the",
"fatal",
"level",
"and",
"then",
"exits",
".",
"The",
"arguments",
"are",
"handled",
"in",
"the",
"same",
"manner",
"as",
"fmt",
".",
"Printf",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/log/log.go#L98-L101 | train |
cloudflare/cfssl | scan/crypto/tls/tls.go | Dial | func Dial(network, addr string, config *Config) (*Conn, error) {
return DialWithDialer(new(net.Dialer), network, addr, config)
} | go | func Dial(network, addr string, config *Config) (*Conn, error) {
return DialWithDialer(new(net.Dialer), network, addr, config)
} | [
"func",
"Dial",
"(",
"network",
",",
"addr",
"string",
",",
"config",
"*",
"Config",
")",
"(",
"*",
"Conn",
",",
"error",
")",
"{",
"return",
"DialWithDialer",
"(",
"new",
"(",
"net",
".",
"Dialer",
")",
",",
"network",
",",
"addr",
",",
"config",
")",
"\n",
"}"
] | // Dial connects to the given network address using net.Dial
// and then initiates a TLS handshake, returning the resulting
// TLS connection.
// Dial interprets a nil configuration as equivalent to
// the zero configuration; see the documentation of Config
// for the defaults. | [
"Dial",
"connects",
"to",
"the",
"given",
"network",
"address",
"using",
"net",
".",
"Dial",
"and",
"then",
"initiates",
"a",
"TLS",
"handshake",
"returning",
"the",
"resulting",
"TLS",
"connection",
".",
"Dial",
"interprets",
"a",
"nil",
"configuration",
"as",
"equivalent",
"to",
"the",
"zero",
"configuration",
";",
"see",
"the",
"documentation",
"of",
"Config",
"for",
"the",
"defaults",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/tls.go#L170-L172 | train |
cloudflare/cfssl | transport/roots/provider.go | Pool | func (ts *TrustStore) Pool() *x509.CertPool {
var pool = x509.NewCertPool()
for _, cert := range ts.roots {
pool.AddCert(cert)
}
return pool
} | go | func (ts *TrustStore) Pool() *x509.CertPool {
var pool = x509.NewCertPool()
for _, cert := range ts.roots {
pool.AddCert(cert)
}
return pool
} | [
"func",
"(",
"ts",
"*",
"TrustStore",
")",
"Pool",
"(",
")",
"*",
"x509",
".",
"CertPool",
"{",
"var",
"pool",
"=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"for",
"_",
",",
"cert",
":=",
"range",
"ts",
".",
"roots",
"{",
"pool",
".",
"AddCert",
"(",
"cert",
")",
"\n",
"}",
"\n",
"return",
"pool",
"\n",
"}"
] | // Pool returns a certificate pool containing the certificates
// loaded into the provider. | [
"Pool",
"returns",
"a",
"certificate",
"pool",
"containing",
"the",
"certificates",
"loaded",
"into",
"the",
"provider",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/provider.go#L30-L36 | train |
cloudflare/cfssl | transport/roots/provider.go | Certificates | func (ts *TrustStore) Certificates() []*x509.Certificate {
var roots = make([]*x509.Certificate, 0, len(ts.roots))
for _, cert := range ts.roots {
roots = append(roots, cert)
}
return roots
} | go | func (ts *TrustStore) Certificates() []*x509.Certificate {
var roots = make([]*x509.Certificate, 0, len(ts.roots))
for _, cert := range ts.roots {
roots = append(roots, cert)
}
return roots
} | [
"func",
"(",
"ts",
"*",
"TrustStore",
")",
"Certificates",
"(",
")",
"[",
"]",
"*",
"x509",
".",
"Certificate",
"{",
"var",
"roots",
"=",
"make",
"(",
"[",
"]",
"*",
"x509",
".",
"Certificate",
",",
"0",
",",
"len",
"(",
"ts",
".",
"roots",
")",
")",
"\n",
"for",
"_",
",",
"cert",
":=",
"range",
"ts",
".",
"roots",
"{",
"roots",
"=",
"append",
"(",
"roots",
",",
"cert",
")",
"\n",
"}",
"\n",
"return",
"roots",
"\n",
"}"
] | // Certificates returns a slice of the loaded certificates. | [
"Certificates",
"returns",
"a",
"slice",
"of",
"the",
"loaded",
"certificates",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/provider.go#L39-L45 | train |
cloudflare/cfssl | transport/roots/provider.go | New | func New(rootDefs []*core.Root) (*TrustStore, error) {
var err error
var store = &TrustStore{}
var roots []*x509.Certificate
if len(rootDefs) == 0 {
roots, err = system.New(nil)
if err != nil {
return nil, err
}
store.addCerts(roots)
return store, nil
}
err = errors.New("transport: no supported root providers found")
for _, root := range rootDefs {
pfn, ok := Providers[root.Type]
if ok {
roots, err = pfn(root.Metadata)
if err != nil {
break
}
store.addCerts(roots)
}
}
if err != nil {
store = nil
}
return store, err
} | go | func New(rootDefs []*core.Root) (*TrustStore, error) {
var err error
var store = &TrustStore{}
var roots []*x509.Certificate
if len(rootDefs) == 0 {
roots, err = system.New(nil)
if err != nil {
return nil, err
}
store.addCerts(roots)
return store, nil
}
err = errors.New("transport: no supported root providers found")
for _, root := range rootDefs {
pfn, ok := Providers[root.Type]
if ok {
roots, err = pfn(root.Metadata)
if err != nil {
break
}
store.addCerts(roots)
}
}
if err != nil {
store = nil
}
return store, err
} | [
"func",
"New",
"(",
"rootDefs",
"[",
"]",
"*",
"core",
".",
"Root",
")",
"(",
"*",
"TrustStore",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"var",
"store",
"=",
"&",
"TrustStore",
"{",
"}",
"\n",
"var",
"roots",
"[",
"]",
"*",
"x509",
".",
"Certificate",
"\n\n",
"if",
"len",
"(",
"rootDefs",
")",
"==",
"0",
"{",
"roots",
",",
"err",
"=",
"system",
".",
"New",
"(",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"store",
".",
"addCerts",
"(",
"roots",
")",
"\n",
"return",
"store",
",",
"nil",
"\n",
"}",
"\n\n",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"for",
"_",
",",
"root",
":=",
"range",
"rootDefs",
"{",
"pfn",
",",
"ok",
":=",
"Providers",
"[",
"root",
".",
"Type",
"]",
"\n",
"if",
"ok",
"{",
"roots",
",",
"err",
"=",
"pfn",
"(",
"root",
".",
"Metadata",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"break",
"\n",
"}",
"\n\n",
"store",
".",
"addCerts",
"(",
"roots",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"store",
"=",
"nil",
"\n",
"}",
"\n",
"return",
"store",
",",
"err",
"\n",
"}"
] | // New produces a new trusted root provider from a collection of
// roots. If there are no roots, the system roots will be used. | [
"New",
"produces",
"a",
"new",
"trusted",
"root",
"provider",
"from",
"a",
"collection",
"of",
"roots",
".",
"If",
"there",
"are",
"no",
"roots",
"the",
"system",
"roots",
"will",
"be",
"used",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/provider.go#L74-L107 | train |
cloudflare/cfssl | transport/roots/provider.go | TrustPEM | func TrustPEM(metadata map[string]string) ([]*x509.Certificate, error) {
sourceFile, ok := metadata["source"]
if !ok {
return nil, errors.New("transport: PEM source requires a source file")
}
in, err := ioutil.ReadFile(sourceFile)
if err != nil {
return nil, err
}
return helpers.ParseCertificatesPEM(in)
} | go | func TrustPEM(metadata map[string]string) ([]*x509.Certificate, error) {
sourceFile, ok := metadata["source"]
if !ok {
return nil, errors.New("transport: PEM source requires a source file")
}
in, err := ioutil.ReadFile(sourceFile)
if err != nil {
return nil, err
}
return helpers.ParseCertificatesPEM(in)
} | [
"func",
"TrustPEM",
"(",
"metadata",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"[",
"]",
"*",
"x509",
".",
"Certificate",
",",
"error",
")",
"{",
"sourceFile",
",",
"ok",
":=",
"metadata",
"[",
"\"",
"\"",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"in",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"sourceFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"helpers",
".",
"ParseCertificatesPEM",
"(",
"in",
")",
"\n",
"}"
] | // TrustPEM takes a source file containing one or more certificates
// and adds them to the trust store. | [
"TrustPEM",
"takes",
"a",
"source",
"file",
"containing",
"one",
"or",
"more",
"certificates",
"and",
"adds",
"them",
"to",
"the",
"trust",
"store",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/provider.go#L111-L123 | train |
cloudflare/cfssl | helpers/helpers.go | InclusiveDate | func InclusiveDate(year int, month time.Month, day int) time.Time {
return time.Date(year, month, day, 0, 0, 0, 0, time.UTC).Add(-1 * time.Nanosecond)
} | go | func InclusiveDate(year int, month time.Month, day int) time.Time {
return time.Date(year, month, day, 0, 0, 0, 0, time.UTC).Add(-1 * time.Nanosecond)
} | [
"func",
"InclusiveDate",
"(",
"year",
"int",
",",
"month",
"time",
".",
"Month",
",",
"day",
"int",
")",
"time",
".",
"Time",
"{",
"return",
"time",
".",
"Date",
"(",
"year",
",",
"month",
",",
"day",
",",
"0",
",",
"0",
",",
"0",
",",
"0",
",",
"time",
".",
"UTC",
")",
".",
"Add",
"(",
"-",
"1",
"*",
"time",
".",
"Nanosecond",
")",
"\n",
"}"
] | // InclusiveDate returns the time.Time representation of a date - 1
// nanosecond. This allows time.After to be used inclusively. | [
"InclusiveDate",
"returns",
"the",
"time",
".",
"Time",
"representation",
"of",
"a",
"date",
"-",
"1",
"nanosecond",
".",
"This",
"allows",
"time",
".",
"After",
"to",
"be",
"used",
"inclusively",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L44-L46 | train |
cloudflare/cfssl | helpers/helpers.go | KeyLength | func KeyLength(key interface{}) int {
if key == nil {
return 0
}
if ecdsaKey, ok := key.(*ecdsa.PublicKey); ok {
return ecdsaKey.Curve.Params().BitSize
} else if rsaKey, ok := key.(*rsa.PublicKey); ok {
return rsaKey.N.BitLen()
}
return 0
} | go | func KeyLength(key interface{}) int {
if key == nil {
return 0
}
if ecdsaKey, ok := key.(*ecdsa.PublicKey); ok {
return ecdsaKey.Curve.Params().BitSize
} else if rsaKey, ok := key.(*rsa.PublicKey); ok {
return rsaKey.N.BitLen()
}
return 0
} | [
"func",
"KeyLength",
"(",
"key",
"interface",
"{",
"}",
")",
"int",
"{",
"if",
"key",
"==",
"nil",
"{",
"return",
"0",
"\n",
"}",
"\n",
"if",
"ecdsaKey",
",",
"ok",
":=",
"key",
".",
"(",
"*",
"ecdsa",
".",
"PublicKey",
")",
";",
"ok",
"{",
"return",
"ecdsaKey",
".",
"Curve",
".",
"Params",
"(",
")",
".",
"BitSize",
"\n",
"}",
"else",
"if",
"rsaKey",
",",
"ok",
":=",
"key",
".",
"(",
"*",
"rsa",
".",
"PublicKey",
")",
";",
"ok",
"{",
"return",
"rsaKey",
".",
"N",
".",
"BitLen",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"0",
"\n",
"}"
] | // KeyLength returns the bit size of ECDSA or RSA PublicKey | [
"KeyLength",
"returns",
"the",
"bit",
"size",
"of",
"ECDSA",
"or",
"RSA",
"PublicKey"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L57-L68 | train |
cloudflare/cfssl | helpers/helpers.go | ExpiryTime | func ExpiryTime(chain []*x509.Certificate) (notAfter time.Time) {
if len(chain) == 0 {
return
}
notAfter = chain[0].NotAfter
for _, cert := range chain {
if notAfter.After(cert.NotAfter) {
notAfter = cert.NotAfter
}
}
return
} | go | func ExpiryTime(chain []*x509.Certificate) (notAfter time.Time) {
if len(chain) == 0 {
return
}
notAfter = chain[0].NotAfter
for _, cert := range chain {
if notAfter.After(cert.NotAfter) {
notAfter = cert.NotAfter
}
}
return
} | [
"func",
"ExpiryTime",
"(",
"chain",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"(",
"notAfter",
"time",
".",
"Time",
")",
"{",
"if",
"len",
"(",
"chain",
")",
"==",
"0",
"{",
"return",
"\n",
"}",
"\n\n",
"notAfter",
"=",
"chain",
"[",
"0",
"]",
".",
"NotAfter",
"\n",
"for",
"_",
",",
"cert",
":=",
"range",
"chain",
"{",
"if",
"notAfter",
".",
"After",
"(",
"cert",
".",
"NotAfter",
")",
"{",
"notAfter",
"=",
"cert",
".",
"NotAfter",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"\n",
"}"
] | // ExpiryTime returns the time when the certificate chain is expired. | [
"ExpiryTime",
"returns",
"the",
"time",
"when",
"the",
"certificate",
"chain",
"is",
"expired",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L71-L83 | train |
cloudflare/cfssl | helpers/helpers.go | MonthsValid | func MonthsValid(c *x509.Certificate) int {
issued := c.NotBefore
expiry := c.NotAfter
years := (expiry.Year() - issued.Year())
months := years*12 + int(expiry.Month()) - int(issued.Month())
// Round up if valid for less than a full month
if expiry.Day() > issued.Day() {
months++
}
return months
} | go | func MonthsValid(c *x509.Certificate) int {
issued := c.NotBefore
expiry := c.NotAfter
years := (expiry.Year() - issued.Year())
months := years*12 + int(expiry.Month()) - int(issued.Month())
// Round up if valid for less than a full month
if expiry.Day() > issued.Day() {
months++
}
return months
} | [
"func",
"MonthsValid",
"(",
"c",
"*",
"x509",
".",
"Certificate",
")",
"int",
"{",
"issued",
":=",
"c",
".",
"NotBefore",
"\n",
"expiry",
":=",
"c",
".",
"NotAfter",
"\n",
"years",
":=",
"(",
"expiry",
".",
"Year",
"(",
")",
"-",
"issued",
".",
"Year",
"(",
")",
")",
"\n",
"months",
":=",
"years",
"*",
"12",
"+",
"int",
"(",
"expiry",
".",
"Month",
"(",
")",
")",
"-",
"int",
"(",
"issued",
".",
"Month",
"(",
")",
")",
"\n\n",
"// Round up if valid for less than a full month",
"if",
"expiry",
".",
"Day",
"(",
")",
">",
"issued",
".",
"Day",
"(",
")",
"{",
"months",
"++",
"\n",
"}",
"\n",
"return",
"months",
"\n",
"}"
] | // MonthsValid returns the number of months for which a certificate is valid. | [
"MonthsValid",
"returns",
"the",
"number",
"of",
"months",
"for",
"which",
"a",
"certificate",
"is",
"valid",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L86-L97 | train |
cloudflare/cfssl | helpers/helpers.go | SignatureString | func SignatureString(alg x509.SignatureAlgorithm) string {
switch alg {
case x509.MD2WithRSA:
return "MD2WithRSA"
case x509.MD5WithRSA:
return "MD5WithRSA"
case x509.SHA1WithRSA:
return "SHA1WithRSA"
case x509.SHA256WithRSA:
return "SHA256WithRSA"
case x509.SHA384WithRSA:
return "SHA384WithRSA"
case x509.SHA512WithRSA:
return "SHA512WithRSA"
case x509.DSAWithSHA1:
return "DSAWithSHA1"
case x509.DSAWithSHA256:
return "DSAWithSHA256"
case x509.ECDSAWithSHA1:
return "ECDSAWithSHA1"
case x509.ECDSAWithSHA256:
return "ECDSAWithSHA256"
case x509.ECDSAWithSHA384:
return "ECDSAWithSHA384"
case x509.ECDSAWithSHA512:
return "ECDSAWithSHA512"
default:
return "Unknown Signature"
}
} | go | func SignatureString(alg x509.SignatureAlgorithm) string {
switch alg {
case x509.MD2WithRSA:
return "MD2WithRSA"
case x509.MD5WithRSA:
return "MD5WithRSA"
case x509.SHA1WithRSA:
return "SHA1WithRSA"
case x509.SHA256WithRSA:
return "SHA256WithRSA"
case x509.SHA384WithRSA:
return "SHA384WithRSA"
case x509.SHA512WithRSA:
return "SHA512WithRSA"
case x509.DSAWithSHA1:
return "DSAWithSHA1"
case x509.DSAWithSHA256:
return "DSAWithSHA256"
case x509.ECDSAWithSHA1:
return "ECDSAWithSHA1"
case x509.ECDSAWithSHA256:
return "ECDSAWithSHA256"
case x509.ECDSAWithSHA384:
return "ECDSAWithSHA384"
case x509.ECDSAWithSHA512:
return "ECDSAWithSHA512"
default:
return "Unknown Signature"
}
} | [
"func",
"SignatureString",
"(",
"alg",
"x509",
".",
"SignatureAlgorithm",
")",
"string",
"{",
"switch",
"alg",
"{",
"case",
"x509",
".",
"MD2WithRSA",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"MD5WithRSA",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"SHA1WithRSA",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"SHA256WithRSA",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"SHA384WithRSA",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"SHA512WithRSA",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"DSAWithSHA1",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"DSAWithSHA256",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"ECDSAWithSHA1",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"ECDSAWithSHA256",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"ECDSAWithSHA384",
":",
"return",
"\"",
"\"",
"\n",
"case",
"x509",
".",
"ECDSAWithSHA512",
":",
"return",
"\"",
"\"",
"\n",
"default",
":",
"return",
"\"",
"\"",
"\n",
"}",
"\n",
"}"
] | // SignatureString returns the TLS signature string corresponding to
// an X509 signature algorithm. | [
"SignatureString",
"returns",
"the",
"TLS",
"signature",
"string",
"corresponding",
"to",
"an",
"X509",
"signature",
"algorithm",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L123-L152 | train |
cloudflare/cfssl | helpers/helpers.go | StringTLSVersion | func StringTLSVersion(version string) uint16 {
switch version {
case "1.2":
return tls.VersionTLS12
case "1.1":
return tls.VersionTLS11
default:
return tls.VersionTLS10
}
} | go | func StringTLSVersion(version string) uint16 {
switch version {
case "1.2":
return tls.VersionTLS12
case "1.1":
return tls.VersionTLS11
default:
return tls.VersionTLS10
}
} | [
"func",
"StringTLSVersion",
"(",
"version",
"string",
")",
"uint16",
"{",
"switch",
"version",
"{",
"case",
"\"",
"\"",
":",
"return",
"tls",
".",
"VersionTLS12",
"\n",
"case",
"\"",
"\"",
":",
"return",
"tls",
".",
"VersionTLS11",
"\n",
"default",
":",
"return",
"tls",
".",
"VersionTLS10",
"\n",
"}",
"\n",
"}"
] | // StringTLSVersion returns underlying enum values from human names for TLS
// versions, defaults to current golang default of TLS 1.0 | [
"StringTLSVersion",
"returns",
"underlying",
"enum",
"values",
"from",
"human",
"names",
"for",
"TLS",
"versions",
"defaults",
"to",
"current",
"golang",
"default",
"of",
"TLS",
"1",
".",
"0"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L189-L198 | train |
cloudflare/cfssl | helpers/helpers.go | EncodeCertificatesPEM | func EncodeCertificatesPEM(certs []*x509.Certificate) []byte {
var buffer bytes.Buffer
for _, cert := range certs {
pem.Encode(&buffer, &pem.Block{
Type: "CERTIFICATE",
Bytes: cert.Raw,
})
}
return buffer.Bytes()
} | go | func EncodeCertificatesPEM(certs []*x509.Certificate) []byte {
var buffer bytes.Buffer
for _, cert := range certs {
pem.Encode(&buffer, &pem.Block{
Type: "CERTIFICATE",
Bytes: cert.Raw,
})
}
return buffer.Bytes()
} | [
"func",
"EncodeCertificatesPEM",
"(",
"certs",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"[",
"]",
"byte",
"{",
"var",
"buffer",
"bytes",
".",
"Buffer",
"\n",
"for",
"_",
",",
"cert",
":=",
"range",
"certs",
"{",
"pem",
".",
"Encode",
"(",
"&",
"buffer",
",",
"&",
"pem",
".",
"Block",
"{",
"Type",
":",
"\"",
"\"",
",",
"Bytes",
":",
"cert",
".",
"Raw",
",",
"}",
")",
"\n",
"}",
"\n\n",
"return",
"buffer",
".",
"Bytes",
"(",
")",
"\n",
"}"
] | // EncodeCertificatesPEM encodes a number of x509 certificates to PEM | [
"EncodeCertificatesPEM",
"encodes",
"a",
"number",
"of",
"x509",
"certificates",
"to",
"PEM"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L201-L211 | train |
cloudflare/cfssl | helpers/helpers.go | ParseSelfSignedCertificatePEM | func ParseSelfSignedCertificatePEM(certPEM []byte) (*x509.Certificate, error) {
cert, err := ParseCertificatePEM(certPEM)
if err != nil {
return nil, err
}
if err := cert.CheckSignature(cert.SignatureAlgorithm, cert.RawTBSCertificate, cert.Signature); err != nil {
return nil, cferr.Wrap(cferr.CertificateError, cferr.VerifyFailed, err)
}
return cert, nil
} | go | func ParseSelfSignedCertificatePEM(certPEM []byte) (*x509.Certificate, error) {
cert, err := ParseCertificatePEM(certPEM)
if err != nil {
return nil, err
}
if err := cert.CheckSignature(cert.SignatureAlgorithm, cert.RawTBSCertificate, cert.Signature); err != nil {
return nil, cferr.Wrap(cferr.CertificateError, cferr.VerifyFailed, err)
}
return cert, nil
} | [
"func",
"ParseSelfSignedCertificatePEM",
"(",
"certPEM",
"[",
"]",
"byte",
")",
"(",
"*",
"x509",
".",
"Certificate",
",",
"error",
")",
"{",
"cert",
",",
"err",
":=",
"ParseCertificatePEM",
"(",
"certPEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"cert",
".",
"CheckSignature",
"(",
"cert",
".",
"SignatureAlgorithm",
",",
"cert",
".",
"RawTBSCertificate",
",",
"cert",
".",
"Signature",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"cferr",
".",
"Wrap",
"(",
"cferr",
".",
"CertificateError",
",",
"cferr",
".",
"VerifyFailed",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"cert",
",",
"nil",
"\n",
"}"
] | // ParseSelfSignedCertificatePEM parses a PEM-encoded certificate and check if it is self-signed. | [
"ParseSelfSignedCertificatePEM",
"parses",
"a",
"PEM",
"-",
"encoded",
"certificate",
"and",
"check",
"if",
"it",
"is",
"self",
"-",
"signed",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L272-L282 | train |
cloudflare/cfssl | helpers/helpers.go | LoadPEMCertPool | func LoadPEMCertPool(certsFile string) (*x509.CertPool, error) {
if certsFile == "" {
return nil, nil
}
pemCerts, err := ioutil.ReadFile(certsFile)
if err != nil {
return nil, err
}
return PEMToCertPool(pemCerts)
} | go | func LoadPEMCertPool(certsFile string) (*x509.CertPool, error) {
if certsFile == "" {
return nil, nil
}
pemCerts, err := ioutil.ReadFile(certsFile)
if err != nil {
return nil, err
}
return PEMToCertPool(pemCerts)
} | [
"func",
"LoadPEMCertPool",
"(",
"certsFile",
"string",
")",
"(",
"*",
"x509",
".",
"CertPool",
",",
"error",
")",
"{",
"if",
"certsFile",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"pemCerts",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"certsFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"PEMToCertPool",
"(",
"pemCerts",
")",
"\n",
"}"
] | // LoadPEMCertPool loads a pool of PEM certificates from file. | [
"LoadPEMCertPool",
"loads",
"a",
"pool",
"of",
"PEM",
"certificates",
"from",
"file",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L334-L344 | train |
cloudflare/cfssl | helpers/helpers.go | PEMToCertPool | func PEMToCertPool(pemCerts []byte) (*x509.CertPool, error) {
if len(pemCerts) == 0 {
return nil, nil
}
certPool := x509.NewCertPool()
if !certPool.AppendCertsFromPEM(pemCerts) {
return nil, errors.New("failed to load cert pool")
}
return certPool, nil
} | go | func PEMToCertPool(pemCerts []byte) (*x509.CertPool, error) {
if len(pemCerts) == 0 {
return nil, nil
}
certPool := x509.NewCertPool()
if !certPool.AppendCertsFromPEM(pemCerts) {
return nil, errors.New("failed to load cert pool")
}
return certPool, nil
} | [
"func",
"PEMToCertPool",
"(",
"pemCerts",
"[",
"]",
"byte",
")",
"(",
"*",
"x509",
".",
"CertPool",
",",
"error",
")",
"{",
"if",
"len",
"(",
"pemCerts",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"certPool",
":=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"if",
"!",
"certPool",
".",
"AppendCertsFromPEM",
"(",
"pemCerts",
")",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"certPool",
",",
"nil",
"\n",
"}"
] | // PEMToCertPool concerts PEM certificates to a CertPool. | [
"PEMToCertPool",
"concerts",
"PEM",
"certificates",
"to",
"a",
"CertPool",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L347-L358 | train |
cloudflare/cfssl | helpers/helpers.go | GetKeyDERFromPEM | func GetKeyDERFromPEM(in []byte, password []byte) ([]byte, error) {
keyDER, _ := pem.Decode(in)
if keyDER != nil {
if procType, ok := keyDER.Headers["Proc-Type"]; ok {
if strings.Contains(procType, "ENCRYPTED") {
if password != nil {
return x509.DecryptPEMBlock(keyDER, password)
}
return nil, cferr.New(cferr.PrivateKeyError, cferr.Encrypted)
}
}
return keyDER.Bytes, nil
}
return nil, cferr.New(cferr.PrivateKeyError, cferr.DecodeFailed)
} | go | func GetKeyDERFromPEM(in []byte, password []byte) ([]byte, error) {
keyDER, _ := pem.Decode(in)
if keyDER != nil {
if procType, ok := keyDER.Headers["Proc-Type"]; ok {
if strings.Contains(procType, "ENCRYPTED") {
if password != nil {
return x509.DecryptPEMBlock(keyDER, password)
}
return nil, cferr.New(cferr.PrivateKeyError, cferr.Encrypted)
}
}
return keyDER.Bytes, nil
}
return nil, cferr.New(cferr.PrivateKeyError, cferr.DecodeFailed)
} | [
"func",
"GetKeyDERFromPEM",
"(",
"in",
"[",
"]",
"byte",
",",
"password",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"keyDER",
",",
"_",
":=",
"pem",
".",
"Decode",
"(",
"in",
")",
"\n",
"if",
"keyDER",
"!=",
"nil",
"{",
"if",
"procType",
",",
"ok",
":=",
"keyDER",
".",
"Headers",
"[",
"\"",
"\"",
"]",
";",
"ok",
"{",
"if",
"strings",
".",
"Contains",
"(",
"procType",
",",
"\"",
"\"",
")",
"{",
"if",
"password",
"!=",
"nil",
"{",
"return",
"x509",
".",
"DecryptPEMBlock",
"(",
"keyDER",
",",
"password",
")",
"\n",
"}",
"\n",
"return",
"nil",
",",
"cferr",
".",
"New",
"(",
"cferr",
".",
"PrivateKeyError",
",",
"cferr",
".",
"Encrypted",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"keyDER",
".",
"Bytes",
",",
"nil",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"cferr",
".",
"New",
"(",
"cferr",
".",
"PrivateKeyError",
",",
"cferr",
".",
"DecodeFailed",
")",
"\n",
"}"
] | // GetKeyDERFromPEM parses a PEM-encoded private key and returns DER-format key bytes. | [
"GetKeyDERFromPEM",
"parses",
"a",
"PEM",
"-",
"encoded",
"private",
"key",
"and",
"returns",
"DER",
"-",
"format",
"key",
"bytes",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L380-L395 | train |
cloudflare/cfssl | helpers/helpers.go | ParseCSRPEM | func ParseCSRPEM(csrPEM []byte) (*x509.CertificateRequest, error) {
block, _ := pem.Decode([]byte(csrPEM))
if block == nil {
return nil, cferr.New(cferr.CSRError, cferr.DecodeFailed)
}
csrObject, err := x509.ParseCertificateRequest(block.Bytes)
if err != nil {
return nil, err
}
return csrObject, nil
} | go | func ParseCSRPEM(csrPEM []byte) (*x509.CertificateRequest, error) {
block, _ := pem.Decode([]byte(csrPEM))
if block == nil {
return nil, cferr.New(cferr.CSRError, cferr.DecodeFailed)
}
csrObject, err := x509.ParseCertificateRequest(block.Bytes)
if err != nil {
return nil, err
}
return csrObject, nil
} | [
"func",
"ParseCSRPEM",
"(",
"csrPEM",
"[",
"]",
"byte",
")",
"(",
"*",
"x509",
".",
"CertificateRequest",
",",
"error",
")",
"{",
"block",
",",
"_",
":=",
"pem",
".",
"Decode",
"(",
"[",
"]",
"byte",
"(",
"csrPEM",
")",
")",
"\n",
"if",
"block",
"==",
"nil",
"{",
"return",
"nil",
",",
"cferr",
".",
"New",
"(",
"cferr",
".",
"CSRError",
",",
"cferr",
".",
"DecodeFailed",
")",
"\n",
"}",
"\n",
"csrObject",
",",
"err",
":=",
"x509",
".",
"ParseCertificateRequest",
"(",
"block",
".",
"Bytes",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"csrObject",
",",
"nil",
"\n",
"}"
] | // ParseCSRPEM parses a PEM-encoded certificate signing request.
// It does not check the signature. This is useful for dumping data from a CSR
// locally. | [
"ParseCSRPEM",
"parses",
"a",
"PEM",
"-",
"encoded",
"certificate",
"signing",
"request",
".",
"It",
"does",
"not",
"check",
"the",
"signature",
".",
"This",
"is",
"useful",
"for",
"dumping",
"data",
"from",
"a",
"CSR",
"locally",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L426-L438 | train |
cloudflare/cfssl | helpers/helpers.go | CreateTLSConfig | func CreateTLSConfig(remoteCAs *x509.CertPool, cert *tls.Certificate) *tls.Config {
var certs []tls.Certificate
if cert != nil {
certs = []tls.Certificate{*cert}
}
return &tls.Config{
Certificates: certs,
RootCAs: remoteCAs,
}
} | go | func CreateTLSConfig(remoteCAs *x509.CertPool, cert *tls.Certificate) *tls.Config {
var certs []tls.Certificate
if cert != nil {
certs = []tls.Certificate{*cert}
}
return &tls.Config{
Certificates: certs,
RootCAs: remoteCAs,
}
} | [
"func",
"CreateTLSConfig",
"(",
"remoteCAs",
"*",
"x509",
".",
"CertPool",
",",
"cert",
"*",
"tls",
".",
"Certificate",
")",
"*",
"tls",
".",
"Config",
"{",
"var",
"certs",
"[",
"]",
"tls",
".",
"Certificate",
"\n",
"if",
"cert",
"!=",
"nil",
"{",
"certs",
"=",
"[",
"]",
"tls",
".",
"Certificate",
"{",
"*",
"cert",
"}",
"\n",
"}",
"\n",
"return",
"&",
"tls",
".",
"Config",
"{",
"Certificates",
":",
"certs",
",",
"RootCAs",
":",
"remoteCAs",
",",
"}",
"\n",
"}"
] | // CreateTLSConfig creates a tls.Config object from certs and roots | [
"CreateTLSConfig",
"creates",
"a",
"tls",
".",
"Config",
"object",
"from",
"certs",
"and",
"roots"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L486-L495 | train |
cloudflare/cfssl | helpers/helpers.go | SerializeSCTList | func SerializeSCTList(sctList []ct.SignedCertificateTimestamp) ([]byte, error) {
list := ctx509.SignedCertificateTimestampList{}
for _, sct := range sctList {
sctBytes, err := cttls.Marshal(sct)
if err != nil {
return nil, err
}
list.SCTList = append(list.SCTList, ctx509.SerializedSCT{Val: sctBytes})
}
return cttls.Marshal(list)
} | go | func SerializeSCTList(sctList []ct.SignedCertificateTimestamp) ([]byte, error) {
list := ctx509.SignedCertificateTimestampList{}
for _, sct := range sctList {
sctBytes, err := cttls.Marshal(sct)
if err != nil {
return nil, err
}
list.SCTList = append(list.SCTList, ctx509.SerializedSCT{Val: sctBytes})
}
return cttls.Marshal(list)
} | [
"func",
"SerializeSCTList",
"(",
"sctList",
"[",
"]",
"ct",
".",
"SignedCertificateTimestamp",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"list",
":=",
"ctx509",
".",
"SignedCertificateTimestampList",
"{",
"}",
"\n",
"for",
"_",
",",
"sct",
":=",
"range",
"sctList",
"{",
"sctBytes",
",",
"err",
":=",
"cttls",
".",
"Marshal",
"(",
"sct",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"list",
".",
"SCTList",
"=",
"append",
"(",
"list",
".",
"SCTList",
",",
"ctx509",
".",
"SerializedSCT",
"{",
"Val",
":",
"sctBytes",
"}",
")",
"\n",
"}",
"\n",
"return",
"cttls",
".",
"Marshal",
"(",
"list",
")",
"\n",
"}"
] | // SerializeSCTList serializes a list of SCTs. | [
"SerializeSCTList",
"serializes",
"a",
"list",
"of",
"SCTs",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L498-L508 | train |
cloudflare/cfssl | helpers/helpers.go | DeserializeSCTList | func DeserializeSCTList(serializedSCTList []byte) ([]ct.SignedCertificateTimestamp, error) {
var sctList ctx509.SignedCertificateTimestampList
rest, err := cttls.Unmarshal(serializedSCTList, &sctList)
if err != nil {
return nil, err
}
if len(rest) != 0 {
return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, errors.New("serialized SCT list contained trailing garbage"))
}
list := make([]ct.SignedCertificateTimestamp, len(sctList.SCTList))
for i, serializedSCT := range sctList.SCTList {
var sct ct.SignedCertificateTimestamp
rest, err := cttls.Unmarshal(serializedSCT.Val, &sct)
if err != nil {
return nil, err
}
if len(rest) != 0 {
return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, errors.New("serialized SCT contained trailing garbage"))
}
list[i] = sct
}
return list, nil
} | go | func DeserializeSCTList(serializedSCTList []byte) ([]ct.SignedCertificateTimestamp, error) {
var sctList ctx509.SignedCertificateTimestampList
rest, err := cttls.Unmarshal(serializedSCTList, &sctList)
if err != nil {
return nil, err
}
if len(rest) != 0 {
return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, errors.New("serialized SCT list contained trailing garbage"))
}
list := make([]ct.SignedCertificateTimestamp, len(sctList.SCTList))
for i, serializedSCT := range sctList.SCTList {
var sct ct.SignedCertificateTimestamp
rest, err := cttls.Unmarshal(serializedSCT.Val, &sct)
if err != nil {
return nil, err
}
if len(rest) != 0 {
return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, errors.New("serialized SCT contained trailing garbage"))
}
list[i] = sct
}
return list, nil
} | [
"func",
"DeserializeSCTList",
"(",
"serializedSCTList",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"ct",
".",
"SignedCertificateTimestamp",
",",
"error",
")",
"{",
"var",
"sctList",
"ctx509",
".",
"SignedCertificateTimestampList",
"\n",
"rest",
",",
"err",
":=",
"cttls",
".",
"Unmarshal",
"(",
"serializedSCTList",
",",
"&",
"sctList",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"rest",
")",
"!=",
"0",
"{",
"return",
"nil",
",",
"cferr",
".",
"Wrap",
"(",
"cferr",
".",
"CTError",
",",
"cferr",
".",
"Unknown",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n",
"list",
":=",
"make",
"(",
"[",
"]",
"ct",
".",
"SignedCertificateTimestamp",
",",
"len",
"(",
"sctList",
".",
"SCTList",
")",
")",
"\n",
"for",
"i",
",",
"serializedSCT",
":=",
"range",
"sctList",
".",
"SCTList",
"{",
"var",
"sct",
"ct",
".",
"SignedCertificateTimestamp",
"\n",
"rest",
",",
"err",
":=",
"cttls",
".",
"Unmarshal",
"(",
"serializedSCT",
".",
"Val",
",",
"&",
"sct",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"rest",
")",
"!=",
"0",
"{",
"return",
"nil",
",",
"cferr",
".",
"Wrap",
"(",
"cferr",
".",
"CTError",
",",
"cferr",
".",
"Unknown",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n",
"list",
"[",
"i",
"]",
"=",
"sct",
"\n",
"}",
"\n",
"return",
"list",
",",
"nil",
"\n",
"}"
] | // DeserializeSCTList deserializes a list of SCTs. | [
"DeserializeSCTList",
"deserializes",
"a",
"list",
"of",
"SCTs",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L511-L533 | train |
cloudflare/cfssl | helpers/helpers.go | SCTListFromOCSPResponse | func SCTListFromOCSPResponse(response *ocsp.Response) ([]ct.SignedCertificateTimestamp, error) {
// This loop finds the SCTListExtension in the OCSP response.
var SCTListExtension, ext pkix.Extension
for _, ext = range response.Extensions {
// sctExtOid is the ObjectIdentifier of a Signed Certificate Timestamp.
sctExtOid := asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 11129, 2, 4, 5}
if ext.Id.Equal(sctExtOid) {
SCTListExtension = ext
break
}
}
// This code block extracts the sctList from the SCT extension.
var sctList []ct.SignedCertificateTimestamp
var err error
if numBytes := len(SCTListExtension.Value); numBytes != 0 {
var serializedSCTList []byte
rest := make([]byte, numBytes)
copy(rest, SCTListExtension.Value)
for len(rest) != 0 {
rest, err = asn1.Unmarshal(rest, &serializedSCTList)
if err != nil {
return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, err)
}
}
sctList, err = DeserializeSCTList(serializedSCTList)
}
return sctList, err
} | go | func SCTListFromOCSPResponse(response *ocsp.Response) ([]ct.SignedCertificateTimestamp, error) {
// This loop finds the SCTListExtension in the OCSP response.
var SCTListExtension, ext pkix.Extension
for _, ext = range response.Extensions {
// sctExtOid is the ObjectIdentifier of a Signed Certificate Timestamp.
sctExtOid := asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 11129, 2, 4, 5}
if ext.Id.Equal(sctExtOid) {
SCTListExtension = ext
break
}
}
// This code block extracts the sctList from the SCT extension.
var sctList []ct.SignedCertificateTimestamp
var err error
if numBytes := len(SCTListExtension.Value); numBytes != 0 {
var serializedSCTList []byte
rest := make([]byte, numBytes)
copy(rest, SCTListExtension.Value)
for len(rest) != 0 {
rest, err = asn1.Unmarshal(rest, &serializedSCTList)
if err != nil {
return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, err)
}
}
sctList, err = DeserializeSCTList(serializedSCTList)
}
return sctList, err
} | [
"func",
"SCTListFromOCSPResponse",
"(",
"response",
"*",
"ocsp",
".",
"Response",
")",
"(",
"[",
"]",
"ct",
".",
"SignedCertificateTimestamp",
",",
"error",
")",
"{",
"// This loop finds the SCTListExtension in the OCSP response.",
"var",
"SCTListExtension",
",",
"ext",
"pkix",
".",
"Extension",
"\n",
"for",
"_",
",",
"ext",
"=",
"range",
"response",
".",
"Extensions",
"{",
"// sctExtOid is the ObjectIdentifier of a Signed Certificate Timestamp.",
"sctExtOid",
":=",
"asn1",
".",
"ObjectIdentifier",
"{",
"1",
",",
"3",
",",
"6",
",",
"1",
",",
"4",
",",
"1",
",",
"11129",
",",
"2",
",",
"4",
",",
"5",
"}",
"\n",
"if",
"ext",
".",
"Id",
".",
"Equal",
"(",
"sctExtOid",
")",
"{",
"SCTListExtension",
"=",
"ext",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n\n",
"// This code block extracts the sctList from the SCT extension.",
"var",
"sctList",
"[",
"]",
"ct",
".",
"SignedCertificateTimestamp",
"\n",
"var",
"err",
"error",
"\n",
"if",
"numBytes",
":=",
"len",
"(",
"SCTListExtension",
".",
"Value",
")",
";",
"numBytes",
"!=",
"0",
"{",
"var",
"serializedSCTList",
"[",
"]",
"byte",
"\n",
"rest",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"numBytes",
")",
"\n",
"copy",
"(",
"rest",
",",
"SCTListExtension",
".",
"Value",
")",
"\n",
"for",
"len",
"(",
"rest",
")",
"!=",
"0",
"{",
"rest",
",",
"err",
"=",
"asn1",
".",
"Unmarshal",
"(",
"rest",
",",
"&",
"serializedSCTList",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"cferr",
".",
"Wrap",
"(",
"cferr",
".",
"CTError",
",",
"cferr",
".",
"Unknown",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"sctList",
",",
"err",
"=",
"DeserializeSCTList",
"(",
"serializedSCTList",
")",
"\n",
"}",
"\n",
"return",
"sctList",
",",
"err",
"\n",
"}"
] | // SCTListFromOCSPResponse extracts the SCTList from an ocsp.Response,
// returning an empty list if the SCT extension was not found or could not be
// unmarshalled. | [
"SCTListFromOCSPResponse",
"extracts",
"the",
"SCTList",
"from",
"an",
"ocsp",
".",
"Response",
"returning",
"an",
"empty",
"list",
"if",
"the",
"SCT",
"extension",
"was",
"not",
"found",
"or",
"could",
"not",
"be",
"unmarshalled",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/helpers/helpers.go#L538-L566 | train |
cloudflare/cfssl | cmd/cfssl/cfssl.go | main | func main() {
// Add command names to cfssl usage
flag.Usage = nil // this is set to nil for testabilty
// Register commands.
cmds := map[string]*cli.Command{
"bundle": bundle.Command,
"certinfo": certinfo.Command,
"crl": crl.Command,
"sign": sign.Command,
"serve": serve.Command,
"version": version.Command,
"genkey": genkey.Command,
"gencert": gencert.Command,
"gencsr": gencsr.Command,
"gencrl": gencrl.Command,
"ocspdump": ocspdump.Command,
"ocsprefresh": ocsprefresh.Command,
"ocspsign": ocspsign.Command,
"ocspserve": ocspserve.Command,
"selfsign": selfsign.Command,
"scan": scan.Command,
"info": info.Command,
"print-defaults": printdefaults.Command,
"revoke": revoke.Command,
}
// If the CLI returns an error, exit with an appropriate status
// code.
err := cli.Start(cmds)
if err != nil {
os.Exit(1)
}
} | go | func main() {
// Add command names to cfssl usage
flag.Usage = nil // this is set to nil for testabilty
// Register commands.
cmds := map[string]*cli.Command{
"bundle": bundle.Command,
"certinfo": certinfo.Command,
"crl": crl.Command,
"sign": sign.Command,
"serve": serve.Command,
"version": version.Command,
"genkey": genkey.Command,
"gencert": gencert.Command,
"gencsr": gencsr.Command,
"gencrl": gencrl.Command,
"ocspdump": ocspdump.Command,
"ocsprefresh": ocsprefresh.Command,
"ocspsign": ocspsign.Command,
"ocspserve": ocspserve.Command,
"selfsign": selfsign.Command,
"scan": scan.Command,
"info": info.Command,
"print-defaults": printdefaults.Command,
"revoke": revoke.Command,
}
// If the CLI returns an error, exit with an appropriate status
// code.
err := cli.Start(cmds)
if err != nil {
os.Exit(1)
}
} | [
"func",
"main",
"(",
")",
"{",
"// Add command names to cfssl usage",
"flag",
".",
"Usage",
"=",
"nil",
"// this is set to nil for testabilty",
"\n",
"// Register commands.",
"cmds",
":=",
"map",
"[",
"string",
"]",
"*",
"cli",
".",
"Command",
"{",
"\"",
"\"",
":",
"bundle",
".",
"Command",
",",
"\"",
"\"",
":",
"certinfo",
".",
"Command",
",",
"\"",
"\"",
":",
"crl",
".",
"Command",
",",
"\"",
"\"",
":",
"sign",
".",
"Command",
",",
"\"",
"\"",
":",
"serve",
".",
"Command",
",",
"\"",
"\"",
":",
"version",
".",
"Command",
",",
"\"",
"\"",
":",
"genkey",
".",
"Command",
",",
"\"",
"\"",
":",
"gencert",
".",
"Command",
",",
"\"",
"\"",
":",
"gencsr",
".",
"Command",
",",
"\"",
"\"",
":",
"gencrl",
".",
"Command",
",",
"\"",
"\"",
":",
"ocspdump",
".",
"Command",
",",
"\"",
"\"",
":",
"ocsprefresh",
".",
"Command",
",",
"\"",
"\"",
":",
"ocspsign",
".",
"Command",
",",
"\"",
"\"",
":",
"ocspserve",
".",
"Command",
",",
"\"",
"\"",
":",
"selfsign",
".",
"Command",
",",
"\"",
"\"",
":",
"scan",
".",
"Command",
",",
"\"",
"\"",
":",
"info",
".",
"Command",
",",
"\"",
"\"",
":",
"printdefaults",
".",
"Command",
",",
"\"",
"\"",
":",
"revoke",
".",
"Command",
",",
"}",
"\n\n",
"// If the CLI returns an error, exit with an appropriate status",
"// code.",
"err",
":=",
"cli",
".",
"Start",
"(",
"cmds",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"os",
".",
"Exit",
"(",
"1",
")",
"\n",
"}",
"\n",
"}"
] | // main defines the cfssl usage and registers all defined commands and flags. | [
"main",
"defines",
"the",
"cfssl",
"usage",
"and",
"registers",
"all",
"defined",
"commands",
"and",
"flags",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cmd/cfssl/cfssl.go#L55-L87 | train |
cloudflare/cfssl | api/gencrl/gencrl.go | gencrlHandler | func gencrlHandler(w http.ResponseWriter, r *http.Request) error {
var revokedCerts []pkix.RevokedCertificate
var oneWeek = time.Duration(604800) * time.Second
var newExpiryTime = time.Now()
body, err := ioutil.ReadAll(r.Body)
if err != nil {
return err
}
r.Body.Close()
req := &jsonCRLRequest{}
err = json.Unmarshal(body, req)
if err != nil {
log.Error(err)
}
if req.ExpiryTime != "" {
expiryTime := strings.TrimSpace(req.ExpiryTime)
expiryInt, err := strconv.ParseInt(expiryTime, 0, 32)
if err != nil {
return err
}
newExpiryTime = time.Now().Add((time.Duration(expiryInt) * time.Second))
}
if req.ExpiryTime == "" {
newExpiryTime = time.Now().Add(oneWeek)
}
if err != nil {
return err
}
cert, err := helpers.ParseCertificatePEM([]byte(req.Certificate))
if err != nil {
log.Error("error from ParseCertificatePEM", err)
return errors.NewBadRequestString("malformed certificate")
}
for _, value := range req.SerialNumber {
tempBigInt := new(big.Int)
tempBigInt.SetString(value, 10)
tempCert := pkix.RevokedCertificate{
SerialNumber: tempBigInt,
RevocationTime: time.Now(),
}
revokedCerts = append(revokedCerts, tempCert)
}
key, err := helpers.ParsePrivateKeyPEM([]byte(req.PrivateKey))
if err != nil {
log.Debug("malformed private key %v", err)
return errors.NewBadRequestString("malformed Private Key")
}
result, err := cert.CreateCRL(rand.Reader, key, revokedCerts, time.Now(), newExpiryTime)
if err != nil {
log.Debug("unable to create CRL: %v", err)
return err
}
return api.SendResponse(w, result)
} | go | func gencrlHandler(w http.ResponseWriter, r *http.Request) error {
var revokedCerts []pkix.RevokedCertificate
var oneWeek = time.Duration(604800) * time.Second
var newExpiryTime = time.Now()
body, err := ioutil.ReadAll(r.Body)
if err != nil {
return err
}
r.Body.Close()
req := &jsonCRLRequest{}
err = json.Unmarshal(body, req)
if err != nil {
log.Error(err)
}
if req.ExpiryTime != "" {
expiryTime := strings.TrimSpace(req.ExpiryTime)
expiryInt, err := strconv.ParseInt(expiryTime, 0, 32)
if err != nil {
return err
}
newExpiryTime = time.Now().Add((time.Duration(expiryInt) * time.Second))
}
if req.ExpiryTime == "" {
newExpiryTime = time.Now().Add(oneWeek)
}
if err != nil {
return err
}
cert, err := helpers.ParseCertificatePEM([]byte(req.Certificate))
if err != nil {
log.Error("error from ParseCertificatePEM", err)
return errors.NewBadRequestString("malformed certificate")
}
for _, value := range req.SerialNumber {
tempBigInt := new(big.Int)
tempBigInt.SetString(value, 10)
tempCert := pkix.RevokedCertificate{
SerialNumber: tempBigInt,
RevocationTime: time.Now(),
}
revokedCerts = append(revokedCerts, tempCert)
}
key, err := helpers.ParsePrivateKeyPEM([]byte(req.PrivateKey))
if err != nil {
log.Debug("malformed private key %v", err)
return errors.NewBadRequestString("malformed Private Key")
}
result, err := cert.CreateCRL(rand.Reader, key, revokedCerts, time.Now(), newExpiryTime)
if err != nil {
log.Debug("unable to create CRL: %v", err)
return err
}
return api.SendResponse(w, result)
} | [
"func",
"gencrlHandler",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"error",
"{",
"var",
"revokedCerts",
"[",
"]",
"pkix",
".",
"RevokedCertificate",
"\n",
"var",
"oneWeek",
"=",
"time",
".",
"Duration",
"(",
"604800",
")",
"*",
"time",
".",
"Second",
"\n",
"var",
"newExpiryTime",
"=",
"time",
".",
"Now",
"(",
")",
"\n\n",
"body",
",",
"err",
":=",
"ioutil",
".",
"ReadAll",
"(",
"r",
".",
"Body",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"r",
".",
"Body",
".",
"Close",
"(",
")",
"\n\n",
"req",
":=",
"&",
"jsonCRLRequest",
"{",
"}",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"body",
",",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"req",
".",
"ExpiryTime",
"!=",
"\"",
"\"",
"{",
"expiryTime",
":=",
"strings",
".",
"TrimSpace",
"(",
"req",
".",
"ExpiryTime",
")",
"\n",
"expiryInt",
",",
"err",
":=",
"strconv",
".",
"ParseInt",
"(",
"expiryTime",
",",
"0",
",",
"32",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"newExpiryTime",
"=",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"(",
"time",
".",
"Duration",
"(",
"expiryInt",
")",
"*",
"time",
".",
"Second",
")",
")",
"\n",
"}",
"\n\n",
"if",
"req",
".",
"ExpiryTime",
"==",
"\"",
"\"",
"{",
"newExpiryTime",
"=",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"oneWeek",
")",
"\n",
"}",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"cert",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatePEM",
"(",
"[",
"]",
"byte",
"(",
"req",
".",
"Certificate",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Error",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"errors",
".",
"NewBadRequestString",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"value",
":=",
"range",
"req",
".",
"SerialNumber",
"{",
"tempBigInt",
":=",
"new",
"(",
"big",
".",
"Int",
")",
"\n",
"tempBigInt",
".",
"SetString",
"(",
"value",
",",
"10",
")",
"\n",
"tempCert",
":=",
"pkix",
".",
"RevokedCertificate",
"{",
"SerialNumber",
":",
"tempBigInt",
",",
"RevocationTime",
":",
"time",
".",
"Now",
"(",
")",
",",
"}",
"\n",
"revokedCerts",
"=",
"append",
"(",
"revokedCerts",
",",
"tempCert",
")",
"\n",
"}",
"\n\n",
"key",
",",
"err",
":=",
"helpers",
".",
"ParsePrivateKeyPEM",
"(",
"[",
"]",
"byte",
"(",
"req",
".",
"PrivateKey",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"errors",
".",
"NewBadRequestString",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"result",
",",
"err",
":=",
"cert",
".",
"CreateCRL",
"(",
"rand",
".",
"Reader",
",",
"key",
",",
"revokedCerts",
",",
"time",
".",
"Now",
"(",
")",
",",
"newExpiryTime",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"api",
".",
"SendResponse",
"(",
"w",
",",
"result",
")",
"\n",
"}"
] | // Handle responds to requests for crl generation. It creates this crl
// based off of the given certificate, serial numbers, and private key | [
"Handle",
"responds",
"to",
"requests",
"for",
"crl",
"generation",
".",
"It",
"creates",
"this",
"crl",
"based",
"off",
"of",
"the",
"given",
"certificate",
"serial",
"numbers",
"and",
"private",
"key"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/gencrl/gencrl.go#L30-L94 | train |
cloudflare/cfssl | api/gencrl/gencrl.go | NewHandler | func NewHandler() http.Handler {
return api.HTTPHandler{
Handler: api.HandlerFunc(gencrlHandler),
Methods: []string{"POST"},
}
} | go | func NewHandler() http.Handler {
return api.HTTPHandler{
Handler: api.HandlerFunc(gencrlHandler),
Methods: []string{"POST"},
}
} | [
"func",
"NewHandler",
"(",
")",
"http",
".",
"Handler",
"{",
"return",
"api",
".",
"HTTPHandler",
"{",
"Handler",
":",
"api",
".",
"HandlerFunc",
"(",
"gencrlHandler",
")",
",",
"Methods",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}"
] | // NewHandler returns a new http.Handler that handles a crl generation request. | [
"NewHandler",
"returns",
"a",
"new",
"http",
".",
"Handler",
"that",
"handles",
"a",
"crl",
"generation",
"request",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/gencrl/gencrl.go#L97-L102 | train |
cloudflare/cfssl | api/client/group.go | StrategyFromString | func StrategyFromString(s string) Strategy {
s = strings.TrimSpace(strings.ToLower(s))
strategy, ok := strategyStrings[s]
if !ok {
return StrategyInvalid
}
return strategy
} | go | func StrategyFromString(s string) Strategy {
s = strings.TrimSpace(strings.ToLower(s))
strategy, ok := strategyStrings[s]
if !ok {
return StrategyInvalid
}
return strategy
} | [
"func",
"StrategyFromString",
"(",
"s",
"string",
")",
"Strategy",
"{",
"s",
"=",
"strings",
".",
"TrimSpace",
"(",
"strings",
".",
"ToLower",
"(",
"s",
")",
")",
"\n",
"strategy",
",",
"ok",
":=",
"strategyStrings",
"[",
"s",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"StrategyInvalid",
"\n",
"}",
"\n",
"return",
"strategy",
"\n",
"}"
] | // StrategyFromString takes a string describing a | [
"StrategyFromString",
"takes",
"a",
"string",
"describing",
"a"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/client/group.go#L36-L43 | train |
cloudflare/cfssl | api/client/group.go | NewGroup | func NewGroup(remotes []string, tlsConfig *tls.Config, strategy Strategy) (Remote, error) {
var servers = make([]*server, len(remotes))
for i := range remotes {
u, err := normalizeURL(remotes[i])
if err != nil {
return nil, err
}
servers[i] = newServer(u, tlsConfig)
}
switch strategy {
case StrategyOrderedList:
return newOrdererdListGroup(servers)
default:
return nil, errors.New("unrecognised strategy")
}
} | go | func NewGroup(remotes []string, tlsConfig *tls.Config, strategy Strategy) (Remote, error) {
var servers = make([]*server, len(remotes))
for i := range remotes {
u, err := normalizeURL(remotes[i])
if err != nil {
return nil, err
}
servers[i] = newServer(u, tlsConfig)
}
switch strategy {
case StrategyOrderedList:
return newOrdererdListGroup(servers)
default:
return nil, errors.New("unrecognised strategy")
}
} | [
"func",
"NewGroup",
"(",
"remotes",
"[",
"]",
"string",
",",
"tlsConfig",
"*",
"tls",
".",
"Config",
",",
"strategy",
"Strategy",
")",
"(",
"Remote",
",",
"error",
")",
"{",
"var",
"servers",
"=",
"make",
"(",
"[",
"]",
"*",
"server",
",",
"len",
"(",
"remotes",
")",
")",
"\n",
"for",
"i",
":=",
"range",
"remotes",
"{",
"u",
",",
"err",
":=",
"normalizeURL",
"(",
"remotes",
"[",
"i",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"servers",
"[",
"i",
"]",
"=",
"newServer",
"(",
"u",
",",
"tlsConfig",
")",
"\n",
"}",
"\n\n",
"switch",
"strategy",
"{",
"case",
"StrategyOrderedList",
":",
"return",
"newOrdererdListGroup",
"(",
"servers",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // NewGroup will use the collection of remotes specified with the
// given strategy. | [
"NewGroup",
"will",
"use",
"the",
"collection",
"of",
"remotes",
"specified",
"with",
"the",
"given",
"strategy",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/client/group.go#L47-L63 | train |
cloudflare/cfssl | auth/auth.go | New | func New(key string, ad []byte) (*Standard, error) {
if splitKey := strings.SplitN(key, ":", 2); len(splitKey) == 2 {
switch splitKey[0] {
case "env":
key = os.Getenv(splitKey[1])
case "file":
data, err := ioutil.ReadFile(splitKey[1])
if err != nil {
return nil, err
}
key = strings.TrimSpace(string(data))
default:
return nil, fmt.Errorf("unknown key prefix: %s", splitKey[0])
}
}
keyBytes, err := hex.DecodeString(key)
if err != nil {
return nil, err
}
return &Standard{keyBytes, ad}, nil
} | go | func New(key string, ad []byte) (*Standard, error) {
if splitKey := strings.SplitN(key, ":", 2); len(splitKey) == 2 {
switch splitKey[0] {
case "env":
key = os.Getenv(splitKey[1])
case "file":
data, err := ioutil.ReadFile(splitKey[1])
if err != nil {
return nil, err
}
key = strings.TrimSpace(string(data))
default:
return nil, fmt.Errorf("unknown key prefix: %s", splitKey[0])
}
}
keyBytes, err := hex.DecodeString(key)
if err != nil {
return nil, err
}
return &Standard{keyBytes, ad}, nil
} | [
"func",
"New",
"(",
"key",
"string",
",",
"ad",
"[",
"]",
"byte",
")",
"(",
"*",
"Standard",
",",
"error",
")",
"{",
"if",
"splitKey",
":=",
"strings",
".",
"SplitN",
"(",
"key",
",",
"\"",
"\"",
",",
"2",
")",
";",
"len",
"(",
"splitKey",
")",
"==",
"2",
"{",
"switch",
"splitKey",
"[",
"0",
"]",
"{",
"case",
"\"",
"\"",
":",
"key",
"=",
"os",
".",
"Getenv",
"(",
"splitKey",
"[",
"1",
"]",
")",
"\n",
"case",
"\"",
"\"",
":",
"data",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"splitKey",
"[",
"1",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"key",
"=",
"strings",
".",
"TrimSpace",
"(",
"string",
"(",
"data",
")",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"splitKey",
"[",
"0",
"]",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"keyBytes",
",",
"err",
":=",
"hex",
".",
"DecodeString",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"Standard",
"{",
"keyBytes",
",",
"ad",
"}",
",",
"nil",
"\n",
"}"
] | // New generates a new standard authentication provider from the key
// and additional data. The additional data will be used when
// generating a new token. | [
"New",
"generates",
"a",
"new",
"standard",
"authentication",
"provider",
"from",
"the",
"key",
"and",
"additional",
"data",
".",
"The",
"additional",
"data",
"will",
"be",
"used",
"when",
"generating",
"a",
"new",
"token",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/auth/auth.go#L49-L71 | train |
cloudflare/cfssl | auth/auth.go | Token | func (p Standard) Token(req []byte) (token []byte, err error) {
h := hmac.New(sha256.New, p.key)
h.Write(req)
h.Write(p.ad)
return h.Sum(nil), nil
} | go | func (p Standard) Token(req []byte) (token []byte, err error) {
h := hmac.New(sha256.New, p.key)
h.Write(req)
h.Write(p.ad)
return h.Sum(nil), nil
} | [
"func",
"(",
"p",
"Standard",
")",
"Token",
"(",
"req",
"[",
"]",
"byte",
")",
"(",
"token",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"h",
":=",
"hmac",
".",
"New",
"(",
"sha256",
".",
"New",
",",
"p",
".",
"key",
")",
"\n",
"h",
".",
"Write",
"(",
"req",
")",
"\n",
"h",
".",
"Write",
"(",
"p",
".",
"ad",
")",
"\n",
"return",
"h",
".",
"Sum",
"(",
"nil",
")",
",",
"nil",
"\n",
"}"
] | // Token generates a new authentication token from the request. | [
"Token",
"generates",
"a",
"new",
"authentication",
"token",
"from",
"the",
"request",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/auth/auth.go#L74-L79 | train |
cloudflare/cfssl | auth/auth.go | Verify | func (p Standard) Verify(ad *AuthenticatedRequest) bool {
if ad == nil {
return false
}
// Standard token generation returns no error.
token, _ := p.Token(ad.Request)
if len(ad.Token) != len(token) {
return false
}
return hmac.Equal(token, ad.Token)
} | go | func (p Standard) Verify(ad *AuthenticatedRequest) bool {
if ad == nil {
return false
}
// Standard token generation returns no error.
token, _ := p.Token(ad.Request)
if len(ad.Token) != len(token) {
return false
}
return hmac.Equal(token, ad.Token)
} | [
"func",
"(",
"p",
"Standard",
")",
"Verify",
"(",
"ad",
"*",
"AuthenticatedRequest",
")",
"bool",
"{",
"if",
"ad",
"==",
"nil",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"// Standard token generation returns no error.",
"token",
",",
"_",
":=",
"p",
".",
"Token",
"(",
"ad",
".",
"Request",
")",
"\n",
"if",
"len",
"(",
"ad",
".",
"Token",
")",
"!=",
"len",
"(",
"token",
")",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"return",
"hmac",
".",
"Equal",
"(",
"token",
",",
"ad",
".",
"Token",
")",
"\n",
"}"
] | // Verify determines whether an authenticated request is valid. | [
"Verify",
"determines",
"whether",
"an",
"authenticated",
"request",
"is",
"valid",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/auth/auth.go#L82-L94 | train |
cloudflare/cfssl | api/scan/scan.go | NewHandler | func NewHandler(caBundleFile string) (http.Handler, error) {
return api.HTTPHandler{
Handler: api.HandlerFunc(scanHandler),
Methods: []string{"GET"},
}, scan.LoadRootCAs(caBundleFile)
} | go | func NewHandler(caBundleFile string) (http.Handler, error) {
return api.HTTPHandler{
Handler: api.HandlerFunc(scanHandler),
Methods: []string{"GET"},
}, scan.LoadRootCAs(caBundleFile)
} | [
"func",
"NewHandler",
"(",
"caBundleFile",
"string",
")",
"(",
"http",
".",
"Handler",
",",
"error",
")",
"{",
"return",
"api",
".",
"HTTPHandler",
"{",
"Handler",
":",
"api",
".",
"HandlerFunc",
"(",
"scanHandler",
")",
",",
"Methods",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
",",
"scan",
".",
"LoadRootCAs",
"(",
"caBundleFile",
")",
"\n",
"}"
] | // NewHandler returns a new http.Handler that handles a scan request. | [
"NewHandler",
"returns",
"a",
"new",
"http",
".",
"Handler",
"that",
"handles",
"a",
"scan",
"request",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/scan/scan.go#L54-L59 | train |
cloudflare/cfssl | api/scan/scan.go | scanInfoHandler | func scanInfoHandler(w http.ResponseWriter, r *http.Request) error {
log.Info("setting up scaninfo handler")
response := api.NewSuccessResponse(scan.Default)
enc := json.NewEncoder(w)
return enc.Encode(response)
} | go | func scanInfoHandler(w http.ResponseWriter, r *http.Request) error {
log.Info("setting up scaninfo handler")
response := api.NewSuccessResponse(scan.Default)
enc := json.NewEncoder(w)
return enc.Encode(response)
} | [
"func",
"scanInfoHandler",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"error",
"{",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"response",
":=",
"api",
".",
"NewSuccessResponse",
"(",
"scan",
".",
"Default",
")",
"\n",
"enc",
":=",
"json",
".",
"NewEncoder",
"(",
"w",
")",
"\n",
"return",
"enc",
".",
"Encode",
"(",
"response",
")",
"\n",
"}"
] | // scanInfoHandler is an HTTP handler that returns a JSON blob result describing
// the possible families and scans to be run. | [
"scanInfoHandler",
"is",
"an",
"HTTP",
"handler",
"that",
"returns",
"a",
"JSON",
"blob",
"result",
"describing",
"the",
"possible",
"families",
"and",
"scans",
"to",
"be",
"run",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/scan/scan.go#L63-L68 | train |
cloudflare/cfssl | api/scan/scan.go | NewInfoHandler | func NewInfoHandler() http.Handler {
return api.HTTPHandler{
Handler: api.HandlerFunc(scanInfoHandler),
Methods: []string{"GET"},
}
} | go | func NewInfoHandler() http.Handler {
return api.HTTPHandler{
Handler: api.HandlerFunc(scanInfoHandler),
Methods: []string{"GET"},
}
} | [
"func",
"NewInfoHandler",
"(",
")",
"http",
".",
"Handler",
"{",
"return",
"api",
".",
"HTTPHandler",
"{",
"Handler",
":",
"api",
".",
"HandlerFunc",
"(",
"scanInfoHandler",
")",
",",
"Methods",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}"
] | // NewInfoHandler returns a new http.Handler that handles a request for scan info. | [
"NewInfoHandler",
"returns",
"a",
"new",
"http",
".",
"Handler",
"that",
"handles",
"a",
"request",
"for",
"scan",
"info",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/scan/scan.go#L71-L76 | train |
cloudflare/cfssl | bundler/bundler.go | WithKeyUsages | func WithKeyUsages(usages ...x509.ExtKeyUsage) Option {
return func(o *options) {
o.keyUsages = usages
}
} | go | func WithKeyUsages(usages ...x509.ExtKeyUsage) Option {
return func(o *options) {
o.keyUsages = usages
}
} | [
"func",
"WithKeyUsages",
"(",
"usages",
"...",
"x509",
".",
"ExtKeyUsage",
")",
"Option",
"{",
"return",
"func",
"(",
"o",
"*",
"options",
")",
"{",
"o",
".",
"keyUsages",
"=",
"usages",
"\n",
"}",
"\n",
"}"
] | // WithKeyUsages lets you set which Extended Key Usage values are acceptable. By
// default x509.ExtKeyUsageAny will be used. | [
"WithKeyUsages",
"lets",
"you",
"set",
"which",
"Extended",
"Key",
"Usage",
"values",
"are",
"acceptable",
".",
"By",
"default",
"x509",
".",
"ExtKeyUsageAny",
"will",
"be",
"used",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L84-L88 | train |
cloudflare/cfssl | bundler/bundler.go | NewBundler | func NewBundler(caBundleFile, intBundleFile string, opt ...Option) (*Bundler, error) {
var caBundle, intBundle []byte
var err error
if caBundleFile != "" {
log.Debug("Loading CA bundle: ", caBundleFile)
caBundle, err = ioutil.ReadFile(caBundleFile)
if err != nil {
log.Errorf("root bundle failed to load: %v", err)
return nil, errors.Wrap(errors.RootError, errors.ReadFailed, err)
}
}
if intBundleFile != "" {
log.Debug("Loading Intermediate bundle: ", intBundleFile)
intBundle, err = ioutil.ReadFile(intBundleFile)
if err != nil {
log.Errorf("intermediate bundle failed to load: %v", err)
return nil, errors.Wrap(errors.IntermediatesError, errors.ReadFailed, err)
}
}
if IntermediateStash != "" {
if _, err = os.Stat(IntermediateStash); err != nil && os.IsNotExist(err) {
log.Infof("intermediate stash directory %s doesn't exist, creating", IntermediateStash)
err = os.MkdirAll(IntermediateStash, 0755)
if err != nil {
log.Errorf("failed to create intermediate stash directory %s: %v",
IntermediateStash, err)
return nil, err
}
log.Infof("intermediate stash directory %s created", IntermediateStash)
}
}
return NewBundlerFromPEM(caBundle, intBundle, opt...)
} | go | func NewBundler(caBundleFile, intBundleFile string, opt ...Option) (*Bundler, error) {
var caBundle, intBundle []byte
var err error
if caBundleFile != "" {
log.Debug("Loading CA bundle: ", caBundleFile)
caBundle, err = ioutil.ReadFile(caBundleFile)
if err != nil {
log.Errorf("root bundle failed to load: %v", err)
return nil, errors.Wrap(errors.RootError, errors.ReadFailed, err)
}
}
if intBundleFile != "" {
log.Debug("Loading Intermediate bundle: ", intBundleFile)
intBundle, err = ioutil.ReadFile(intBundleFile)
if err != nil {
log.Errorf("intermediate bundle failed to load: %v", err)
return nil, errors.Wrap(errors.IntermediatesError, errors.ReadFailed, err)
}
}
if IntermediateStash != "" {
if _, err = os.Stat(IntermediateStash); err != nil && os.IsNotExist(err) {
log.Infof("intermediate stash directory %s doesn't exist, creating", IntermediateStash)
err = os.MkdirAll(IntermediateStash, 0755)
if err != nil {
log.Errorf("failed to create intermediate stash directory %s: %v",
IntermediateStash, err)
return nil, err
}
log.Infof("intermediate stash directory %s created", IntermediateStash)
}
}
return NewBundlerFromPEM(caBundle, intBundle, opt...)
} | [
"func",
"NewBundler",
"(",
"caBundleFile",
",",
"intBundleFile",
"string",
",",
"opt",
"...",
"Option",
")",
"(",
"*",
"Bundler",
",",
"error",
")",
"{",
"var",
"caBundle",
",",
"intBundle",
"[",
"]",
"byte",
"\n",
"var",
"err",
"error",
"\n\n",
"if",
"caBundleFile",
"!=",
"\"",
"\"",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"caBundleFile",
")",
"\n",
"caBundle",
",",
"err",
"=",
"ioutil",
".",
"ReadFile",
"(",
"caBundleFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"errors",
".",
"Wrap",
"(",
"errors",
".",
"RootError",
",",
"errors",
".",
"ReadFailed",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"intBundleFile",
"!=",
"\"",
"\"",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"intBundleFile",
")",
"\n",
"intBundle",
",",
"err",
"=",
"ioutil",
".",
"ReadFile",
"(",
"intBundleFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"errors",
".",
"Wrap",
"(",
"errors",
".",
"IntermediatesError",
",",
"errors",
".",
"ReadFailed",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"IntermediateStash",
"!=",
"\"",
"\"",
"{",
"if",
"_",
",",
"err",
"=",
"os",
".",
"Stat",
"(",
"IntermediateStash",
")",
";",
"err",
"!=",
"nil",
"&&",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"IntermediateStash",
")",
"\n",
"err",
"=",
"os",
".",
"MkdirAll",
"(",
"IntermediateStash",
",",
"0755",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"IntermediateStash",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"IntermediateStash",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"NewBundlerFromPEM",
"(",
"caBundle",
",",
"intBundle",
",",
"opt",
"...",
")",
"\n\n",
"}"
] | // NewBundler creates a new Bundler from the files passed in; these
// files should contain a list of valid root certificates and a list
// of valid intermediate certificates, respectively. | [
"NewBundler",
"creates",
"a",
"new",
"Bundler",
"from",
"the",
"files",
"passed",
"in",
";",
"these",
"files",
"should",
"contain",
"a",
"list",
"of",
"valid",
"root",
"certificates",
"and",
"a",
"list",
"of",
"valid",
"intermediate",
"certificates",
"respectively",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L93-L130 | train |
cloudflare/cfssl | bundler/bundler.go | NewBundlerFromPEM | func NewBundlerFromPEM(caBundlePEM, intBundlePEM []byte, opt ...Option) (*Bundler, error) {
opts := defaultOptions
for _, o := range opt {
o(&opts)
}
log.Debug("parsing root certificates from PEM")
roots, err := helpers.ParseCertificatesPEM(caBundlePEM)
if err != nil {
log.Errorf("failed to parse root bundle: %v", err)
return nil, errors.New(errors.RootError, errors.ParseFailed)
}
log.Debug("parse intermediate certificates from PEM")
intermediates, err := helpers.ParseCertificatesPEM(intBundlePEM)
if err != nil {
log.Errorf("failed to parse intermediate bundle: %v", err)
return nil, errors.New(errors.IntermediatesError, errors.ParseFailed)
}
b := &Bundler{
KnownIssuers: map[string]bool{},
IntermediatePool: x509.NewCertPool(),
opts: opts,
}
log.Debug("building certificate pools")
// RootPool will be nil if caBundlePEM is nil, also
// that translates to caBundleFile is "".
// Systems root store will be used.
if caBundlePEM != nil {
b.RootPool = x509.NewCertPool()
}
for _, c := range roots {
b.RootPool.AddCert(c)
b.KnownIssuers[string(c.Signature)] = true
}
for _, c := range intermediates {
b.IntermediatePool.AddCert(c)
b.KnownIssuers[string(c.Signature)] = true
}
log.Debug("bundler set up")
return b, nil
} | go | func NewBundlerFromPEM(caBundlePEM, intBundlePEM []byte, opt ...Option) (*Bundler, error) {
opts := defaultOptions
for _, o := range opt {
o(&opts)
}
log.Debug("parsing root certificates from PEM")
roots, err := helpers.ParseCertificatesPEM(caBundlePEM)
if err != nil {
log.Errorf("failed to parse root bundle: %v", err)
return nil, errors.New(errors.RootError, errors.ParseFailed)
}
log.Debug("parse intermediate certificates from PEM")
intermediates, err := helpers.ParseCertificatesPEM(intBundlePEM)
if err != nil {
log.Errorf("failed to parse intermediate bundle: %v", err)
return nil, errors.New(errors.IntermediatesError, errors.ParseFailed)
}
b := &Bundler{
KnownIssuers: map[string]bool{},
IntermediatePool: x509.NewCertPool(),
opts: opts,
}
log.Debug("building certificate pools")
// RootPool will be nil if caBundlePEM is nil, also
// that translates to caBundleFile is "".
// Systems root store will be used.
if caBundlePEM != nil {
b.RootPool = x509.NewCertPool()
}
for _, c := range roots {
b.RootPool.AddCert(c)
b.KnownIssuers[string(c.Signature)] = true
}
for _, c := range intermediates {
b.IntermediatePool.AddCert(c)
b.KnownIssuers[string(c.Signature)] = true
}
log.Debug("bundler set up")
return b, nil
} | [
"func",
"NewBundlerFromPEM",
"(",
"caBundlePEM",
",",
"intBundlePEM",
"[",
"]",
"byte",
",",
"opt",
"...",
"Option",
")",
"(",
"*",
"Bundler",
",",
"error",
")",
"{",
"opts",
":=",
"defaultOptions",
"\n",
"for",
"_",
",",
"o",
":=",
"range",
"opt",
"{",
"o",
"(",
"&",
"opts",
")",
"\n",
"}",
"\n\n",
"log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"roots",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatesPEM",
"(",
"caBundlePEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"errors",
".",
"RootError",
",",
"errors",
".",
"ParseFailed",
")",
"\n",
"}",
"\n\n",
"log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"intermediates",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatesPEM",
"(",
"intBundlePEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"errors",
".",
"IntermediatesError",
",",
"errors",
".",
"ParseFailed",
")",
"\n",
"}",
"\n\n",
"b",
":=",
"&",
"Bundler",
"{",
"KnownIssuers",
":",
"map",
"[",
"string",
"]",
"bool",
"{",
"}",
",",
"IntermediatePool",
":",
"x509",
".",
"NewCertPool",
"(",
")",
",",
"opts",
":",
"opts",
",",
"}",
"\n\n",
"log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"// RootPool will be nil if caBundlePEM is nil, also",
"// that translates to caBundleFile is \"\".",
"// Systems root store will be used.",
"if",
"caBundlePEM",
"!=",
"nil",
"{",
"b",
".",
"RootPool",
"=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"c",
":=",
"range",
"roots",
"{",
"b",
".",
"RootPool",
".",
"AddCert",
"(",
"c",
")",
"\n",
"b",
".",
"KnownIssuers",
"[",
"string",
"(",
"c",
".",
"Signature",
")",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"c",
":=",
"range",
"intermediates",
"{",
"b",
".",
"IntermediatePool",
".",
"AddCert",
"(",
"c",
")",
"\n",
"b",
".",
"KnownIssuers",
"[",
"string",
"(",
"c",
".",
"Signature",
")",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"b",
",",
"nil",
"\n",
"}"
] | // NewBundlerFromPEM creates a new Bundler from PEM-encoded root certificates and
// intermediate certificates.
// If caBundlePEM is nil, the resulting Bundler can only do "Force" bundle. | [
"NewBundlerFromPEM",
"creates",
"a",
"new",
"Bundler",
"from",
"PEM",
"-",
"encoded",
"root",
"certificates",
"and",
"intermediate",
"certificates",
".",
"If",
"caBundlePEM",
"is",
"nil",
"the",
"resulting",
"Bundler",
"can",
"only",
"do",
"Force",
"bundle",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L135-L182 | train |
cloudflare/cfssl | bundler/bundler.go | VerifyOptions | func (b *Bundler) VerifyOptions() x509.VerifyOptions {
return x509.VerifyOptions{
Roots: b.RootPool,
Intermediates: b.IntermediatePool,
KeyUsages: b.opts.keyUsages,
}
} | go | func (b *Bundler) VerifyOptions() x509.VerifyOptions {
return x509.VerifyOptions{
Roots: b.RootPool,
Intermediates: b.IntermediatePool,
KeyUsages: b.opts.keyUsages,
}
} | [
"func",
"(",
"b",
"*",
"Bundler",
")",
"VerifyOptions",
"(",
")",
"x509",
".",
"VerifyOptions",
"{",
"return",
"x509",
".",
"VerifyOptions",
"{",
"Roots",
":",
"b",
".",
"RootPool",
",",
"Intermediates",
":",
"b",
".",
"IntermediatePool",
",",
"KeyUsages",
":",
"b",
".",
"opts",
".",
"keyUsages",
",",
"}",
"\n",
"}"
] | // VerifyOptions generates an x509 VerifyOptions structure that can be
// used for verifying certificates. | [
"VerifyOptions",
"generates",
"an",
"x509",
"VerifyOptions",
"structure",
"that",
"can",
"be",
"used",
"for",
"verifying",
"certificates",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L186-L192 | train |
cloudflare/cfssl | bundler/bundler.go | fetchRemoteCertificate | func fetchRemoteCertificate(certURL string) (fi *fetchedIntermediate, err error) {
log.Debugf("fetching remote certificate: %s", certURL)
var resp *http.Response
resp, err = http.Get(certURL)
if err != nil {
log.Debugf("failed HTTP get: %v", err)
return
}
defer resp.Body.Close()
var certData []byte
certData, err = ioutil.ReadAll(resp.Body)
if err != nil {
log.Debugf("failed to read response body: %v", err)
return
}
log.Debugf("attempting to parse certificate as DER")
crt, err := x509.ParseCertificate(certData)
if err != nil {
log.Debugf("attempting to parse certificate as PEM")
crt, err = helpers.ParseCertificatePEM(certData)
if err != nil {
log.Debugf("failed to parse certificate: %v", err)
return
}
}
log.Debugf("certificate fetch succeeds")
fi = &fetchedIntermediate{Cert: crt, Name: constructCertFileName(crt)}
return
} | go | func fetchRemoteCertificate(certURL string) (fi *fetchedIntermediate, err error) {
log.Debugf("fetching remote certificate: %s", certURL)
var resp *http.Response
resp, err = http.Get(certURL)
if err != nil {
log.Debugf("failed HTTP get: %v", err)
return
}
defer resp.Body.Close()
var certData []byte
certData, err = ioutil.ReadAll(resp.Body)
if err != nil {
log.Debugf("failed to read response body: %v", err)
return
}
log.Debugf("attempting to parse certificate as DER")
crt, err := x509.ParseCertificate(certData)
if err != nil {
log.Debugf("attempting to parse certificate as PEM")
crt, err = helpers.ParseCertificatePEM(certData)
if err != nil {
log.Debugf("failed to parse certificate: %v", err)
return
}
}
log.Debugf("certificate fetch succeeds")
fi = &fetchedIntermediate{Cert: crt, Name: constructCertFileName(crt)}
return
} | [
"func",
"fetchRemoteCertificate",
"(",
"certURL",
"string",
")",
"(",
"fi",
"*",
"fetchedIntermediate",
",",
"err",
"error",
")",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"certURL",
")",
"\n",
"var",
"resp",
"*",
"http",
".",
"Response",
"\n",
"resp",
",",
"err",
"=",
"http",
".",
"Get",
"(",
"certURL",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"defer",
"resp",
".",
"Body",
".",
"Close",
"(",
")",
"\n",
"var",
"certData",
"[",
"]",
"byte",
"\n",
"certData",
",",
"err",
"=",
"ioutil",
".",
"ReadAll",
"(",
"resp",
".",
"Body",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"crt",
",",
"err",
":=",
"x509",
".",
"ParseCertificate",
"(",
"certData",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"crt",
",",
"err",
"=",
"helpers",
".",
"ParseCertificatePEM",
"(",
"certData",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\n",
"}",
"\n",
"}",
"\n\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"fi",
"=",
"&",
"fetchedIntermediate",
"{",
"Cert",
":",
"crt",
",",
"Name",
":",
"constructCertFileName",
"(",
"crt",
")",
"}",
"\n",
"return",
"\n",
"}"
] | // fetchRemoteCertificate retrieves a single URL pointing to a certificate
// and attempts to first parse it as a DER-encoded certificate; if
// this fails, it attempts to decode it as a PEM-encoded certificate. | [
"fetchRemoteCertificate",
"retrieves",
"a",
"single",
"URL",
"pointing",
"to",
"a",
"certificate",
"and",
"attempts",
"to",
"first",
"parse",
"it",
"as",
"a",
"DER",
"-",
"encoded",
"certificate",
";",
"if",
"this",
"fails",
"it",
"attempts",
"to",
"decode",
"it",
"as",
"a",
"PEM",
"-",
"encoded",
"certificate",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L333-L364 | train |
cloudflare/cfssl | bundler/bundler.go | constructCertFileName | func constructCertFileName(cert *x509.Certificate) string {
// construct the filename as the CN with no period and space
name := strings.Replace(cert.Subject.CommonName, ".", "", -1)
name = strings.Replace(name, " ", "", -1)
// add SKI and serial number as extra identifier
name += fmt.Sprintf("_%x", cert.SubjectKeyId)
name += fmt.Sprintf("_%x", cert.SerialNumber.Bytes())
name += ".crt"
return name
} | go | func constructCertFileName(cert *x509.Certificate) string {
// construct the filename as the CN with no period and space
name := strings.Replace(cert.Subject.CommonName, ".", "", -1)
name = strings.Replace(name, " ", "", -1)
// add SKI and serial number as extra identifier
name += fmt.Sprintf("_%x", cert.SubjectKeyId)
name += fmt.Sprintf("_%x", cert.SerialNumber.Bytes())
name += ".crt"
return name
} | [
"func",
"constructCertFileName",
"(",
"cert",
"*",
"x509",
".",
"Certificate",
")",
"string",
"{",
"// construct the filename as the CN with no period and space",
"name",
":=",
"strings",
".",
"Replace",
"(",
"cert",
".",
"Subject",
".",
"CommonName",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"-",
"1",
")",
"\n",
"name",
"=",
"strings",
".",
"Replace",
"(",
"name",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"-",
"1",
")",
"\n\n",
"// add SKI and serial number as extra identifier",
"name",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"cert",
".",
"SubjectKeyId",
")",
"\n",
"name",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"cert",
".",
"SerialNumber",
".",
"Bytes",
"(",
")",
")",
"\n\n",
"name",
"+=",
"\"",
"\"",
"\n",
"return",
"name",
"\n",
"}"
] | // constructCertFileName returns a uniquely identifying file name for a certificate | [
"constructCertFileName",
"returns",
"a",
"uniquely",
"identifying",
"file",
"name",
"for",
"a",
"certificate"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L454-L465 | train |
cloudflare/cfssl | bundler/bundler.go | fetchIntermediates | func (b *Bundler) fetchIntermediates(certs []*x509.Certificate) (err error) {
if IntermediateStash != "" {
log.Debugf("searching intermediates")
if _, err := os.Stat(IntermediateStash); err != nil && os.IsNotExist(err) {
log.Infof("intermediate stash directory %s doesn't exist, creating", IntermediateStash)
err = os.MkdirAll(IntermediateStash, 0755)
if err != nil {
log.Errorf("failed to create intermediate stash directory %s: %v", IntermediateStash, err)
return err
}
log.Infof("intermediate stash directory %s created", IntermediateStash)
}
}
// stores URLs and certificate signatures that have been seen
seen := map[string]bool{}
var foundChains int
// Construct a verify chain as a reversed partial bundle,
// such that the certs are ordered by promxity to the root CAs.
var chain []*fetchedIntermediate
for i, cert := range certs {
var name string
// Only construct filenames for non-leaf intermediate certs
// so they will be saved to disk if necessary.
// Leaf cert gets a empty name and will be skipped.
if i > 0 {
name = constructCertFileName(cert)
}
chain = append([]*fetchedIntermediate{{cert, name}}, chain...)
seen[string(cert.Signature)] = true
}
// Verify the chain and store valid intermediates in the chain.
// If it doesn't verify, fetch the intermediates and extend the chain
// in a DFS manner and verify each time we hit a root.
for {
if len(chain) == 0 {
log.Debugf("search complete")
if foundChains == 0 {
return x509.UnknownAuthorityError{}
}
return nil
}
current := chain[0]
var advanced bool
if b.verifyChain(chain) {
foundChains++
}
log.Debugf("walk AIA issuers")
for _, url := range current.Cert.IssuingCertificateURL {
if seen[url] {
log.Debugf("url %s has been seen", url)
continue
}
crt, err := fetchRemoteCertificate(url)
if err != nil {
continue
} else if seen[string(crt.Cert.Signature)] {
log.Debugf("fetched certificate is known")
continue
}
seen[url] = true
seen[string(crt.Cert.Signature)] = true
chain = append([]*fetchedIntermediate{crt}, chain...)
advanced = true
break
}
if !advanced {
log.Debugf("didn't advance, stepping back")
chain = chain[1:]
}
}
} | go | func (b *Bundler) fetchIntermediates(certs []*x509.Certificate) (err error) {
if IntermediateStash != "" {
log.Debugf("searching intermediates")
if _, err := os.Stat(IntermediateStash); err != nil && os.IsNotExist(err) {
log.Infof("intermediate stash directory %s doesn't exist, creating", IntermediateStash)
err = os.MkdirAll(IntermediateStash, 0755)
if err != nil {
log.Errorf("failed to create intermediate stash directory %s: %v", IntermediateStash, err)
return err
}
log.Infof("intermediate stash directory %s created", IntermediateStash)
}
}
// stores URLs and certificate signatures that have been seen
seen := map[string]bool{}
var foundChains int
// Construct a verify chain as a reversed partial bundle,
// such that the certs are ordered by promxity to the root CAs.
var chain []*fetchedIntermediate
for i, cert := range certs {
var name string
// Only construct filenames for non-leaf intermediate certs
// so they will be saved to disk if necessary.
// Leaf cert gets a empty name and will be skipped.
if i > 0 {
name = constructCertFileName(cert)
}
chain = append([]*fetchedIntermediate{{cert, name}}, chain...)
seen[string(cert.Signature)] = true
}
// Verify the chain and store valid intermediates in the chain.
// If it doesn't verify, fetch the intermediates and extend the chain
// in a DFS manner and verify each time we hit a root.
for {
if len(chain) == 0 {
log.Debugf("search complete")
if foundChains == 0 {
return x509.UnknownAuthorityError{}
}
return nil
}
current := chain[0]
var advanced bool
if b.verifyChain(chain) {
foundChains++
}
log.Debugf("walk AIA issuers")
for _, url := range current.Cert.IssuingCertificateURL {
if seen[url] {
log.Debugf("url %s has been seen", url)
continue
}
crt, err := fetchRemoteCertificate(url)
if err != nil {
continue
} else if seen[string(crt.Cert.Signature)] {
log.Debugf("fetched certificate is known")
continue
}
seen[url] = true
seen[string(crt.Cert.Signature)] = true
chain = append([]*fetchedIntermediate{crt}, chain...)
advanced = true
break
}
if !advanced {
log.Debugf("didn't advance, stepping back")
chain = chain[1:]
}
}
} | [
"func",
"(",
"b",
"*",
"Bundler",
")",
"fetchIntermediates",
"(",
"certs",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"(",
"err",
"error",
")",
"{",
"if",
"IntermediateStash",
"!=",
"\"",
"\"",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"if",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"IntermediateStash",
")",
";",
"err",
"!=",
"nil",
"&&",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"IntermediateStash",
")",
"\n",
"err",
"=",
"os",
".",
"MkdirAll",
"(",
"IntermediateStash",
",",
"0755",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"IntermediateStash",
",",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"IntermediateStash",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// stores URLs and certificate signatures that have been seen",
"seen",
":=",
"map",
"[",
"string",
"]",
"bool",
"{",
"}",
"\n",
"var",
"foundChains",
"int",
"\n\n",
"// Construct a verify chain as a reversed partial bundle,",
"// such that the certs are ordered by promxity to the root CAs.",
"var",
"chain",
"[",
"]",
"*",
"fetchedIntermediate",
"\n",
"for",
"i",
",",
"cert",
":=",
"range",
"certs",
"{",
"var",
"name",
"string",
"\n\n",
"// Only construct filenames for non-leaf intermediate certs",
"// so they will be saved to disk if necessary.",
"// Leaf cert gets a empty name and will be skipped.",
"if",
"i",
">",
"0",
"{",
"name",
"=",
"constructCertFileName",
"(",
"cert",
")",
"\n",
"}",
"\n\n",
"chain",
"=",
"append",
"(",
"[",
"]",
"*",
"fetchedIntermediate",
"{",
"{",
"cert",
",",
"name",
"}",
"}",
",",
"chain",
"...",
")",
"\n",
"seen",
"[",
"string",
"(",
"cert",
".",
"Signature",
")",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"// Verify the chain and store valid intermediates in the chain.",
"// If it doesn't verify, fetch the intermediates and extend the chain",
"// in a DFS manner and verify each time we hit a root.",
"for",
"{",
"if",
"len",
"(",
"chain",
")",
"==",
"0",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"if",
"foundChains",
"==",
"0",
"{",
"return",
"x509",
".",
"UnknownAuthorityError",
"{",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"current",
":=",
"chain",
"[",
"0",
"]",
"\n",
"var",
"advanced",
"bool",
"\n",
"if",
"b",
".",
"verifyChain",
"(",
"chain",
")",
"{",
"foundChains",
"++",
"\n",
"}",
"\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"for",
"_",
",",
"url",
":=",
"range",
"current",
".",
"Cert",
".",
"IssuingCertificateURL",
"{",
"if",
"seen",
"[",
"url",
"]",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"url",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"crt",
",",
"err",
":=",
"fetchRemoteCertificate",
"(",
"url",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"else",
"if",
"seen",
"[",
"string",
"(",
"crt",
".",
"Cert",
".",
"Signature",
")",
"]",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"seen",
"[",
"url",
"]",
"=",
"true",
"\n",
"seen",
"[",
"string",
"(",
"crt",
".",
"Cert",
".",
"Signature",
")",
"]",
"=",
"true",
"\n",
"chain",
"=",
"append",
"(",
"[",
"]",
"*",
"fetchedIntermediate",
"{",
"crt",
"}",
",",
"chain",
"...",
")",
"\n",
"advanced",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n\n",
"if",
"!",
"advanced",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"chain",
"=",
"chain",
"[",
"1",
":",
"]",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // fetchIntermediates goes through each of the URLs in the AIA "Issuing
// CA" extensions and fetches those certificates. If those
// certificates are not present in either the root pool or
// intermediate pool, the certificate is saved to file and added to
// the list of intermediates to be used for verification. This will
// not add any new certificates to the root pool; if the ultimate
// issuer is not trusted, fetching the certicate here will not change
// that. | [
"fetchIntermediates",
"goes",
"through",
"each",
"of",
"the",
"URLs",
"in",
"the",
"AIA",
"Issuing",
"CA",
"extensions",
"and",
"fetches",
"those",
"certificates",
".",
"If",
"those",
"certificates",
"are",
"not",
"present",
"in",
"either",
"the",
"root",
"pool",
"or",
"intermediate",
"pool",
"the",
"certificate",
"is",
"saved",
"to",
"file",
"and",
"added",
"to",
"the",
"list",
"of",
"intermediates",
"to",
"be",
"used",
"for",
"verification",
".",
"This",
"will",
"not",
"add",
"any",
"new",
"certificates",
"to",
"the",
"root",
"pool",
";",
"if",
"the",
"ultimate",
"issuer",
"is",
"not",
"trusted",
"fetching",
"the",
"certicate",
"here",
"will",
"not",
"change",
"that",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L475-L551 | train |
cloudflare/cfssl | bundler/bundler.go | checkExpiringCerts | func checkExpiringCerts(chain []*x509.Certificate) (expiringIntermediates []int) {
now := time.Now()
for i, cert := range chain {
if cert.NotAfter.Sub(now).Hours() < 720 {
expiringIntermediates = append(expiringIntermediates, i)
}
}
return
} | go | func checkExpiringCerts(chain []*x509.Certificate) (expiringIntermediates []int) {
now := time.Now()
for i, cert := range chain {
if cert.NotAfter.Sub(now).Hours() < 720 {
expiringIntermediates = append(expiringIntermediates, i)
}
}
return
} | [
"func",
"checkExpiringCerts",
"(",
"chain",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"(",
"expiringIntermediates",
"[",
"]",
"int",
")",
"{",
"now",
":=",
"time",
".",
"Now",
"(",
")",
"\n",
"for",
"i",
",",
"cert",
":=",
"range",
"chain",
"{",
"if",
"cert",
".",
"NotAfter",
".",
"Sub",
"(",
"now",
")",
".",
"Hours",
"(",
")",
"<",
"720",
"{",
"expiringIntermediates",
"=",
"append",
"(",
"expiringIntermediates",
",",
"i",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"\n",
"}"
] | // checkExpiringCerts returns indices of certs that are expiring within 30 days. | [
"checkExpiringCerts",
"returns",
"indices",
"of",
"certs",
"that",
"are",
"expiring",
"within",
"30",
"days",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L736-L744 | train |
cloudflare/cfssl | bundler/bundler.go | getSKIs | func getSKIs(chain []*x509.Certificate, indices []int) (skis []string) {
for _, index := range indices {
ski := fmt.Sprintf("%X", chain[index].SubjectKeyId)
skis = append(skis, ski)
}
return
} | go | func getSKIs(chain []*x509.Certificate, indices []int) (skis []string) {
for _, index := range indices {
ski := fmt.Sprintf("%X", chain[index].SubjectKeyId)
skis = append(skis, ski)
}
return
} | [
"func",
"getSKIs",
"(",
"chain",
"[",
"]",
"*",
"x509",
".",
"Certificate",
",",
"indices",
"[",
"]",
"int",
")",
"(",
"skis",
"[",
"]",
"string",
")",
"{",
"for",
"_",
",",
"index",
":=",
"range",
"indices",
"{",
"ski",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"chain",
"[",
"index",
"]",
".",
"SubjectKeyId",
")",
"\n",
"skis",
"=",
"append",
"(",
"skis",
",",
"ski",
")",
"\n",
"}",
"\n",
"return",
"\n",
"}"
] | // getSKIs returns a list of cert subject key id in the bundle chain with matched indices. | [
"getSKIs",
"returns",
"a",
"list",
"of",
"cert",
"subject",
"key",
"id",
"in",
"the",
"bundle",
"chain",
"with",
"matched",
"indices",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L747-L753 | train |
cloudflare/cfssl | bundler/bundler.go | expirationWarning | func expirationWarning(expiringIntermediates []int) (ret string) {
if len(expiringIntermediates) == 0 {
return
}
ret = expiringWarningStub
if len(expiringIntermediates) > 1 {
ret = ret + "The expiring certs are"
} else {
ret = ret + "The expiring cert is"
}
for _, index := range expiringIntermediates {
ret = ret + " #" + strconv.Itoa(index+1)
}
ret = ret + " in the chain."
return
} | go | func expirationWarning(expiringIntermediates []int) (ret string) {
if len(expiringIntermediates) == 0 {
return
}
ret = expiringWarningStub
if len(expiringIntermediates) > 1 {
ret = ret + "The expiring certs are"
} else {
ret = ret + "The expiring cert is"
}
for _, index := range expiringIntermediates {
ret = ret + " #" + strconv.Itoa(index+1)
}
ret = ret + " in the chain."
return
} | [
"func",
"expirationWarning",
"(",
"expiringIntermediates",
"[",
"]",
"int",
")",
"(",
"ret",
"string",
")",
"{",
"if",
"len",
"(",
"expiringIntermediates",
")",
"==",
"0",
"{",
"return",
"\n",
"}",
"\n\n",
"ret",
"=",
"expiringWarningStub",
"\n",
"if",
"len",
"(",
"expiringIntermediates",
")",
">",
"1",
"{",
"ret",
"=",
"ret",
"+",
"\"",
"\"",
"\n",
"}",
"else",
"{",
"ret",
"=",
"ret",
"+",
"\"",
"\"",
"\n",
"}",
"\n",
"for",
"_",
",",
"index",
":=",
"range",
"expiringIntermediates",
"{",
"ret",
"=",
"ret",
"+",
"\"",
"\"",
"+",
"strconv",
".",
"Itoa",
"(",
"index",
"+",
"1",
")",
"\n",
"}",
"\n",
"ret",
"=",
"ret",
"+",
"\"",
"\"",
"\n",
"return",
"\n",
"}"
] | // expirationWarning generates a warning message with expiring certs. | [
"expirationWarning",
"generates",
"a",
"warning",
"message",
"with",
"expiring",
"certs",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L756-L772 | train |
cloudflare/cfssl | bundler/bundler.go | untrustedPlatformsWarning | func untrustedPlatformsWarning(platforms []string) string {
if len(ubiquity.Platforms) == 0 {
return ubiquityWarning
}
if len(platforms) == 0 {
return ""
}
msg := untrustedWarningStub
for i, platform := range platforms {
if i > 0 {
msg += ","
}
msg += " " + platform
}
msg += "."
return msg
} | go | func untrustedPlatformsWarning(platforms []string) string {
if len(ubiquity.Platforms) == 0 {
return ubiquityWarning
}
if len(platforms) == 0 {
return ""
}
msg := untrustedWarningStub
for i, platform := range platforms {
if i > 0 {
msg += ","
}
msg += " " + platform
}
msg += "."
return msg
} | [
"func",
"untrustedPlatformsWarning",
"(",
"platforms",
"[",
"]",
"string",
")",
"string",
"{",
"if",
"len",
"(",
"ubiquity",
".",
"Platforms",
")",
"==",
"0",
"{",
"return",
"ubiquityWarning",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"platforms",
")",
"==",
"0",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n\n",
"msg",
":=",
"untrustedWarningStub",
"\n",
"for",
"i",
",",
"platform",
":=",
"range",
"platforms",
"{",
"if",
"i",
">",
"0",
"{",
"msg",
"+=",
"\"",
"\"",
"\n",
"}",
"\n",
"msg",
"+=",
"\"",
"\"",
"+",
"platform",
"\n",
"}",
"\n",
"msg",
"+=",
"\"",
"\"",
"\n",
"return",
"msg",
"\n",
"}"
] | // untrustedPlatformsWarning generates a warning message with untrusted platform names. | [
"untrustedPlatformsWarning",
"generates",
"a",
"warning",
"message",
"with",
"untrusted",
"platform",
"names",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L775-L793 | train |
cloudflare/cfssl | bundler/bundler.go | optimalChains | func optimalChains(chains [][]*x509.Certificate) [][]*x509.Certificate {
// Find shortest chains
chains = ubiquity.Filter(chains, ubiquity.CompareChainLength)
// Find the chains with longest expiry.
chains = ubiquity.Filter(chains, ubiquity.CompareChainExpiry)
// Find the chains with more advanced crypto suite
chains = ubiquity.Filter(chains, ubiquity.CompareChainCryptoSuite)
return chains
} | go | func optimalChains(chains [][]*x509.Certificate) [][]*x509.Certificate {
// Find shortest chains
chains = ubiquity.Filter(chains, ubiquity.CompareChainLength)
// Find the chains with longest expiry.
chains = ubiquity.Filter(chains, ubiquity.CompareChainExpiry)
// Find the chains with more advanced crypto suite
chains = ubiquity.Filter(chains, ubiquity.CompareChainCryptoSuite)
return chains
} | [
"func",
"optimalChains",
"(",
"chains",
"[",
"]",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"[",
"]",
"[",
"]",
"*",
"x509",
".",
"Certificate",
"{",
"// Find shortest chains",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareChainLength",
")",
"\n",
"// Find the chains with longest expiry.",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareChainExpiry",
")",
"\n",
"// Find the chains with more advanced crypto suite",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareChainCryptoSuite",
")",
"\n\n",
"return",
"chains",
"\n",
"}"
] | // Optimal chains are the shortest chains, with newest intermediates and most advanced crypto suite being the tie breaker. | [
"Optimal",
"chains",
"are",
"the",
"shortest",
"chains",
"with",
"newest",
"intermediates",
"and",
"most",
"advanced",
"crypto",
"suite",
"being",
"the",
"tie",
"breaker",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L796-L805 | train |
cloudflare/cfssl | bundler/bundler.go | ubiquitousChains | func ubiquitousChains(chains [][]*x509.Certificate) [][]*x509.Certificate {
// Filter out chains with highest cross platform ubiquity.
chains = ubiquity.Filter(chains, ubiquity.ComparePlatformUbiquity)
// Prefer that all intermediates are SHA-2 certs if the leaf is a SHA-2 cert, in order to improve ubiquity.
chains = ubiquity.Filter(chains, ubiquity.CompareSHA2Homogeneity)
// Filter shortest chains
chains = ubiquity.Filter(chains, ubiquity.CompareChainLength)
// Filter chains with highest signature hash ubiquity.
chains = ubiquity.Filter(chains, ubiquity.CompareChainHashUbiquity)
// Filter chains with highest keyAlgo ubiquity.
chains = ubiquity.Filter(chains, ubiquity.CompareChainKeyAlgoUbiquity)
// Filter chains with intermediates that last longer.
chains = ubiquity.Filter(chains, ubiquity.CompareExpiryUbiquity)
// Use the optimal strategy as final tie breaker.
return optimalChains(chains)
} | go | func ubiquitousChains(chains [][]*x509.Certificate) [][]*x509.Certificate {
// Filter out chains with highest cross platform ubiquity.
chains = ubiquity.Filter(chains, ubiquity.ComparePlatformUbiquity)
// Prefer that all intermediates are SHA-2 certs if the leaf is a SHA-2 cert, in order to improve ubiquity.
chains = ubiquity.Filter(chains, ubiquity.CompareSHA2Homogeneity)
// Filter shortest chains
chains = ubiquity.Filter(chains, ubiquity.CompareChainLength)
// Filter chains with highest signature hash ubiquity.
chains = ubiquity.Filter(chains, ubiquity.CompareChainHashUbiquity)
// Filter chains with highest keyAlgo ubiquity.
chains = ubiquity.Filter(chains, ubiquity.CompareChainKeyAlgoUbiquity)
// Filter chains with intermediates that last longer.
chains = ubiquity.Filter(chains, ubiquity.CompareExpiryUbiquity)
// Use the optimal strategy as final tie breaker.
return optimalChains(chains)
} | [
"func",
"ubiquitousChains",
"(",
"chains",
"[",
"]",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"[",
"]",
"[",
"]",
"*",
"x509",
".",
"Certificate",
"{",
"// Filter out chains with highest cross platform ubiquity.",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"ComparePlatformUbiquity",
")",
"\n",
"// Prefer that all intermediates are SHA-2 certs if the leaf is a SHA-2 cert, in order to improve ubiquity.",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareSHA2Homogeneity",
")",
"\n",
"// Filter shortest chains",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareChainLength",
")",
"\n",
"// Filter chains with highest signature hash ubiquity.",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareChainHashUbiquity",
")",
"\n",
"// Filter chains with highest keyAlgo ubiquity.",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareChainKeyAlgoUbiquity",
")",
"\n",
"// Filter chains with intermediates that last longer.",
"chains",
"=",
"ubiquity",
".",
"Filter",
"(",
"chains",
",",
"ubiquity",
".",
"CompareExpiryUbiquity",
")",
"\n",
"// Use the optimal strategy as final tie breaker.",
"return",
"optimalChains",
"(",
"chains",
")",
"\n",
"}"
] | // Ubiquitous chains are the chains with highest platform coverage and break ties with the optimal strategy. | [
"Ubiquitous",
"chains",
"are",
"the",
"chains",
"with",
"highest",
"platform",
"coverage",
"and",
"break",
"ties",
"with",
"the",
"optimal",
"strategy",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L808-L823 | train |
cloudflare/cfssl | bundler/bundler.go | diff | func diff(chain1, chain2 []*x509.Certificate) bool {
// Check if bundled one is different from the input.
diff := false
if len(chain1) != len(chain2) {
diff = true
} else {
for i := 0; i < len(chain1); i++ {
cert1 := chain1[i]
cert2 := chain2[i]
// Use signature to differentiate.
if !bytes.Equal(cert1.Signature, cert2.Signature) {
diff = true
break
}
}
}
return diff
} | go | func diff(chain1, chain2 []*x509.Certificate) bool {
// Check if bundled one is different from the input.
diff := false
if len(chain1) != len(chain2) {
diff = true
} else {
for i := 0; i < len(chain1); i++ {
cert1 := chain1[i]
cert2 := chain2[i]
// Use signature to differentiate.
if !bytes.Equal(cert1.Signature, cert2.Signature) {
diff = true
break
}
}
}
return diff
} | [
"func",
"diff",
"(",
"chain1",
",",
"chain2",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"bool",
"{",
"// Check if bundled one is different from the input.",
"diff",
":=",
"false",
"\n",
"if",
"len",
"(",
"chain1",
")",
"!=",
"len",
"(",
"chain2",
")",
"{",
"diff",
"=",
"true",
"\n",
"}",
"else",
"{",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"len",
"(",
"chain1",
")",
";",
"i",
"++",
"{",
"cert1",
":=",
"chain1",
"[",
"i",
"]",
"\n",
"cert2",
":=",
"chain2",
"[",
"i",
"]",
"\n",
"// Use signature to differentiate.",
"if",
"!",
"bytes",
".",
"Equal",
"(",
"cert1",
".",
"Signature",
",",
"cert2",
".",
"Signature",
")",
"{",
"diff",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"diff",
"\n",
"}"
] | // diff checkes if two input cert chains are not identical | [
"diff",
"checkes",
"if",
"two",
"input",
"cert",
"chains",
"are",
"not",
"identical"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/bundler/bundler.go#L826-L843 | train |
cloudflare/cfssl | scan/tls_handshake.go | cipherSuiteScan | func cipherSuiteScan(addr, hostname string) (grade Grade, output Output, err error) {
var cvList cipherVersionList
allCiphers := allCiphersIDs()
var vers uint16
for vers = tls.VersionTLS12; vers >= tls.VersionSSL30; vers-- {
ciphers := make([]uint16, len(allCiphers))
copy(ciphers, allCiphers)
for len(ciphers) > 0 {
var cipherIndex int
cipherIndex, _, _, err = sayHello(addr, hostname, ciphers, nil, vers, nil)
if err != nil {
if err == errHelloFailed {
err = nil
break
}
return
}
if vers == tls.VersionSSL30 {
grade = Warning
}
cipherID := ciphers[cipherIndex]
// If this is an EC cipher suite, do a second scan for curve support
var supportedCurves []tls.CurveID
if tls.CipherSuites[cipherID].EllipticCurve {
supportedCurves, err = doCurveScan(addr, hostname, vers, cipherID, ciphers)
if len(supportedCurves) == 0 {
err = errors.New("couldn't negotiate any curves")
}
}
for i, c := range cvList {
if cipherID == c.cipherID {
cvList[i].data = append(c.data, cipherDatum{vers, supportedCurves})
goto exists
}
}
cvList = append(cvList, cipherVersions{cipherID, []cipherDatum{{vers, supportedCurves}}})
exists:
ciphers = append(ciphers[:cipherIndex], ciphers[cipherIndex+1:]...)
}
}
if len(cvList) == 0 {
err = errors.New("couldn't negotiate any cipher suites")
return
}
if grade != Warning {
grade = Good
}
output = cvList
return
} | go | func cipherSuiteScan(addr, hostname string) (grade Grade, output Output, err error) {
var cvList cipherVersionList
allCiphers := allCiphersIDs()
var vers uint16
for vers = tls.VersionTLS12; vers >= tls.VersionSSL30; vers-- {
ciphers := make([]uint16, len(allCiphers))
copy(ciphers, allCiphers)
for len(ciphers) > 0 {
var cipherIndex int
cipherIndex, _, _, err = sayHello(addr, hostname, ciphers, nil, vers, nil)
if err != nil {
if err == errHelloFailed {
err = nil
break
}
return
}
if vers == tls.VersionSSL30 {
grade = Warning
}
cipherID := ciphers[cipherIndex]
// If this is an EC cipher suite, do a second scan for curve support
var supportedCurves []tls.CurveID
if tls.CipherSuites[cipherID].EllipticCurve {
supportedCurves, err = doCurveScan(addr, hostname, vers, cipherID, ciphers)
if len(supportedCurves) == 0 {
err = errors.New("couldn't negotiate any curves")
}
}
for i, c := range cvList {
if cipherID == c.cipherID {
cvList[i].data = append(c.data, cipherDatum{vers, supportedCurves})
goto exists
}
}
cvList = append(cvList, cipherVersions{cipherID, []cipherDatum{{vers, supportedCurves}}})
exists:
ciphers = append(ciphers[:cipherIndex], ciphers[cipherIndex+1:]...)
}
}
if len(cvList) == 0 {
err = errors.New("couldn't negotiate any cipher suites")
return
}
if grade != Warning {
grade = Good
}
output = cvList
return
} | [
"func",
"cipherSuiteScan",
"(",
"addr",
",",
"hostname",
"string",
")",
"(",
"grade",
"Grade",
",",
"output",
"Output",
",",
"err",
"error",
")",
"{",
"var",
"cvList",
"cipherVersionList",
"\n",
"allCiphers",
":=",
"allCiphersIDs",
"(",
")",
"\n\n",
"var",
"vers",
"uint16",
"\n",
"for",
"vers",
"=",
"tls",
".",
"VersionTLS12",
";",
"vers",
">=",
"tls",
".",
"VersionSSL30",
";",
"vers",
"--",
"{",
"ciphers",
":=",
"make",
"(",
"[",
"]",
"uint16",
",",
"len",
"(",
"allCiphers",
")",
")",
"\n",
"copy",
"(",
"ciphers",
",",
"allCiphers",
")",
"\n",
"for",
"len",
"(",
"ciphers",
")",
">",
"0",
"{",
"var",
"cipherIndex",
"int",
"\n",
"cipherIndex",
",",
"_",
",",
"_",
",",
"err",
"=",
"sayHello",
"(",
"addr",
",",
"hostname",
",",
"ciphers",
",",
"nil",
",",
"vers",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"err",
"==",
"errHelloFailed",
"{",
"err",
"=",
"nil",
"\n",
"break",
"\n",
"}",
"\n",
"return",
"\n",
"}",
"\n",
"if",
"vers",
"==",
"tls",
".",
"VersionSSL30",
"{",
"grade",
"=",
"Warning",
"\n",
"}",
"\n",
"cipherID",
":=",
"ciphers",
"[",
"cipherIndex",
"]",
"\n\n",
"// If this is an EC cipher suite, do a second scan for curve support",
"var",
"supportedCurves",
"[",
"]",
"tls",
".",
"CurveID",
"\n",
"if",
"tls",
".",
"CipherSuites",
"[",
"cipherID",
"]",
".",
"EllipticCurve",
"{",
"supportedCurves",
",",
"err",
"=",
"doCurveScan",
"(",
"addr",
",",
"hostname",
",",
"vers",
",",
"cipherID",
",",
"ciphers",
")",
"\n",
"if",
"len",
"(",
"supportedCurves",
")",
"==",
"0",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"i",
",",
"c",
":=",
"range",
"cvList",
"{",
"if",
"cipherID",
"==",
"c",
".",
"cipherID",
"{",
"cvList",
"[",
"i",
"]",
".",
"data",
"=",
"append",
"(",
"c",
".",
"data",
",",
"cipherDatum",
"{",
"vers",
",",
"supportedCurves",
"}",
")",
"\n",
"goto",
"exists",
"\n",
"}",
"\n",
"}",
"\n",
"cvList",
"=",
"append",
"(",
"cvList",
",",
"cipherVersions",
"{",
"cipherID",
",",
"[",
"]",
"cipherDatum",
"{",
"{",
"vers",
",",
"supportedCurves",
"}",
"}",
"}",
")",
"\n",
"exists",
":",
"ciphers",
"=",
"append",
"(",
"ciphers",
"[",
":",
"cipherIndex",
"]",
",",
"ciphers",
"[",
"cipherIndex",
"+",
"1",
":",
"]",
"...",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"cvList",
")",
"==",
"0",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"if",
"grade",
"!=",
"Warning",
"{",
"grade",
"=",
"Good",
"\n",
"}",
"\n\n",
"output",
"=",
"cvList",
"\n",
"return",
"\n",
"}"
] | // cipherSuiteScan returns, by TLS Version, the sort list of cipher suites
// supported by the host | [
"cipherSuiteScan",
"returns",
"by",
"TLS",
"Version",
"the",
"sort",
"list",
"of",
"cipher",
"suites",
"supported",
"by",
"the",
"host"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/tls_handshake.go#L271-L325 | train |
cloudflare/cfssl | scan/tls_handshake.go | sigAlgsScan | func sigAlgsScan(addr, hostname string) (grade Grade, output Output, err error) {
var supportedSigAlgs []tls.SignatureAndHash
for _, sigAlg := range tls.AllSignatureAndHashAlgorithms {
_, _, _, e := sayHello(addr, hostname, nil, nil, tls.VersionTLS12, []tls.SignatureAndHash{sigAlg})
if e == nil {
supportedSigAlgs = append(supportedSigAlgs, sigAlg)
}
}
if len(supportedSigAlgs) > 0 {
grade = Good
output = supportedSigAlgs
} else {
err = errors.New("no SigAlgs supported")
}
return
} | go | func sigAlgsScan(addr, hostname string) (grade Grade, output Output, err error) {
var supportedSigAlgs []tls.SignatureAndHash
for _, sigAlg := range tls.AllSignatureAndHashAlgorithms {
_, _, _, e := sayHello(addr, hostname, nil, nil, tls.VersionTLS12, []tls.SignatureAndHash{sigAlg})
if e == nil {
supportedSigAlgs = append(supportedSigAlgs, sigAlg)
}
}
if len(supportedSigAlgs) > 0 {
grade = Good
output = supportedSigAlgs
} else {
err = errors.New("no SigAlgs supported")
}
return
} | [
"func",
"sigAlgsScan",
"(",
"addr",
",",
"hostname",
"string",
")",
"(",
"grade",
"Grade",
",",
"output",
"Output",
",",
"err",
"error",
")",
"{",
"var",
"supportedSigAlgs",
"[",
"]",
"tls",
".",
"SignatureAndHash",
"\n",
"for",
"_",
",",
"sigAlg",
":=",
"range",
"tls",
".",
"AllSignatureAndHashAlgorithms",
"{",
"_",
",",
"_",
",",
"_",
",",
"e",
":=",
"sayHello",
"(",
"addr",
",",
"hostname",
",",
"nil",
",",
"nil",
",",
"tls",
".",
"VersionTLS12",
",",
"[",
"]",
"tls",
".",
"SignatureAndHash",
"{",
"sigAlg",
"}",
")",
"\n",
"if",
"e",
"==",
"nil",
"{",
"supportedSigAlgs",
"=",
"append",
"(",
"supportedSigAlgs",
",",
"sigAlg",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"supportedSigAlgs",
")",
">",
"0",
"{",
"grade",
"=",
"Good",
"\n",
"output",
"=",
"supportedSigAlgs",
"\n",
"}",
"else",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"\n",
"}"
] | // sigAlgsScan returns the accepted signature and hash algorithms of the host | [
"sigAlgsScan",
"returns",
"the",
"accepted",
"signature",
"and",
"hash",
"algorithms",
"of",
"the",
"host"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/tls_handshake.go#L328-L344 | train |
cloudflare/cfssl | scan/tls_handshake.go | certSigAlgsScan | func certSigAlgsScan(addr, hostname string) (grade Grade, output Output, err error) {
var certSigAlgs = make(map[string]string)
for _, sigAlg := range tls.AllSignatureAndHashAlgorithms {
_, _, derCerts, e := sayHello(addr, hostname, nil, nil, tls.VersionTLS12, []tls.SignatureAndHash{sigAlg})
if e == nil {
if len(derCerts) == 0 {
return Bad, nil, errors.New("no certs returned")
}
certs, _, err := helpers.ParseCertificatesDER(derCerts[0], "")
if err != nil {
return Bad, nil, err
}
certSigAlgs[sigAlg.String()] = helpers.SignatureString(certs[0].SignatureAlgorithm)
//certSigAlgs = append(certSigAlgs, certs[0].SignatureAlgorithm)
}
}
if len(certSigAlgs) > 0 {
grade = Good
output = certSigAlgs
} else {
err = errors.New("no SigAlgs supported")
}
return
} | go | func certSigAlgsScan(addr, hostname string) (grade Grade, output Output, err error) {
var certSigAlgs = make(map[string]string)
for _, sigAlg := range tls.AllSignatureAndHashAlgorithms {
_, _, derCerts, e := sayHello(addr, hostname, nil, nil, tls.VersionTLS12, []tls.SignatureAndHash{sigAlg})
if e == nil {
if len(derCerts) == 0 {
return Bad, nil, errors.New("no certs returned")
}
certs, _, err := helpers.ParseCertificatesDER(derCerts[0], "")
if err != nil {
return Bad, nil, err
}
certSigAlgs[sigAlg.String()] = helpers.SignatureString(certs[0].SignatureAlgorithm)
//certSigAlgs = append(certSigAlgs, certs[0].SignatureAlgorithm)
}
}
if len(certSigAlgs) > 0 {
grade = Good
output = certSigAlgs
} else {
err = errors.New("no SigAlgs supported")
}
return
} | [
"func",
"certSigAlgsScan",
"(",
"addr",
",",
"hostname",
"string",
")",
"(",
"grade",
"Grade",
",",
"output",
"Output",
",",
"err",
"error",
")",
"{",
"var",
"certSigAlgs",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"for",
"_",
",",
"sigAlg",
":=",
"range",
"tls",
".",
"AllSignatureAndHashAlgorithms",
"{",
"_",
",",
"_",
",",
"derCerts",
",",
"e",
":=",
"sayHello",
"(",
"addr",
",",
"hostname",
",",
"nil",
",",
"nil",
",",
"tls",
".",
"VersionTLS12",
",",
"[",
"]",
"tls",
".",
"SignatureAndHash",
"{",
"sigAlg",
"}",
")",
"\n",
"if",
"e",
"==",
"nil",
"{",
"if",
"len",
"(",
"derCerts",
")",
"==",
"0",
"{",
"return",
"Bad",
",",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"certs",
",",
"_",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatesDER",
"(",
"derCerts",
"[",
"0",
"]",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"Bad",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"certSigAlgs",
"[",
"sigAlg",
".",
"String",
"(",
")",
"]",
"=",
"helpers",
".",
"SignatureString",
"(",
"certs",
"[",
"0",
"]",
".",
"SignatureAlgorithm",
")",
"\n",
"//certSigAlgs = append(certSigAlgs, certs[0].SignatureAlgorithm)",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"certSigAlgs",
")",
">",
"0",
"{",
"grade",
"=",
"Good",
"\n",
"output",
"=",
"certSigAlgs",
"\n",
"}",
"else",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"\n\n",
"}"
] | // certSigAlgScan returns the server certificate with various sigature and hash algorithms in the ClientHello | [
"certSigAlgScan",
"returns",
"the",
"server",
"certificate",
"with",
"various",
"sigature",
"and",
"hash",
"algorithms",
"in",
"the",
"ClientHello"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/tls_handshake.go#L347-L373 | train |
cloudflare/cfssl | scan/tls_handshake.go | certSigAlgsScanByCipher | func certSigAlgsScanByCipher(addr, hostname string) (grade Grade, output Output, err error) {
var certSigAlgs = make(map[string]string)
for cipherID := range tls.CipherSuites {
_, _, derCerts, e := sayHello(addr, hostname, []uint16{cipherID}, nil, tls.VersionTLS12, []tls.SignatureAndHash{})
if e == nil {
if len(derCerts) == 0 {
return Bad, nil, errors.New("no certs returned")
}
certs, _, err := helpers.ParseCertificatesDER(derCerts[0], "")
if err != nil {
return Bad, nil, err
}
certSigAlgs[tls.CipherSuites[cipherID].Name] = helpers.SignatureString(certs[0].SignatureAlgorithm)
//certSigAlgs = append(certSigAlgs, certs[0].SignatureAlgorithm)
}
}
if len(certSigAlgs) > 0 {
grade = Good
output = certSigAlgs
} else {
err = errors.New("no cipher supported")
}
return
} | go | func certSigAlgsScanByCipher(addr, hostname string) (grade Grade, output Output, err error) {
var certSigAlgs = make(map[string]string)
for cipherID := range tls.CipherSuites {
_, _, derCerts, e := sayHello(addr, hostname, []uint16{cipherID}, nil, tls.VersionTLS12, []tls.SignatureAndHash{})
if e == nil {
if len(derCerts) == 0 {
return Bad, nil, errors.New("no certs returned")
}
certs, _, err := helpers.ParseCertificatesDER(derCerts[0], "")
if err != nil {
return Bad, nil, err
}
certSigAlgs[tls.CipherSuites[cipherID].Name] = helpers.SignatureString(certs[0].SignatureAlgorithm)
//certSigAlgs = append(certSigAlgs, certs[0].SignatureAlgorithm)
}
}
if len(certSigAlgs) > 0 {
grade = Good
output = certSigAlgs
} else {
err = errors.New("no cipher supported")
}
return
} | [
"func",
"certSigAlgsScanByCipher",
"(",
"addr",
",",
"hostname",
"string",
")",
"(",
"grade",
"Grade",
",",
"output",
"Output",
",",
"err",
"error",
")",
"{",
"var",
"certSigAlgs",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"for",
"cipherID",
":=",
"range",
"tls",
".",
"CipherSuites",
"{",
"_",
",",
"_",
",",
"derCerts",
",",
"e",
":=",
"sayHello",
"(",
"addr",
",",
"hostname",
",",
"[",
"]",
"uint16",
"{",
"cipherID",
"}",
",",
"nil",
",",
"tls",
".",
"VersionTLS12",
",",
"[",
"]",
"tls",
".",
"SignatureAndHash",
"{",
"}",
")",
"\n",
"if",
"e",
"==",
"nil",
"{",
"if",
"len",
"(",
"derCerts",
")",
"==",
"0",
"{",
"return",
"Bad",
",",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"certs",
",",
"_",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatesDER",
"(",
"derCerts",
"[",
"0",
"]",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"Bad",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"certSigAlgs",
"[",
"tls",
".",
"CipherSuites",
"[",
"cipherID",
"]",
".",
"Name",
"]",
"=",
"helpers",
".",
"SignatureString",
"(",
"certs",
"[",
"0",
"]",
".",
"SignatureAlgorithm",
")",
"\n",
"//certSigAlgs = append(certSigAlgs, certs[0].SignatureAlgorithm)",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"certSigAlgs",
")",
">",
"0",
"{",
"grade",
"=",
"Good",
"\n",
"output",
"=",
"certSigAlgs",
"\n",
"}",
"else",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"\n",
"}"
] | // certSigAlgScan returns the server certificate with various ciphers in the ClientHello | [
"certSigAlgScan",
"returns",
"the",
"server",
"certificate",
"with",
"various",
"ciphers",
"in",
"the",
"ClientHello"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/tls_handshake.go#L376-L401 | train |
cloudflare/cfssl | scan/tls_handshake.go | ecCurveScan | func ecCurveScan(addr, hostname string) (grade Grade, output Output, err error) {
allCurves := allCurvesIDs()
curves := make([]tls.CurveID, len(allCurves))
copy(curves, allCurves)
var supportedCurves []string
for len(curves) > 0 {
var curveIndex int
_, curveIndex, _, err = sayHello(addr, hostname, allECDHECiphersIDs(), curves, tls.VersionTLS12, nil)
if err != nil {
// This case is expected, because eventually we ask only for curves the server doesn't support
if err == errHelloFailed {
err = nil
break
}
return
}
curveID := curves[curveIndex]
supportedCurves = append(supportedCurves, tls.Curves[curveID])
curves = append(curves[:curveIndex], curves[curveIndex+1:]...)
}
output = supportedCurves
grade = Good
return
} | go | func ecCurveScan(addr, hostname string) (grade Grade, output Output, err error) {
allCurves := allCurvesIDs()
curves := make([]tls.CurveID, len(allCurves))
copy(curves, allCurves)
var supportedCurves []string
for len(curves) > 0 {
var curveIndex int
_, curveIndex, _, err = sayHello(addr, hostname, allECDHECiphersIDs(), curves, tls.VersionTLS12, nil)
if err != nil {
// This case is expected, because eventually we ask only for curves the server doesn't support
if err == errHelloFailed {
err = nil
break
}
return
}
curveID := curves[curveIndex]
supportedCurves = append(supportedCurves, tls.Curves[curveID])
curves = append(curves[:curveIndex], curves[curveIndex+1:]...)
}
output = supportedCurves
grade = Good
return
} | [
"func",
"ecCurveScan",
"(",
"addr",
",",
"hostname",
"string",
")",
"(",
"grade",
"Grade",
",",
"output",
"Output",
",",
"err",
"error",
")",
"{",
"allCurves",
":=",
"allCurvesIDs",
"(",
")",
"\n",
"curves",
":=",
"make",
"(",
"[",
"]",
"tls",
".",
"CurveID",
",",
"len",
"(",
"allCurves",
")",
")",
"\n",
"copy",
"(",
"curves",
",",
"allCurves",
")",
"\n",
"var",
"supportedCurves",
"[",
"]",
"string",
"\n",
"for",
"len",
"(",
"curves",
")",
">",
"0",
"{",
"var",
"curveIndex",
"int",
"\n",
"_",
",",
"curveIndex",
",",
"_",
",",
"err",
"=",
"sayHello",
"(",
"addr",
",",
"hostname",
",",
"allECDHECiphersIDs",
"(",
")",
",",
"curves",
",",
"tls",
".",
"VersionTLS12",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// This case is expected, because eventually we ask only for curves the server doesn't support",
"if",
"err",
"==",
"errHelloFailed",
"{",
"err",
"=",
"nil",
"\n",
"break",
"\n",
"}",
"\n",
"return",
"\n",
"}",
"\n",
"curveID",
":=",
"curves",
"[",
"curveIndex",
"]",
"\n",
"supportedCurves",
"=",
"append",
"(",
"supportedCurves",
",",
"tls",
".",
"Curves",
"[",
"curveID",
"]",
")",
"\n",
"curves",
"=",
"append",
"(",
"curves",
"[",
":",
"curveIndex",
"]",
",",
"curves",
"[",
"curveIndex",
"+",
"1",
":",
"]",
"...",
")",
"\n",
"}",
"\n",
"output",
"=",
"supportedCurves",
"\n",
"grade",
"=",
"Good",
"\n",
"return",
"\n",
"}"
] | // ecCurveScan returns the elliptic curves supported by the host. | [
"ecCurveScan",
"returns",
"the",
"elliptic",
"curves",
"supported",
"by",
"the",
"host",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/tls_handshake.go#L404-L427 | train |
cloudflare/cfssl | api/generator/generator.go | NewHandler | func NewHandler(validator Validator) (http.Handler, error) {
log.Info("setting up key / CSR generator")
return &api.HTTPHandler{
Handler: &Handler{
generator: &csr.Generator{Validator: validator},
},
Methods: []string{"POST"},
}, nil
} | go | func NewHandler(validator Validator) (http.Handler, error) {
log.Info("setting up key / CSR generator")
return &api.HTTPHandler{
Handler: &Handler{
generator: &csr.Generator{Validator: validator},
},
Methods: []string{"POST"},
}, nil
} | [
"func",
"NewHandler",
"(",
"validator",
"Validator",
")",
"(",
"http",
".",
"Handler",
",",
"error",
")",
"{",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"return",
"&",
"api",
".",
"HTTPHandler",
"{",
"Handler",
":",
"&",
"Handler",
"{",
"generator",
":",
"&",
"csr",
".",
"Generator",
"{",
"Validator",
":",
"validator",
"}",
",",
"}",
",",
"Methods",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewHandler builds a new Handler from the
// validation function provided. | [
"NewHandler",
"builds",
"a",
"new",
"Handler",
"from",
"the",
"validation",
"function",
"provided",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/generator/generator.go#L60-L68 | train |
cloudflare/cfssl | api/generator/generator.go | Handle | func (g *Handler) Handle(w http.ResponseWriter, r *http.Request) error {
log.Info("request for CSR")
body, err := ioutil.ReadAll(r.Body)
if err != nil {
log.Warningf("failed to read request body: %v", err)
return errors.NewBadRequest(err)
}
r.Body.Close()
req := new(csr.CertificateRequest)
req.KeyRequest = csr.NewBasicKeyRequest()
err = json.Unmarshal(body, req)
if err != nil {
log.Warningf("failed to unmarshal request: %v", err)
return errors.NewBadRequest(err)
}
if req.CA != nil {
log.Warningf("request received with CA section")
return errors.NewBadRequestString("ca section only permitted in initca")
}
csr, key, err := g.generator.ProcessRequest(req)
if err != nil {
log.Warningf("failed to process CSR: %v", err)
// The validator returns a *cfssl/errors.HttpError
return err
}
sum, err := computeSum(csr)
if err != nil {
return errors.NewBadRequest(err)
}
// Both key and csr are returned PEM-encoded.
response := api.NewSuccessResponse(&CertRequest{
Key: string(key),
CSR: string(csr),
Sums: map[string]Sum{"certificate_request": sum},
})
w.Header().Set("Content-Type", "application/json")
enc := json.NewEncoder(w)
err = enc.Encode(response)
return err
} | go | func (g *Handler) Handle(w http.ResponseWriter, r *http.Request) error {
log.Info("request for CSR")
body, err := ioutil.ReadAll(r.Body)
if err != nil {
log.Warningf("failed to read request body: %v", err)
return errors.NewBadRequest(err)
}
r.Body.Close()
req := new(csr.CertificateRequest)
req.KeyRequest = csr.NewBasicKeyRequest()
err = json.Unmarshal(body, req)
if err != nil {
log.Warningf("failed to unmarshal request: %v", err)
return errors.NewBadRequest(err)
}
if req.CA != nil {
log.Warningf("request received with CA section")
return errors.NewBadRequestString("ca section only permitted in initca")
}
csr, key, err := g.generator.ProcessRequest(req)
if err != nil {
log.Warningf("failed to process CSR: %v", err)
// The validator returns a *cfssl/errors.HttpError
return err
}
sum, err := computeSum(csr)
if err != nil {
return errors.NewBadRequest(err)
}
// Both key and csr are returned PEM-encoded.
response := api.NewSuccessResponse(&CertRequest{
Key: string(key),
CSR: string(csr),
Sums: map[string]Sum{"certificate_request": sum},
})
w.Header().Set("Content-Type", "application/json")
enc := json.NewEncoder(w)
err = enc.Encode(response)
return err
} | [
"func",
"(",
"g",
"*",
"Handler",
")",
"Handle",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"error",
"{",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"body",
",",
"err",
":=",
"ioutil",
".",
"ReadAll",
"(",
"r",
".",
"Body",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n",
"r",
".",
"Body",
".",
"Close",
"(",
")",
"\n\n",
"req",
":=",
"new",
"(",
"csr",
".",
"CertificateRequest",
")",
"\n",
"req",
".",
"KeyRequest",
"=",
"csr",
".",
"NewBasicKeyRequest",
"(",
")",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"body",
",",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"req",
".",
"CA",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"errors",
".",
"NewBadRequestString",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"csr",
",",
"key",
",",
"err",
":=",
"g",
".",
"generator",
".",
"ProcessRequest",
"(",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"// The validator returns a *cfssl/errors.HttpError",
"return",
"err",
"\n",
"}",
"\n\n",
"sum",
",",
"err",
":=",
"computeSum",
"(",
"csr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Both key and csr are returned PEM-encoded.",
"response",
":=",
"api",
".",
"NewSuccessResponse",
"(",
"&",
"CertRequest",
"{",
"Key",
":",
"string",
"(",
"key",
")",
",",
"CSR",
":",
"string",
"(",
"csr",
")",
",",
"Sums",
":",
"map",
"[",
"string",
"]",
"Sum",
"{",
"\"",
"\"",
":",
"sum",
"}",
",",
"}",
")",
"\n",
"w",
".",
"Header",
"(",
")",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"enc",
":=",
"json",
".",
"NewEncoder",
"(",
"w",
")",
"\n",
"err",
"=",
"enc",
".",
"Encode",
"(",
"response",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // Handle responds to requests for the CA to generate a new private
// key and certificate request on behalf of the client. The format for
// these requests is documented in the API documentation. | [
"Handle",
"responds",
"to",
"requests",
"for",
"the",
"CA",
"to",
"generate",
"a",
"new",
"private",
"key",
"and",
"certificate",
"request",
"on",
"behalf",
"of",
"the",
"client",
".",
"The",
"format",
"for",
"these",
"requests",
"is",
"documented",
"in",
"the",
"API",
"documentation",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/generator/generator.go#L108-L152 | train |
cloudflare/cfssl | api/generator/generator.go | NewCertGeneratorHandler | func NewCertGeneratorHandler(validator Validator, caFile, caKeyFile string, policy *config.Signing) (http.Handler, error) {
var err error
log.Info("setting up new generator / signer")
cg := new(CertGeneratorHandler)
if policy == nil {
policy = &config.Signing{
Default: config.DefaultConfig(),
Profiles: nil,
}
}
root := universal.Root{
Config: map[string]string{
"ca-file": caFile,
"ca-key-file": caKeyFile,
},
}
if cg.signer, err = universal.NewSigner(root, policy); err != nil {
log.Errorf("setting up signer failed: %v", err)
return nil, err
}
cg.generator = &csr.Generator{Validator: validator}
return api.HTTPHandler{Handler: cg, Methods: []string{"POST"}}, nil
} | go | func NewCertGeneratorHandler(validator Validator, caFile, caKeyFile string, policy *config.Signing) (http.Handler, error) {
var err error
log.Info("setting up new generator / signer")
cg := new(CertGeneratorHandler)
if policy == nil {
policy = &config.Signing{
Default: config.DefaultConfig(),
Profiles: nil,
}
}
root := universal.Root{
Config: map[string]string{
"ca-file": caFile,
"ca-key-file": caKeyFile,
},
}
if cg.signer, err = universal.NewSigner(root, policy); err != nil {
log.Errorf("setting up signer failed: %v", err)
return nil, err
}
cg.generator = &csr.Generator{Validator: validator}
return api.HTTPHandler{Handler: cg, Methods: []string{"POST"}}, nil
} | [
"func",
"NewCertGeneratorHandler",
"(",
"validator",
"Validator",
",",
"caFile",
",",
"caKeyFile",
"string",
",",
"policy",
"*",
"config",
".",
"Signing",
")",
"(",
"http",
".",
"Handler",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"cg",
":=",
"new",
"(",
"CertGeneratorHandler",
")",
"\n\n",
"if",
"policy",
"==",
"nil",
"{",
"policy",
"=",
"&",
"config",
".",
"Signing",
"{",
"Default",
":",
"config",
".",
"DefaultConfig",
"(",
")",
",",
"Profiles",
":",
"nil",
",",
"}",
"\n",
"}",
"\n\n",
"root",
":=",
"universal",
".",
"Root",
"{",
"Config",
":",
"map",
"[",
"string",
"]",
"string",
"{",
"\"",
"\"",
":",
"caFile",
",",
"\"",
"\"",
":",
"caKeyFile",
",",
"}",
",",
"}",
"\n",
"if",
"cg",
".",
"signer",
",",
"err",
"=",
"universal",
".",
"NewSigner",
"(",
"root",
",",
"policy",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"cg",
".",
"generator",
"=",
"&",
"csr",
".",
"Generator",
"{",
"Validator",
":",
"validator",
"}",
"\n\n",
"return",
"api",
".",
"HTTPHandler",
"{",
"Handler",
":",
"cg",
",",
"Methods",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
"}",
",",
"nil",
"\n",
"}"
] | // NewCertGeneratorHandler builds a new handler for generating
// certificates directly from certificate requests; the validator covers
// the certificate request and the CA's key and certificate are used to
// sign the generated request. If remote is not an empty string, the
// handler will send signature requests to the CFSSL instance contained
// in remote. | [
"NewCertGeneratorHandler",
"builds",
"a",
"new",
"handler",
"for",
"generating",
"certificates",
"directly",
"from",
"certificate",
"requests",
";",
"the",
"validator",
"covers",
"the",
"certificate",
"request",
"and",
"the",
"CA",
"s",
"key",
"and",
"certificate",
"are",
"used",
"to",
"sign",
"the",
"generated",
"request",
".",
"If",
"remote",
"is",
"not",
"an",
"empty",
"string",
"the",
"handler",
"will",
"send",
"signature",
"requests",
"to",
"the",
"CFSSL",
"instance",
"contained",
"in",
"remote",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/generator/generator.go#L169-L195 | train |
cloudflare/cfssl | api/generator/generator.go | NewCertGeneratorHandlerFromSigner | func NewCertGeneratorHandlerFromSigner(validator Validator, signer signer.Signer) http.Handler {
return api.HTTPHandler{
Handler: &CertGeneratorHandler{
generator: &csr.Generator{Validator: validator},
signer: signer,
},
Methods: []string{"POST"},
}
} | go | func NewCertGeneratorHandlerFromSigner(validator Validator, signer signer.Signer) http.Handler {
return api.HTTPHandler{
Handler: &CertGeneratorHandler{
generator: &csr.Generator{Validator: validator},
signer: signer,
},
Methods: []string{"POST"},
}
} | [
"func",
"NewCertGeneratorHandlerFromSigner",
"(",
"validator",
"Validator",
",",
"signer",
"signer",
".",
"Signer",
")",
"http",
".",
"Handler",
"{",
"return",
"api",
".",
"HTTPHandler",
"{",
"Handler",
":",
"&",
"CertGeneratorHandler",
"{",
"generator",
":",
"&",
"csr",
".",
"Generator",
"{",
"Validator",
":",
"validator",
"}",
",",
"signer",
":",
"signer",
",",
"}",
",",
"Methods",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}"
] | // NewCertGeneratorHandlerFromSigner returns a handler directly from
// the signer and validation function. | [
"NewCertGeneratorHandlerFromSigner",
"returns",
"a",
"handler",
"directly",
"from",
"the",
"signer",
"and",
"validation",
"function",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/generator/generator.go#L199-L207 | train |
cloudflare/cfssl | api/generator/generator.go | SetBundler | func (cg *CertGeneratorHandler) SetBundler(caBundleFile, intBundleFile string) (err error) {
cg.bundler, err = bundler.NewBundler(caBundleFile, intBundleFile)
return err
} | go | func (cg *CertGeneratorHandler) SetBundler(caBundleFile, intBundleFile string) (err error) {
cg.bundler, err = bundler.NewBundler(caBundleFile, intBundleFile)
return err
} | [
"func",
"(",
"cg",
"*",
"CertGeneratorHandler",
")",
"SetBundler",
"(",
"caBundleFile",
",",
"intBundleFile",
"string",
")",
"(",
"err",
"error",
")",
"{",
"cg",
".",
"bundler",
",",
"err",
"=",
"bundler",
".",
"NewBundler",
"(",
"caBundleFile",
",",
"intBundleFile",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // SetBundler allows injecting an optional Bundler into the CertGeneratorHandler. | [
"SetBundler",
"allows",
"injecting",
"an",
"optional",
"Bundler",
"into",
"the",
"CertGeneratorHandler",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/generator/generator.go#L210-L213 | train |
cloudflare/cfssl | api/generator/generator.go | Handle | func (cg *CertGeneratorHandler) Handle(w http.ResponseWriter, r *http.Request) error {
log.Info("request for CSR")
req := new(genSignRequest)
req.Request = csr.New()
body, err := ioutil.ReadAll(r.Body)
if err != nil {
log.Warningf("failed to read request body: %v", err)
return errors.NewBadRequest(err)
}
r.Body.Close()
err = json.Unmarshal(body, req)
if err != nil {
log.Warningf("failed to unmarshal request: %v", err)
return errors.NewBadRequest(err)
}
if req.Request == nil {
log.Warning("empty request received")
return errors.NewBadRequestString("missing request section")
}
if req.Request.CA != nil {
log.Warningf("request received with CA section")
return errors.NewBadRequestString("ca section only permitted in initca")
}
csr, key, err := cg.generator.ProcessRequest(req.Request)
if err != nil {
log.Warningf("failed to process CSR: %v", err)
// The validator returns a *cfssl/errors.HttpError
return err
}
signReq := signer.SignRequest{
Request: string(csr),
Profile: req.Profile,
Label: req.Label,
}
certBytes, err := cg.signer.Sign(signReq)
if err != nil {
log.Warningf("failed to sign request: %v", err)
return err
}
reqSum, err := computeSum(csr)
if err != nil {
return errors.NewBadRequest(err)
}
certSum, err := computeSum(certBytes)
if err != nil {
return errors.NewBadRequest(err)
}
result := map[string]interface{}{
"private_key": string(key),
"certificate_request": string(csr),
"certificate": string(certBytes),
"sums": map[string]Sum{
"certificate_request": reqSum,
"certificate": certSum,
},
}
if req.Bundle {
if cg.bundler == nil {
return api.SendResponseWithMessage(w, result, NoBundlerMessage,
errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode)
}
bundle, err := cg.bundler.BundleFromPEMorDER(certBytes, nil, bundler.Optimal, "")
if err != nil {
return err
}
result["bundle"] = bundle
}
if len(req.Request.Hosts) == 0 {
return api.SendResponseWithMessage(w, result, CSRNoHostMessage,
errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode)
}
return api.SendResponse(w, result)
} | go | func (cg *CertGeneratorHandler) Handle(w http.ResponseWriter, r *http.Request) error {
log.Info("request for CSR")
req := new(genSignRequest)
req.Request = csr.New()
body, err := ioutil.ReadAll(r.Body)
if err != nil {
log.Warningf("failed to read request body: %v", err)
return errors.NewBadRequest(err)
}
r.Body.Close()
err = json.Unmarshal(body, req)
if err != nil {
log.Warningf("failed to unmarshal request: %v", err)
return errors.NewBadRequest(err)
}
if req.Request == nil {
log.Warning("empty request received")
return errors.NewBadRequestString("missing request section")
}
if req.Request.CA != nil {
log.Warningf("request received with CA section")
return errors.NewBadRequestString("ca section only permitted in initca")
}
csr, key, err := cg.generator.ProcessRequest(req.Request)
if err != nil {
log.Warningf("failed to process CSR: %v", err)
// The validator returns a *cfssl/errors.HttpError
return err
}
signReq := signer.SignRequest{
Request: string(csr),
Profile: req.Profile,
Label: req.Label,
}
certBytes, err := cg.signer.Sign(signReq)
if err != nil {
log.Warningf("failed to sign request: %v", err)
return err
}
reqSum, err := computeSum(csr)
if err != nil {
return errors.NewBadRequest(err)
}
certSum, err := computeSum(certBytes)
if err != nil {
return errors.NewBadRequest(err)
}
result := map[string]interface{}{
"private_key": string(key),
"certificate_request": string(csr),
"certificate": string(certBytes),
"sums": map[string]Sum{
"certificate_request": reqSum,
"certificate": certSum,
},
}
if req.Bundle {
if cg.bundler == nil {
return api.SendResponseWithMessage(w, result, NoBundlerMessage,
errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode)
}
bundle, err := cg.bundler.BundleFromPEMorDER(certBytes, nil, bundler.Optimal, "")
if err != nil {
return err
}
result["bundle"] = bundle
}
if len(req.Request.Hosts) == 0 {
return api.SendResponseWithMessage(w, result, CSRNoHostMessage,
errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode)
}
return api.SendResponse(w, result)
} | [
"func",
"(",
"cg",
"*",
"CertGeneratorHandler",
")",
"Handle",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"error",
"{",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n\n",
"req",
":=",
"new",
"(",
"genSignRequest",
")",
"\n",
"req",
".",
"Request",
"=",
"csr",
".",
"New",
"(",
")",
"\n\n",
"body",
",",
"err",
":=",
"ioutil",
".",
"ReadAll",
"(",
"r",
".",
"Body",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n",
"r",
".",
"Body",
".",
"Close",
"(",
")",
"\n\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"body",
",",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"req",
".",
"Request",
"==",
"nil",
"{",
"log",
".",
"Warning",
"(",
"\"",
"\"",
")",
"\n",
"return",
"errors",
".",
"NewBadRequestString",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"req",
".",
"Request",
".",
"CA",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"errors",
".",
"NewBadRequestString",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"csr",
",",
"key",
",",
"err",
":=",
"cg",
".",
"generator",
".",
"ProcessRequest",
"(",
"req",
".",
"Request",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"// The validator returns a *cfssl/errors.HttpError",
"return",
"err",
"\n",
"}",
"\n\n",
"signReq",
":=",
"signer",
".",
"SignRequest",
"{",
"Request",
":",
"string",
"(",
"csr",
")",
",",
"Profile",
":",
"req",
".",
"Profile",
",",
"Label",
":",
"req",
".",
"Label",
",",
"}",
"\n\n",
"certBytes",
",",
"err",
":=",
"cg",
".",
"signer",
".",
"Sign",
"(",
"signReq",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"reqSum",
",",
"err",
":=",
"computeSum",
"(",
"csr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"certSum",
",",
"err",
":=",
"computeSum",
"(",
"certBytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errors",
".",
"NewBadRequest",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"result",
":=",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"{",
"\"",
"\"",
":",
"string",
"(",
"key",
")",
",",
"\"",
"\"",
":",
"string",
"(",
"csr",
")",
",",
"\"",
"\"",
":",
"string",
"(",
"certBytes",
")",
",",
"\"",
"\"",
":",
"map",
"[",
"string",
"]",
"Sum",
"{",
"\"",
"\"",
":",
"reqSum",
",",
"\"",
"\"",
":",
"certSum",
",",
"}",
",",
"}",
"\n\n",
"if",
"req",
".",
"Bundle",
"{",
"if",
"cg",
".",
"bundler",
"==",
"nil",
"{",
"return",
"api",
".",
"SendResponseWithMessage",
"(",
"w",
",",
"result",
",",
"NoBundlerMessage",
",",
"errors",
".",
"New",
"(",
"errors",
".",
"PolicyError",
",",
"errors",
".",
"InvalidRequest",
")",
".",
"ErrorCode",
")",
"\n",
"}",
"\n\n",
"bundle",
",",
"err",
":=",
"cg",
".",
"bundler",
".",
"BundleFromPEMorDER",
"(",
"certBytes",
",",
"nil",
",",
"bundler",
".",
"Optimal",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"result",
"[",
"\"",
"\"",
"]",
"=",
"bundle",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"req",
".",
"Request",
".",
"Hosts",
")",
"==",
"0",
"{",
"return",
"api",
".",
"SendResponseWithMessage",
"(",
"w",
",",
"result",
",",
"CSRNoHostMessage",
",",
"errors",
".",
"New",
"(",
"errors",
".",
"PolicyError",
",",
"errors",
".",
"InvalidRequest",
")",
".",
"ErrorCode",
")",
"\n",
"}",
"\n\n",
"return",
"api",
".",
"SendResponse",
"(",
"w",
",",
"result",
")",
"\n",
"}"
] | // Handle responds to requests for the CA to generate a new private
// key and certificate on behalf of the client. The format for these
// requests is documented in the API documentation. | [
"Handle",
"responds",
"to",
"requests",
"for",
"the",
"CA",
"to",
"generate",
"a",
"new",
"private",
"key",
"and",
"certificate",
"on",
"behalf",
"of",
"the",
"client",
".",
"The",
"format",
"for",
"these",
"requests",
"is",
"documented",
"in",
"the",
"API",
"documentation",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/generator/generator.go#L225-L313 | train |
cloudflare/cfssl | transport/listener.go | Listen | func Listen(address string, tr *Transport) (*Listener, error) {
var err error
l := &Listener{Transport: tr}
config, err := tr.getConfig()
if err != nil {
return nil, err
}
l.Listener, err = tls.Listen("tcp", address, config)
return l, err
} | go | func Listen(address string, tr *Transport) (*Listener, error) {
var err error
l := &Listener{Transport: tr}
config, err := tr.getConfig()
if err != nil {
return nil, err
}
l.Listener, err = tls.Listen("tcp", address, config)
return l, err
} | [
"func",
"Listen",
"(",
"address",
"string",
",",
"tr",
"*",
"Transport",
")",
"(",
"*",
"Listener",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n",
"l",
":=",
"&",
"Listener",
"{",
"Transport",
":",
"tr",
"}",
"\n",
"config",
",",
"err",
":=",
"tr",
".",
"getConfig",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"l",
".",
"Listener",
",",
"err",
"=",
"tls",
".",
"Listen",
"(",
"\"",
"\"",
",",
"address",
",",
"config",
")",
"\n",
"return",
"l",
",",
"err",
"\n",
"}"
] | // Listen sets up a new server. If an error is returned, it means
// the server isn't ready to begin listening. | [
"Listen",
"sets",
"up",
"a",
"new",
"server",
".",
"If",
"an",
"error",
"is",
"returned",
"it",
"means",
"the",
"server",
"isn",
"t",
"ready",
"to",
"begin",
"listening",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/listener.go#L19-L29 | train |
cloudflare/cfssl | crl/crl.go | NewCRLFromFile | func NewCRLFromFile(serialList, issuerFile, keyFile []byte, expiryTime string) ([]byte, error) {
var revokedCerts []pkix.RevokedCertificate
var oneWeek = time.Duration(604800) * time.Second
expiryInt, err := strconv.ParseInt(expiryTime, 0, 32)
if err != nil {
return nil, err
}
newDurationFromInt := time.Duration(expiryInt) * time.Second
newExpiryTime := time.Now().Add(newDurationFromInt)
if expiryInt == 0 {
newExpiryTime = time.Now().Add(oneWeek)
}
// Parse the PEM encoded certificate
issuerCert, err := helpers.ParseCertificatePEM(issuerFile)
if err != nil {
return nil, err
}
// Split input file by new lines
individualCerts := strings.Split(string(serialList), "\n")
// For every new line, create a new revokedCertificate and add it to slice
for _, value := range individualCerts {
if len(strings.TrimSpace(value)) == 0 {
continue
}
tempBigInt := new(big.Int)
tempBigInt.SetString(value, 10)
tempCert := pkix.RevokedCertificate{
SerialNumber: tempBigInt,
RevocationTime: time.Now(),
}
revokedCerts = append(revokedCerts, tempCert)
}
strPassword := os.Getenv("CFSSL_CA_PK_PASSWORD")
password := []byte(strPassword)
if strPassword == "" {
password = nil
}
// Parse the key given
key, err := helpers.ParsePrivateKeyPEMWithPassword(keyFile, password)
if err != nil {
log.Debug("Malformed private key %v", err)
return nil, err
}
return CreateGenericCRL(revokedCerts, key, issuerCert, newExpiryTime)
} | go | func NewCRLFromFile(serialList, issuerFile, keyFile []byte, expiryTime string) ([]byte, error) {
var revokedCerts []pkix.RevokedCertificate
var oneWeek = time.Duration(604800) * time.Second
expiryInt, err := strconv.ParseInt(expiryTime, 0, 32)
if err != nil {
return nil, err
}
newDurationFromInt := time.Duration(expiryInt) * time.Second
newExpiryTime := time.Now().Add(newDurationFromInt)
if expiryInt == 0 {
newExpiryTime = time.Now().Add(oneWeek)
}
// Parse the PEM encoded certificate
issuerCert, err := helpers.ParseCertificatePEM(issuerFile)
if err != nil {
return nil, err
}
// Split input file by new lines
individualCerts := strings.Split(string(serialList), "\n")
// For every new line, create a new revokedCertificate and add it to slice
for _, value := range individualCerts {
if len(strings.TrimSpace(value)) == 0 {
continue
}
tempBigInt := new(big.Int)
tempBigInt.SetString(value, 10)
tempCert := pkix.RevokedCertificate{
SerialNumber: tempBigInt,
RevocationTime: time.Now(),
}
revokedCerts = append(revokedCerts, tempCert)
}
strPassword := os.Getenv("CFSSL_CA_PK_PASSWORD")
password := []byte(strPassword)
if strPassword == "" {
password = nil
}
// Parse the key given
key, err := helpers.ParsePrivateKeyPEMWithPassword(keyFile, password)
if err != nil {
log.Debug("Malformed private key %v", err)
return nil, err
}
return CreateGenericCRL(revokedCerts, key, issuerCert, newExpiryTime)
} | [
"func",
"NewCRLFromFile",
"(",
"serialList",
",",
"issuerFile",
",",
"keyFile",
"[",
"]",
"byte",
",",
"expiryTime",
"string",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"var",
"revokedCerts",
"[",
"]",
"pkix",
".",
"RevokedCertificate",
"\n",
"var",
"oneWeek",
"=",
"time",
".",
"Duration",
"(",
"604800",
")",
"*",
"time",
".",
"Second",
"\n\n",
"expiryInt",
",",
"err",
":=",
"strconv",
".",
"ParseInt",
"(",
"expiryTime",
",",
"0",
",",
"32",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"newDurationFromInt",
":=",
"time",
".",
"Duration",
"(",
"expiryInt",
")",
"*",
"time",
".",
"Second",
"\n",
"newExpiryTime",
":=",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"newDurationFromInt",
")",
"\n",
"if",
"expiryInt",
"==",
"0",
"{",
"newExpiryTime",
"=",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"oneWeek",
")",
"\n",
"}",
"\n\n",
"// Parse the PEM encoded certificate",
"issuerCert",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatePEM",
"(",
"issuerFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Split input file by new lines",
"individualCerts",
":=",
"strings",
".",
"Split",
"(",
"string",
"(",
"serialList",
")",
",",
"\"",
"\\n",
"\"",
")",
"\n\n",
"// For every new line, create a new revokedCertificate and add it to slice",
"for",
"_",
",",
"value",
":=",
"range",
"individualCerts",
"{",
"if",
"len",
"(",
"strings",
".",
"TrimSpace",
"(",
"value",
")",
")",
"==",
"0",
"{",
"continue",
"\n",
"}",
"\n\n",
"tempBigInt",
":=",
"new",
"(",
"big",
".",
"Int",
")",
"\n",
"tempBigInt",
".",
"SetString",
"(",
"value",
",",
"10",
")",
"\n",
"tempCert",
":=",
"pkix",
".",
"RevokedCertificate",
"{",
"SerialNumber",
":",
"tempBigInt",
",",
"RevocationTime",
":",
"time",
".",
"Now",
"(",
")",
",",
"}",
"\n",
"revokedCerts",
"=",
"append",
"(",
"revokedCerts",
",",
"tempCert",
")",
"\n",
"}",
"\n\n",
"strPassword",
":=",
"os",
".",
"Getenv",
"(",
"\"",
"\"",
")",
"\n",
"password",
":=",
"[",
"]",
"byte",
"(",
"strPassword",
")",
"\n",
"if",
"strPassword",
"==",
"\"",
"\"",
"{",
"password",
"=",
"nil",
"\n",
"}",
"\n\n",
"// Parse the key given",
"key",
",",
"err",
":=",
"helpers",
".",
"ParsePrivateKeyPEMWithPassword",
"(",
"keyFile",
",",
"password",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"CreateGenericCRL",
"(",
"revokedCerts",
",",
"key",
",",
"issuerCert",
",",
"newExpiryTime",
")",
"\n",
"}"
] | // NewCRLFromFile takes in a list of serial numbers, one per line, as well as the issuing certificate
// of the CRL, and the private key. This function is then used to parse the list and generate a CRL | [
"NewCRLFromFile",
"takes",
"in",
"a",
"list",
"of",
"serial",
"numbers",
"one",
"per",
"line",
"as",
"well",
"as",
"the",
"issuing",
"certificate",
"of",
"the",
"CRL",
"and",
"the",
"private",
"key",
".",
"This",
"function",
"is",
"then",
"used",
"to",
"parse",
"the",
"list",
"and",
"generate",
"a",
"CRL"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/crl/crl.go#L22-L75 | train |
cloudflare/cfssl | crl/crl.go | NewCRLFromDB | func NewCRLFromDB(certs []certdb.CertificateRecord, issuerCert *x509.Certificate, key crypto.Signer, expiryTime time.Duration) ([]byte, error) {
var revokedCerts []pkix.RevokedCertificate
newExpiryTime := time.Now().Add(expiryTime)
// For every record, create a new revokedCertificate and add it to slice
for _, certRecord := range certs {
serialInt := new(big.Int)
serialInt.SetString(certRecord.Serial, 10)
tempCert := pkix.RevokedCertificate{
SerialNumber: serialInt,
RevocationTime: certRecord.RevokedAt,
}
revokedCerts = append(revokedCerts, tempCert)
}
return CreateGenericCRL(revokedCerts, key, issuerCert, newExpiryTime)
} | go | func NewCRLFromDB(certs []certdb.CertificateRecord, issuerCert *x509.Certificate, key crypto.Signer, expiryTime time.Duration) ([]byte, error) {
var revokedCerts []pkix.RevokedCertificate
newExpiryTime := time.Now().Add(expiryTime)
// For every record, create a new revokedCertificate and add it to slice
for _, certRecord := range certs {
serialInt := new(big.Int)
serialInt.SetString(certRecord.Serial, 10)
tempCert := pkix.RevokedCertificate{
SerialNumber: serialInt,
RevocationTime: certRecord.RevokedAt,
}
revokedCerts = append(revokedCerts, tempCert)
}
return CreateGenericCRL(revokedCerts, key, issuerCert, newExpiryTime)
} | [
"func",
"NewCRLFromDB",
"(",
"certs",
"[",
"]",
"certdb",
".",
"CertificateRecord",
",",
"issuerCert",
"*",
"x509",
".",
"Certificate",
",",
"key",
"crypto",
".",
"Signer",
",",
"expiryTime",
"time",
".",
"Duration",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"var",
"revokedCerts",
"[",
"]",
"pkix",
".",
"RevokedCertificate",
"\n\n",
"newExpiryTime",
":=",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"expiryTime",
")",
"\n\n",
"// For every record, create a new revokedCertificate and add it to slice",
"for",
"_",
",",
"certRecord",
":=",
"range",
"certs",
"{",
"serialInt",
":=",
"new",
"(",
"big",
".",
"Int",
")",
"\n",
"serialInt",
".",
"SetString",
"(",
"certRecord",
".",
"Serial",
",",
"10",
")",
"\n",
"tempCert",
":=",
"pkix",
".",
"RevokedCertificate",
"{",
"SerialNumber",
":",
"serialInt",
",",
"RevocationTime",
":",
"certRecord",
".",
"RevokedAt",
",",
"}",
"\n",
"revokedCerts",
"=",
"append",
"(",
"revokedCerts",
",",
"tempCert",
")",
"\n",
"}",
"\n\n",
"return",
"CreateGenericCRL",
"(",
"revokedCerts",
",",
"key",
",",
"issuerCert",
",",
"newExpiryTime",
")",
"\n",
"}"
] | // NewCRLFromDB takes in a list of CertificateRecords, as well as the issuing certificate
// of the CRL, and the private key. This function is then used to parse the records and generate a CRL | [
"NewCRLFromDB",
"takes",
"in",
"a",
"list",
"of",
"CertificateRecords",
"as",
"well",
"as",
"the",
"issuing",
"certificate",
"of",
"the",
"CRL",
"and",
"the",
"private",
"key",
".",
"This",
"function",
"is",
"then",
"used",
"to",
"parse",
"the",
"records",
"and",
"generate",
"a",
"CRL"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/crl/crl.go#L79-L96 | train |
cloudflare/cfssl | crl/crl.go | CreateGenericCRL | func CreateGenericCRL(certList []pkix.RevokedCertificate, key crypto.Signer, issuingCert *x509.Certificate, expiryTime time.Time) ([]byte, error) {
crlBytes, err := issuingCert.CreateCRL(rand.Reader, key, certList, time.Now(), expiryTime)
if err != nil {
log.Debug("error creating CRL: %s", err)
}
return crlBytes, err
} | go | func CreateGenericCRL(certList []pkix.RevokedCertificate, key crypto.Signer, issuingCert *x509.Certificate, expiryTime time.Time) ([]byte, error) {
crlBytes, err := issuingCert.CreateCRL(rand.Reader, key, certList, time.Now(), expiryTime)
if err != nil {
log.Debug("error creating CRL: %s", err)
}
return crlBytes, err
} | [
"func",
"CreateGenericCRL",
"(",
"certList",
"[",
"]",
"pkix",
".",
"RevokedCertificate",
",",
"key",
"crypto",
".",
"Signer",
",",
"issuingCert",
"*",
"x509",
".",
"Certificate",
",",
"expiryTime",
"time",
".",
"Time",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"crlBytes",
",",
"err",
":=",
"issuingCert",
".",
"CreateCRL",
"(",
"rand",
".",
"Reader",
",",
"key",
",",
"certList",
",",
"time",
".",
"Now",
"(",
")",
",",
"expiryTime",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"crlBytes",
",",
"err",
"\n\n",
"}"
] | // CreateGenericCRL is a helper function that takes in all of the information above, and then calls the createCRL
// function. This outputs the bytes of the created CRL. | [
"CreateGenericCRL",
"is",
"a",
"helper",
"function",
"that",
"takes",
"in",
"all",
"of",
"the",
"information",
"above",
"and",
"then",
"calls",
"the",
"createCRL",
"function",
".",
"This",
"outputs",
"the",
"bytes",
"of",
"the",
"created",
"CRL",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/crl/crl.go#L100-L108 | train |
cloudflare/cfssl | transport/kp/key_provider.go | NewStandardProvider | func NewStandardProvider(id *core.Identity) (*StandardProvider, error) {
if id == nil {
return nil, errors.New("transport: the identity hasn't been initialised. Has it been loaded from disk?")
}
paths := id.Profiles["paths"]
if paths == nil {
return &StandardProvider{}, nil
}
sp := &StandardProvider{
Paths: StandardPaths{
KeyFile: paths["private_key"],
CertFile: paths["certificate"],
},
}
err := sp.Check()
if err != nil {
return nil, err
}
return sp, nil
} | go | func NewStandardProvider(id *core.Identity) (*StandardProvider, error) {
if id == nil {
return nil, errors.New("transport: the identity hasn't been initialised. Has it been loaded from disk?")
}
paths := id.Profiles["paths"]
if paths == nil {
return &StandardProvider{}, nil
}
sp := &StandardProvider{
Paths: StandardPaths{
KeyFile: paths["private_key"],
CertFile: paths["certificate"],
},
}
err := sp.Check()
if err != nil {
return nil, err
}
return sp, nil
} | [
"func",
"NewStandardProvider",
"(",
"id",
"*",
"core",
".",
"Identity",
")",
"(",
"*",
"StandardProvider",
",",
"error",
")",
"{",
"if",
"id",
"==",
"nil",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"paths",
":=",
"id",
".",
"Profiles",
"[",
"\"",
"\"",
"]",
"\n",
"if",
"paths",
"==",
"nil",
"{",
"return",
"&",
"StandardProvider",
"{",
"}",
",",
"nil",
"\n",
"}",
"\n\n",
"sp",
":=",
"&",
"StandardProvider",
"{",
"Paths",
":",
"StandardPaths",
"{",
"KeyFile",
":",
"paths",
"[",
"\"",
"\"",
"]",
",",
"CertFile",
":",
"paths",
"[",
"\"",
"\"",
"]",
",",
"}",
",",
"}",
"\n\n",
"err",
":=",
"sp",
".",
"Check",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"sp",
",",
"nil",
"\n",
"}"
] | // NewStandardProvider sets up new StandardProvider from the
// information contained in an Identity. | [
"NewStandardProvider",
"sets",
"up",
"new",
"StandardProvider",
"from",
"the",
"information",
"contained",
"in",
"an",
"Identity",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L120-L143 | train |
cloudflare/cfssl | transport/kp/key_provider.go | Check | func (sp *StandardProvider) Check() error {
if sp.Paths.KeyFile == "" && sp.Paths.CertFile == "" {
return nil
}
if sp.Paths.KeyFile == "" {
return ErrMissingKeyPath
}
if sp.Paths.CertFile == "" {
return ErrMissingCertPath
}
return nil
} | go | func (sp *StandardProvider) Check() error {
if sp.Paths.KeyFile == "" && sp.Paths.CertFile == "" {
return nil
}
if sp.Paths.KeyFile == "" {
return ErrMissingKeyPath
}
if sp.Paths.CertFile == "" {
return ErrMissingCertPath
}
return nil
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"Check",
"(",
")",
"error",
"{",
"if",
"sp",
".",
"Paths",
".",
"KeyFile",
"==",
"\"",
"\"",
"&&",
"sp",
".",
"Paths",
".",
"CertFile",
"==",
"\"",
"\"",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"sp",
".",
"Paths",
".",
"KeyFile",
"==",
"\"",
"\"",
"{",
"return",
"ErrMissingKeyPath",
"\n",
"}",
"\n\n",
"if",
"sp",
".",
"Paths",
".",
"CertFile",
"==",
"\"",
"\"",
"{",
"return",
"ErrMissingCertPath",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Check ensures that the paths are valid for the provider. | [
"Check",
"ensures",
"that",
"the",
"paths",
"are",
"valid",
"for",
"the",
"provider",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L166-L180 | train |
cloudflare/cfssl | transport/kp/key_provider.go | Persistent | func (sp *StandardProvider) Persistent() bool {
return sp.Paths.KeyFile != "" && sp.Paths.CertFile != ""
} | go | func (sp *StandardProvider) Persistent() bool {
return sp.Paths.KeyFile != "" && sp.Paths.CertFile != ""
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"Persistent",
"(",
")",
"bool",
"{",
"return",
"sp",
".",
"Paths",
".",
"KeyFile",
"!=",
"\"",
"\"",
"&&",
"sp",
".",
"Paths",
".",
"CertFile",
"!=",
"\"",
"\"",
"\n",
"}"
] | // Persistent returns true if the key and certificate will be stored
// on disk. | [
"Persistent",
"returns",
"true",
"if",
"the",
"key",
"and",
"certificate",
"will",
"be",
"stored",
"on",
"disk",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L184-L186 | train |
cloudflare/cfssl | transport/kp/key_provider.go | Generate | func (sp *StandardProvider) Generate(algo string, size int) (err error) {
sp.resetKey()
sp.resetCert()
algo = strings.ToLower(algo)
switch algo {
case "rsa":
var priv *rsa.PrivateKey
if size < 2048 {
return errors.New("transport: RSA keys must be at least 2048 bits")
}
priv, err = rsa.GenerateKey(rand.Reader, size)
if err != nil {
return err
}
keyPEM := x509.MarshalPKCS1PrivateKey(priv)
p := &pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: keyPEM,
}
sp.internal.keyPEM = pem.EncodeToMemory(p)
sp.internal.priv = priv
case "ecdsa":
var priv *ecdsa.PrivateKey
var curve elliptic.Curve
switch size {
case curveP256:
curve = elliptic.P256()
case curveP384:
curve = elliptic.P384()
case curveP521:
curve = elliptic.P521()
default:
return errors.New("transport: invalid elliptic curve key size; only 256-, 384-, and 521-bit keys are accepted")
}
priv, err = ecdsa.GenerateKey(curve, rand.Reader)
if err != nil {
return err
}
var keyPEM []byte
keyPEM, err = x509.MarshalECPrivateKey(priv)
if err != nil {
return err
}
p := &pem.Block{
Type: "EC PRIVATE KEY",
Bytes: keyPEM,
}
sp.internal.keyPEM = pem.EncodeToMemory(p)
sp.internal.priv = priv
default:
return errors.New("transport: invalid key algorithm; only RSA and ECDSA are supported")
}
return nil
} | go | func (sp *StandardProvider) Generate(algo string, size int) (err error) {
sp.resetKey()
sp.resetCert()
algo = strings.ToLower(algo)
switch algo {
case "rsa":
var priv *rsa.PrivateKey
if size < 2048 {
return errors.New("transport: RSA keys must be at least 2048 bits")
}
priv, err = rsa.GenerateKey(rand.Reader, size)
if err != nil {
return err
}
keyPEM := x509.MarshalPKCS1PrivateKey(priv)
p := &pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: keyPEM,
}
sp.internal.keyPEM = pem.EncodeToMemory(p)
sp.internal.priv = priv
case "ecdsa":
var priv *ecdsa.PrivateKey
var curve elliptic.Curve
switch size {
case curveP256:
curve = elliptic.P256()
case curveP384:
curve = elliptic.P384()
case curveP521:
curve = elliptic.P521()
default:
return errors.New("transport: invalid elliptic curve key size; only 256-, 384-, and 521-bit keys are accepted")
}
priv, err = ecdsa.GenerateKey(curve, rand.Reader)
if err != nil {
return err
}
var keyPEM []byte
keyPEM, err = x509.MarshalECPrivateKey(priv)
if err != nil {
return err
}
p := &pem.Block{
Type: "EC PRIVATE KEY",
Bytes: keyPEM,
}
sp.internal.keyPEM = pem.EncodeToMemory(p)
sp.internal.priv = priv
default:
return errors.New("transport: invalid key algorithm; only RSA and ECDSA are supported")
}
return nil
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"Generate",
"(",
"algo",
"string",
",",
"size",
"int",
")",
"(",
"err",
"error",
")",
"{",
"sp",
".",
"resetKey",
"(",
")",
"\n",
"sp",
".",
"resetCert",
"(",
")",
"\n\n",
"algo",
"=",
"strings",
".",
"ToLower",
"(",
"algo",
")",
"\n",
"switch",
"algo",
"{",
"case",
"\"",
"\"",
":",
"var",
"priv",
"*",
"rsa",
".",
"PrivateKey",
"\n",
"if",
"size",
"<",
"2048",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"priv",
",",
"err",
"=",
"rsa",
".",
"GenerateKey",
"(",
"rand",
".",
"Reader",
",",
"size",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"keyPEM",
":=",
"x509",
".",
"MarshalPKCS1PrivateKey",
"(",
"priv",
")",
"\n",
"p",
":=",
"&",
"pem",
".",
"Block",
"{",
"Type",
":",
"\"",
"\"",
",",
"Bytes",
":",
"keyPEM",
",",
"}",
"\n",
"sp",
".",
"internal",
".",
"keyPEM",
"=",
"pem",
".",
"EncodeToMemory",
"(",
"p",
")",
"\n",
"sp",
".",
"internal",
".",
"priv",
"=",
"priv",
"\n",
"case",
"\"",
"\"",
":",
"var",
"priv",
"*",
"ecdsa",
".",
"PrivateKey",
"\n",
"var",
"curve",
"elliptic",
".",
"Curve",
"\n",
"switch",
"size",
"{",
"case",
"curveP256",
":",
"curve",
"=",
"elliptic",
".",
"P256",
"(",
")",
"\n",
"case",
"curveP384",
":",
"curve",
"=",
"elliptic",
".",
"P384",
"(",
")",
"\n",
"case",
"curveP521",
":",
"curve",
"=",
"elliptic",
".",
"P521",
"(",
")",
"\n",
"default",
":",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"priv",
",",
"err",
"=",
"ecdsa",
".",
"GenerateKey",
"(",
"curve",
",",
"rand",
".",
"Reader",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"var",
"keyPEM",
"[",
"]",
"byte",
"\n",
"keyPEM",
",",
"err",
"=",
"x509",
".",
"MarshalECPrivateKey",
"(",
"priv",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"p",
":=",
"&",
"pem",
".",
"Block",
"{",
"Type",
":",
"\"",
"\"",
",",
"Bytes",
":",
"keyPEM",
",",
"}",
"\n",
"sp",
".",
"internal",
".",
"keyPEM",
"=",
"pem",
".",
"EncodeToMemory",
"(",
"p",
")",
"\n\n",
"sp",
".",
"internal",
".",
"priv",
"=",
"priv",
"\n",
"default",
":",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Generate generates a new private key. | [
"Generate",
"generates",
"a",
"new",
"private",
"key",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L189-L250 | train |
cloudflare/cfssl | transport/kp/key_provider.go | CertificateRequest | func (sp *StandardProvider) CertificateRequest(req *csr.CertificateRequest) ([]byte, error) {
if sp.internal.priv == nil {
if req.KeyRequest == nil {
return nil, errors.New("transport: invalid key request in csr.CertificateRequest")
}
sp.Generate(req.KeyRequest.Algo(), req.KeyRequest.Size())
}
return csr.Generate(sp.internal.priv, req)
} | go | func (sp *StandardProvider) CertificateRequest(req *csr.CertificateRequest) ([]byte, error) {
if sp.internal.priv == nil {
if req.KeyRequest == nil {
return nil, errors.New("transport: invalid key request in csr.CertificateRequest")
}
sp.Generate(req.KeyRequest.Algo(), req.KeyRequest.Size())
}
return csr.Generate(sp.internal.priv, req)
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"CertificateRequest",
"(",
"req",
"*",
"csr",
".",
"CertificateRequest",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"if",
"sp",
".",
"internal",
".",
"priv",
"==",
"nil",
"{",
"if",
"req",
".",
"KeyRequest",
"==",
"nil",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"sp",
".",
"Generate",
"(",
"req",
".",
"KeyRequest",
".",
"Algo",
"(",
")",
",",
"req",
".",
"KeyRequest",
".",
"Size",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"csr",
".",
"Generate",
"(",
"sp",
".",
"internal",
".",
"priv",
",",
"req",
")",
"\n",
"}"
] | // CertificateRequest takes some metadata about a certificate request,
// and attempts to produce a certificate signing request suitable for
// sending to a certificate authority. | [
"CertificateRequest",
"takes",
"some",
"metadata",
"about",
"a",
"certificate",
"request",
"and",
"attempts",
"to",
"produce",
"a",
"certificate",
"signing",
"request",
"suitable",
"for",
"sending",
"to",
"a",
"certificate",
"authority",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L261-L269 | train |
cloudflare/cfssl | transport/kp/key_provider.go | Load | func (sp *StandardProvider) Load() (err error) {
if !sp.Persistent() {
return
}
var clearKey = true
defer func() {
if err != nil {
if clearKey {
sp.resetKey()
}
sp.resetCert()
}
}()
sp.internal.keyPEM, err = ioutil.ReadFile(sp.Paths.KeyFile)
if err != nil {
return
}
sp.internal.priv, err = helpers.ParsePrivateKeyPEM(sp.internal.keyPEM)
if err != nil {
return
}
clearKey = false
sp.internal.certPEM, err = ioutil.ReadFile(sp.Paths.CertFile)
if err != nil {
return ErrCertificateUnavailable
}
sp.internal.cert, err = helpers.ParseCertificatePEM(sp.internal.certPEM)
if err != nil {
err = errors.New("transport: invalid certificate")
return
}
p, _ := pem.Decode(sp.internal.keyPEM)
switch sp.internal.cert.PublicKey.(type) {
case *rsa.PublicKey:
if p.Type != "RSA PRIVATE KEY" {
err = errors.New("transport: PEM type " + p.Type + " is invalid for an RSA key")
return
}
case *ecdsa.PublicKey:
if p.Type != "EC PRIVATE KEY" {
err = errors.New("transport: PEM type " + p.Type + " is invalid for an ECDSA key")
return
}
default:
err = errors.New("transport: invalid public key type")
}
if err != nil {
clearKey = true
return
}
return nil
} | go | func (sp *StandardProvider) Load() (err error) {
if !sp.Persistent() {
return
}
var clearKey = true
defer func() {
if err != nil {
if clearKey {
sp.resetKey()
}
sp.resetCert()
}
}()
sp.internal.keyPEM, err = ioutil.ReadFile(sp.Paths.KeyFile)
if err != nil {
return
}
sp.internal.priv, err = helpers.ParsePrivateKeyPEM(sp.internal.keyPEM)
if err != nil {
return
}
clearKey = false
sp.internal.certPEM, err = ioutil.ReadFile(sp.Paths.CertFile)
if err != nil {
return ErrCertificateUnavailable
}
sp.internal.cert, err = helpers.ParseCertificatePEM(sp.internal.certPEM)
if err != nil {
err = errors.New("transport: invalid certificate")
return
}
p, _ := pem.Decode(sp.internal.keyPEM)
switch sp.internal.cert.PublicKey.(type) {
case *rsa.PublicKey:
if p.Type != "RSA PRIVATE KEY" {
err = errors.New("transport: PEM type " + p.Type + " is invalid for an RSA key")
return
}
case *ecdsa.PublicKey:
if p.Type != "EC PRIVATE KEY" {
err = errors.New("transport: PEM type " + p.Type + " is invalid for an ECDSA key")
return
}
default:
err = errors.New("transport: invalid public key type")
}
if err != nil {
clearKey = true
return
}
return nil
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"Load",
"(",
")",
"(",
"err",
"error",
")",
"{",
"if",
"!",
"sp",
".",
"Persistent",
"(",
")",
"{",
"return",
"\n",
"}",
"\n\n",
"var",
"clearKey",
"=",
"true",
"\n",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"if",
"clearKey",
"{",
"sp",
".",
"resetKey",
"(",
")",
"\n",
"}",
"\n",
"sp",
".",
"resetCert",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"sp",
".",
"internal",
".",
"keyPEM",
",",
"err",
"=",
"ioutil",
".",
"ReadFile",
"(",
"sp",
".",
"Paths",
".",
"KeyFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"sp",
".",
"internal",
".",
"priv",
",",
"err",
"=",
"helpers",
".",
"ParsePrivateKeyPEM",
"(",
"sp",
".",
"internal",
".",
"keyPEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"clearKey",
"=",
"false",
"\n\n",
"sp",
".",
"internal",
".",
"certPEM",
",",
"err",
"=",
"ioutil",
".",
"ReadFile",
"(",
"sp",
".",
"Paths",
".",
"CertFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ErrCertificateUnavailable",
"\n",
"}",
"\n\n",
"sp",
".",
"internal",
".",
"cert",
",",
"err",
"=",
"helpers",
".",
"ParseCertificatePEM",
"(",
"sp",
".",
"internal",
".",
"certPEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"p",
",",
"_",
":=",
"pem",
".",
"Decode",
"(",
"sp",
".",
"internal",
".",
"keyPEM",
")",
"\n\n",
"switch",
"sp",
".",
"internal",
".",
"cert",
".",
"PublicKey",
".",
"(",
"type",
")",
"{",
"case",
"*",
"rsa",
".",
"PublicKey",
":",
"if",
"p",
".",
"Type",
"!=",
"\"",
"\"",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
"+",
"p",
".",
"Type",
"+",
"\"",
"\"",
")",
"\n",
"return",
"\n",
"}",
"\n",
"case",
"*",
"ecdsa",
".",
"PublicKey",
":",
"if",
"p",
".",
"Type",
"!=",
"\"",
"\"",
"{",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
"+",
"p",
".",
"Type",
"+",
"\"",
"\"",
")",
"\n",
"return",
"\n",
"}",
"\n",
"default",
":",
"err",
"=",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"clearKey",
"=",
"true",
"\n",
"return",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Load a private key and certificate from disk. | [
"Load",
"a",
"private",
"key",
"and",
"certificate",
"from",
"disk",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L276-L337 | train |
cloudflare/cfssl | transport/kp/key_provider.go | Ready | func (sp *StandardProvider) Ready() bool {
switch {
case sp.internal.priv == nil:
return false
case sp.internal.cert == nil:
return false
case sp.internal.keyPEM == nil:
return false
case sp.internal.certPEM == nil:
return false
default:
return true
}
} | go | func (sp *StandardProvider) Ready() bool {
switch {
case sp.internal.priv == nil:
return false
case sp.internal.cert == nil:
return false
case sp.internal.keyPEM == nil:
return false
case sp.internal.certPEM == nil:
return false
default:
return true
}
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"Ready",
"(",
")",
"bool",
"{",
"switch",
"{",
"case",
"sp",
".",
"internal",
".",
"priv",
"==",
"nil",
":",
"return",
"false",
"\n",
"case",
"sp",
".",
"internal",
".",
"cert",
"==",
"nil",
":",
"return",
"false",
"\n",
"case",
"sp",
".",
"internal",
".",
"keyPEM",
"==",
"nil",
":",
"return",
"false",
"\n",
"case",
"sp",
".",
"internal",
".",
"certPEM",
"==",
"nil",
":",
"return",
"false",
"\n",
"default",
":",
"return",
"true",
"\n",
"}",
"\n",
"}"
] | // Ready returns true if the provider has a key and certificate
// loaded. The certificate should be checked by the end user for
// validity. | [
"Ready",
"returns",
"true",
"if",
"the",
"provider",
"has",
"a",
"key",
"and",
"certificate",
"loaded",
".",
"The",
"certificate",
"should",
"be",
"checked",
"by",
"the",
"end",
"user",
"for",
"validity",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L342-L355 | train |
cloudflare/cfssl | transport/kp/key_provider.go | SetCertificatePEM | func (sp *StandardProvider) SetCertificatePEM(certPEM []byte) error {
cert, err := helpers.ParseCertificatePEM(certPEM)
if err != nil {
return errors.New("transport: invalid certificate")
}
sp.internal.certPEM = certPEM
sp.internal.cert = cert
return nil
} | go | func (sp *StandardProvider) SetCertificatePEM(certPEM []byte) error {
cert, err := helpers.ParseCertificatePEM(certPEM)
if err != nil {
return errors.New("transport: invalid certificate")
}
sp.internal.certPEM = certPEM
sp.internal.cert = cert
return nil
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"SetCertificatePEM",
"(",
"certPEM",
"[",
"]",
"byte",
")",
"error",
"{",
"cert",
",",
"err",
":=",
"helpers",
".",
"ParseCertificatePEM",
"(",
"certPEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"sp",
".",
"internal",
".",
"certPEM",
"=",
"certPEM",
"\n",
"sp",
".",
"internal",
".",
"cert",
"=",
"cert",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetCertificatePEM receives a PEM-encoded certificate and loads it
// into the provider. | [
"SetCertificatePEM",
"receives",
"a",
"PEM",
"-",
"encoded",
"certificate",
"and",
"loads",
"it",
"into",
"the",
"provider",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L359-L368 | train |
cloudflare/cfssl | transport/kp/key_provider.go | SignCSR | func (sp *StandardProvider) SignCSR(tpl *x509.CertificateRequest) ([]byte, error) {
return x509.CreateCertificateRequest(rand.Reader, tpl, sp.internal.priv)
} | go | func (sp *StandardProvider) SignCSR(tpl *x509.CertificateRequest) ([]byte, error) {
return x509.CreateCertificateRequest(rand.Reader, tpl, sp.internal.priv)
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"SignCSR",
"(",
"tpl",
"*",
"x509",
".",
"CertificateRequest",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"return",
"x509",
".",
"CreateCertificateRequest",
"(",
"rand",
".",
"Reader",
",",
"tpl",
",",
"sp",
".",
"internal",
".",
"priv",
")",
"\n",
"}"
] | // SignCSR takes a template certificate request and signs it. | [
"SignCSR",
"takes",
"a",
"template",
"certificate",
"request",
"and",
"signs",
"it",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L377-L379 | train |
cloudflare/cfssl | transport/kp/key_provider.go | Store | func (sp *StandardProvider) Store() error {
if !sp.Ready() {
return errors.New("transport: provider does not have a key and certificate")
}
err := ioutil.WriteFile(sp.Paths.CertFile, sp.internal.certPEM, 0644)
if err != nil {
return err
}
return ioutil.WriteFile(sp.Paths.KeyFile, sp.internal.keyPEM, 0600)
} | go | func (sp *StandardProvider) Store() error {
if !sp.Ready() {
return errors.New("transport: provider does not have a key and certificate")
}
err := ioutil.WriteFile(sp.Paths.CertFile, sp.internal.certPEM, 0644)
if err != nil {
return err
}
return ioutil.WriteFile(sp.Paths.KeyFile, sp.internal.keyPEM, 0600)
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"Store",
"(",
")",
"error",
"{",
"if",
"!",
"sp",
".",
"Ready",
"(",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"err",
":=",
"ioutil",
".",
"WriteFile",
"(",
"sp",
".",
"Paths",
".",
"CertFile",
",",
"sp",
".",
"internal",
".",
"certPEM",
",",
"0644",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"ioutil",
".",
"WriteFile",
"(",
"sp",
".",
"Paths",
".",
"KeyFile",
",",
"sp",
".",
"internal",
".",
"keyPEM",
",",
"0600",
")",
"\n",
"}"
] | // Store writes the key and certificate to disk, if necessary. | [
"Store",
"writes",
"the",
"key",
"and",
"certificate",
"to",
"disk",
"if",
"necessary",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L382-L393 | train |
cloudflare/cfssl | transport/kp/key_provider.go | X509KeyPair | func (sp *StandardProvider) X509KeyPair() (tls.Certificate, error) {
cert, err := tls.X509KeyPair(sp.internal.certPEM, sp.internal.keyPEM)
if err != nil {
return tls.Certificate{}, err
}
if cert.Leaf == nil {
cert.Leaf, err = x509.ParseCertificate(cert.Certificate[0])
if err != nil {
return tls.Certificate{}, err
}
}
return cert, nil
} | go | func (sp *StandardProvider) X509KeyPair() (tls.Certificate, error) {
cert, err := tls.X509KeyPair(sp.internal.certPEM, sp.internal.keyPEM)
if err != nil {
return tls.Certificate{}, err
}
if cert.Leaf == nil {
cert.Leaf, err = x509.ParseCertificate(cert.Certificate[0])
if err != nil {
return tls.Certificate{}, err
}
}
return cert, nil
} | [
"func",
"(",
"sp",
"*",
"StandardProvider",
")",
"X509KeyPair",
"(",
")",
"(",
"tls",
".",
"Certificate",
",",
"error",
")",
"{",
"cert",
",",
"err",
":=",
"tls",
".",
"X509KeyPair",
"(",
"sp",
".",
"internal",
".",
"certPEM",
",",
"sp",
".",
"internal",
".",
"keyPEM",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tls",
".",
"Certificate",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"cert",
".",
"Leaf",
"==",
"nil",
"{",
"cert",
".",
"Leaf",
",",
"err",
"=",
"x509",
".",
"ParseCertificate",
"(",
"cert",
".",
"Certificate",
"[",
"0",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tls",
".",
"Certificate",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"cert",
",",
"nil",
"\n",
"}"
] | // X509KeyPair returns a tls.Certificate for the provider. | [
"X509KeyPair",
"returns",
"a",
"tls",
".",
"Certificate",
"for",
"the",
"provider",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/kp/key_provider.go#L396-L409 | train |
cloudflare/cfssl | transport/roots/system/root_windows.go | extractSimpleChain | func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) {
if simpleChain == nil || count == 0 {
return nil, errors.New("x509: invalid simple chain")
}
simpleChains := (*[1 << 20]*syscall.CertSimpleChain)(unsafe.Pointer(simpleChain))[:]
lastChain := simpleChains[count-1]
elements := (*[1 << 20]*syscall.CertChainElement)(unsafe.Pointer(lastChain.Elements))[:]
for i := 0; i < int(lastChain.NumElements); i++ {
// Copy the buf, since ParseCertificate does not create its own copy.
cert := elements[i].CertContext
encodedCert := (*[1 << 20]byte)(unsafe.Pointer(cert.EncodedCert))[:]
buf := make([]byte, cert.Length)
copy(buf, encodedCert[:])
parsedCert, err := ParseCertificate(buf)
if err != nil {
return nil, err
}
chain = append(chain, parsedCert)
}
return chain, nil
} | go | func extractSimpleChain(simpleChain **syscall.CertSimpleChain, count int) (chain []*Certificate, err error) {
if simpleChain == nil || count == 0 {
return nil, errors.New("x509: invalid simple chain")
}
simpleChains := (*[1 << 20]*syscall.CertSimpleChain)(unsafe.Pointer(simpleChain))[:]
lastChain := simpleChains[count-1]
elements := (*[1 << 20]*syscall.CertChainElement)(unsafe.Pointer(lastChain.Elements))[:]
for i := 0; i < int(lastChain.NumElements); i++ {
// Copy the buf, since ParseCertificate does not create its own copy.
cert := elements[i].CertContext
encodedCert := (*[1 << 20]byte)(unsafe.Pointer(cert.EncodedCert))[:]
buf := make([]byte, cert.Length)
copy(buf, encodedCert[:])
parsedCert, err := ParseCertificate(buf)
if err != nil {
return nil, err
}
chain = append(chain, parsedCert)
}
return chain, nil
} | [
"func",
"extractSimpleChain",
"(",
"simpleChain",
"*",
"*",
"syscall",
".",
"CertSimpleChain",
",",
"count",
"int",
")",
"(",
"chain",
"[",
"]",
"*",
"Certificate",
",",
"err",
"error",
")",
"{",
"if",
"simpleChain",
"==",
"nil",
"||",
"count",
"==",
"0",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"simpleChains",
":=",
"(",
"*",
"[",
"1",
"<<",
"20",
"]",
"*",
"syscall",
".",
"CertSimpleChain",
")",
"(",
"unsafe",
".",
"Pointer",
"(",
"simpleChain",
")",
")",
"[",
":",
"]",
"\n",
"lastChain",
":=",
"simpleChains",
"[",
"count",
"-",
"1",
"]",
"\n",
"elements",
":=",
"(",
"*",
"[",
"1",
"<<",
"20",
"]",
"*",
"syscall",
".",
"CertChainElement",
")",
"(",
"unsafe",
".",
"Pointer",
"(",
"lastChain",
".",
"Elements",
")",
")",
"[",
":",
"]",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"int",
"(",
"lastChain",
".",
"NumElements",
")",
";",
"i",
"++",
"{",
"// Copy the buf, since ParseCertificate does not create its own copy.",
"cert",
":=",
"elements",
"[",
"i",
"]",
".",
"CertContext",
"\n",
"encodedCert",
":=",
"(",
"*",
"[",
"1",
"<<",
"20",
"]",
"byte",
")",
"(",
"unsafe",
".",
"Pointer",
"(",
"cert",
".",
"EncodedCert",
")",
")",
"[",
":",
"]",
"\n",
"buf",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"cert",
".",
"Length",
")",
"\n",
"copy",
"(",
"buf",
",",
"encodedCert",
"[",
":",
"]",
")",
"\n",
"parsedCert",
",",
"err",
":=",
"ParseCertificate",
"(",
"buf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"chain",
"=",
"append",
"(",
"chain",
",",
"parsedCert",
")",
"\n",
"}",
"\n\n",
"return",
"chain",
",",
"nil",
"\n",
"}"
] | // extractSimpleChain extracts the final certificate chain from a CertSimpleChain. | [
"extractSimpleChain",
"extracts",
"the",
"final",
"certificate",
"chain",
"from",
"a",
"CertSimpleChain",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/system/root_windows.go#L60-L82 | train |
cloudflare/cfssl | transport/roots/system/root_windows.go | checkChainTrustStatus | func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error {
if chainCtx.TrustStatus.ErrorStatus != syscall.CERT_TRUST_NO_ERROR {
status := chainCtx.TrustStatus.ErrorStatus
switch status {
case syscall.CERT_TRUST_IS_NOT_TIME_VALID:
return CertificateInvalidError{c, Expired}
default:
return UnknownAuthorityError{c, nil, nil}
}
}
return nil
} | go | func checkChainTrustStatus(c *Certificate, chainCtx *syscall.CertChainContext) error {
if chainCtx.TrustStatus.ErrorStatus != syscall.CERT_TRUST_NO_ERROR {
status := chainCtx.TrustStatus.ErrorStatus
switch status {
case syscall.CERT_TRUST_IS_NOT_TIME_VALID:
return CertificateInvalidError{c, Expired}
default:
return UnknownAuthorityError{c, nil, nil}
}
}
return nil
} | [
"func",
"checkChainTrustStatus",
"(",
"c",
"*",
"Certificate",
",",
"chainCtx",
"*",
"syscall",
".",
"CertChainContext",
")",
"error",
"{",
"if",
"chainCtx",
".",
"TrustStatus",
".",
"ErrorStatus",
"!=",
"syscall",
".",
"CERT_TRUST_NO_ERROR",
"{",
"status",
":=",
"chainCtx",
".",
"TrustStatus",
".",
"ErrorStatus",
"\n",
"switch",
"status",
"{",
"case",
"syscall",
".",
"CERT_TRUST_IS_NOT_TIME_VALID",
":",
"return",
"CertificateInvalidError",
"{",
"c",
",",
"Expired",
"}",
"\n",
"default",
":",
"return",
"UnknownAuthorityError",
"{",
"c",
",",
"nil",
",",
"nil",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // checkChainTrustStatus checks the trust status of the certificate chain, translating
// any errors it finds into Go errors in the process. | [
"checkChainTrustStatus",
"checks",
"the",
"trust",
"status",
"of",
"the",
"certificate",
"chain",
"translating",
"any",
"errors",
"it",
"finds",
"into",
"Go",
"errors",
"in",
"the",
"process",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/system/root_windows.go#L86-L97 | train |
cloudflare/cfssl | scan/crypto/tls/handshake_client.go | clientSessionCacheKey | func clientSessionCacheKey(serverAddr net.Addr, config *Config) string {
if len(config.ServerName) > 0 {
return config.ServerName
}
return serverAddr.String()
} | go | func clientSessionCacheKey(serverAddr net.Addr, config *Config) string {
if len(config.ServerName) > 0 {
return config.ServerName
}
return serverAddr.String()
} | [
"func",
"clientSessionCacheKey",
"(",
"serverAddr",
"net",
".",
"Addr",
",",
"config",
"*",
"Config",
")",
"string",
"{",
"if",
"len",
"(",
"config",
".",
"ServerName",
")",
">",
"0",
"{",
"return",
"config",
".",
"ServerName",
"\n",
"}",
"\n",
"return",
"serverAddr",
".",
"String",
"(",
")",
"\n",
"}"
] | // clientSessionCacheKey returns a key used to cache sessionTickets that could
// be used to resume previously negotiated TLS sessions with a server. | [
"clientSessionCacheKey",
"returns",
"a",
"key",
"used",
"to",
"cache",
"sessionTickets",
"that",
"could",
"be",
"used",
"to",
"resume",
"previously",
"negotiated",
"TLS",
"sessions",
"with",
"a",
"server",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/handshake_client.go#L646-L651 | train |
cloudflare/cfssl | scan/crypto/tls/handshake_client.go | mutualProtocol | func mutualProtocol(protos, preferenceProtos []string) (string, bool) {
for _, s := range preferenceProtos {
for _, c := range protos {
if s == c {
return s, false
}
}
}
return protos[0], true
} | go | func mutualProtocol(protos, preferenceProtos []string) (string, bool) {
for _, s := range preferenceProtos {
for _, c := range protos {
if s == c {
return s, false
}
}
}
return protos[0], true
} | [
"func",
"mutualProtocol",
"(",
"protos",
",",
"preferenceProtos",
"[",
"]",
"string",
")",
"(",
"string",
",",
"bool",
")",
"{",
"for",
"_",
",",
"s",
":=",
"range",
"preferenceProtos",
"{",
"for",
"_",
",",
"c",
":=",
"range",
"protos",
"{",
"if",
"s",
"==",
"c",
"{",
"return",
"s",
",",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"protos",
"[",
"0",
"]",
",",
"true",
"\n",
"}"
] | // mutualProtocol finds the mutual Next Protocol Negotiation or ALPN protocol
// given list of possible protocols and a list of the preference order. The
// first list must not be empty. It returns the resulting protocol and flag
// indicating if the fallback case was reached. | [
"mutualProtocol",
"finds",
"the",
"mutual",
"Next",
"Protocol",
"Negotiation",
"or",
"ALPN",
"protocol",
"given",
"list",
"of",
"possible",
"protocols",
"and",
"a",
"list",
"of",
"the",
"preference",
"order",
".",
"The",
"first",
"list",
"must",
"not",
"be",
"empty",
".",
"It",
"returns",
"the",
"resulting",
"protocol",
"and",
"flag",
"indicating",
"if",
"the",
"fallback",
"case",
"was",
"reached",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/handshake_client.go#L657-L667 | train |
cloudflare/cfssl | scan/crypto/tls/handshake_server.go | serverHandshake | func (c *Conn) serverHandshake() error {
config := c.config
// If this is the first server handshake, we generate a random key to
// encrypt the tickets with.
config.serverInitOnce.Do(config.serverInit)
hs := serverHandshakeState{
c: c,
}
isResume, err := hs.readClientHello()
if err != nil {
return err
}
// For an overview of TLS handshaking, see https://tools.ietf.org/html/rfc5246#section-7.3
if isResume {
// The client has included a session ticket and so we do an abbreviated handshake.
if err := hs.doResumeHandshake(); err != nil {
return err
}
if err := hs.establishKeys(); err != nil {
return err
}
// ticketSupported is set in a resumption handshake if the
// ticket from the client was encrypted with an old session
// ticket key and thus a refreshed ticket should be sent.
if hs.hello.ticketSupported {
if err := hs.sendSessionTicket(); err != nil {
return err
}
}
if err := hs.sendFinished(c.firstFinished[:]); err != nil {
return err
}
if err := hs.readFinished(nil); err != nil {
return err
}
c.didResume = true
} else {
// The client didn't include a session ticket, or it wasn't
// valid so we do a full handshake.
if err := hs.doFullHandshake(); err != nil {
return err
}
if err := hs.establishKeys(); err != nil {
return err
}
if err := hs.readFinished(c.firstFinished[:]); err != nil {
return err
}
if err := hs.sendSessionTicket(); err != nil {
return err
}
if err := hs.sendFinished(nil); err != nil {
return err
}
}
c.handshakeComplete = true
return nil
} | go | func (c *Conn) serverHandshake() error {
config := c.config
// If this is the first server handshake, we generate a random key to
// encrypt the tickets with.
config.serverInitOnce.Do(config.serverInit)
hs := serverHandshakeState{
c: c,
}
isResume, err := hs.readClientHello()
if err != nil {
return err
}
// For an overview of TLS handshaking, see https://tools.ietf.org/html/rfc5246#section-7.3
if isResume {
// The client has included a session ticket and so we do an abbreviated handshake.
if err := hs.doResumeHandshake(); err != nil {
return err
}
if err := hs.establishKeys(); err != nil {
return err
}
// ticketSupported is set in a resumption handshake if the
// ticket from the client was encrypted with an old session
// ticket key and thus a refreshed ticket should be sent.
if hs.hello.ticketSupported {
if err := hs.sendSessionTicket(); err != nil {
return err
}
}
if err := hs.sendFinished(c.firstFinished[:]); err != nil {
return err
}
if err := hs.readFinished(nil); err != nil {
return err
}
c.didResume = true
} else {
// The client didn't include a session ticket, or it wasn't
// valid so we do a full handshake.
if err := hs.doFullHandshake(); err != nil {
return err
}
if err := hs.establishKeys(); err != nil {
return err
}
if err := hs.readFinished(c.firstFinished[:]); err != nil {
return err
}
if err := hs.sendSessionTicket(); err != nil {
return err
}
if err := hs.sendFinished(nil); err != nil {
return err
}
}
c.handshakeComplete = true
return nil
} | [
"func",
"(",
"c",
"*",
"Conn",
")",
"serverHandshake",
"(",
")",
"error",
"{",
"config",
":=",
"c",
".",
"config",
"\n\n",
"// If this is the first server handshake, we generate a random key to",
"// encrypt the tickets with.",
"config",
".",
"serverInitOnce",
".",
"Do",
"(",
"config",
".",
"serverInit",
")",
"\n\n",
"hs",
":=",
"serverHandshakeState",
"{",
"c",
":",
"c",
",",
"}",
"\n",
"isResume",
",",
"err",
":=",
"hs",
".",
"readClientHello",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// For an overview of TLS handshaking, see https://tools.ietf.org/html/rfc5246#section-7.3",
"if",
"isResume",
"{",
"// The client has included a session ticket and so we do an abbreviated handshake.",
"if",
"err",
":=",
"hs",
".",
"doResumeHandshake",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"establishKeys",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"// ticketSupported is set in a resumption handshake if the",
"// ticket from the client was encrypted with an old session",
"// ticket key and thus a refreshed ticket should be sent.",
"if",
"hs",
".",
"hello",
".",
"ticketSupported",
"{",
"if",
"err",
":=",
"hs",
".",
"sendSessionTicket",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"sendFinished",
"(",
"c",
".",
"firstFinished",
"[",
":",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"readFinished",
"(",
"nil",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"c",
".",
"didResume",
"=",
"true",
"\n",
"}",
"else",
"{",
"// The client didn't include a session ticket, or it wasn't",
"// valid so we do a full handshake.",
"if",
"err",
":=",
"hs",
".",
"doFullHandshake",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"establishKeys",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"readFinished",
"(",
"c",
".",
"firstFinished",
"[",
":",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"sendSessionTicket",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"hs",
".",
"sendFinished",
"(",
"nil",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"c",
".",
"handshakeComplete",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // serverHandshake performs a TLS handshake as a server. | [
"serverHandshake",
"performs",
"a",
"TLS",
"handshake",
"as",
"a",
"server",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/handshake_server.go#L38-L99 | train |
cloudflare/cfssl | scan/crypto/tls/handshake_server.go | checkForResumption | func (hs *serverHandshakeState) checkForResumption() bool {
c := hs.c
if c.config.SessionTicketsDisabled {
return false
}
var ok bool
var sessionTicket = append([]uint8{}, hs.clientHello.sessionTicket...)
if hs.sessionState, ok = c.decryptTicket(sessionTicket); !ok {
return false
}
if hs.sessionState.vers > hs.clientHello.vers {
return false
}
if vers, ok := c.config.mutualVersion(hs.sessionState.vers); !ok || vers != hs.sessionState.vers {
return false
}
cipherSuiteOk := false
// Check that the client is still offering the ciphersuite in the session.
for _, id := range hs.clientHello.cipherSuites {
if id == hs.sessionState.cipherSuite {
cipherSuiteOk = true
break
}
}
if !cipherSuiteOk {
return false
}
// Check that we also support the ciphersuite from the session.
if !hs.setCipherSuite(hs.sessionState.cipherSuite, c.config.cipherSuites(), hs.sessionState.vers) {
return false
}
sessionHasClientCerts := len(hs.sessionState.certificates) != 0
needClientCerts := c.config.ClientAuth == RequireAnyClientCert || c.config.ClientAuth == RequireAndVerifyClientCert
if needClientCerts && !sessionHasClientCerts {
return false
}
if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
return false
}
return true
} | go | func (hs *serverHandshakeState) checkForResumption() bool {
c := hs.c
if c.config.SessionTicketsDisabled {
return false
}
var ok bool
var sessionTicket = append([]uint8{}, hs.clientHello.sessionTicket...)
if hs.sessionState, ok = c.decryptTicket(sessionTicket); !ok {
return false
}
if hs.sessionState.vers > hs.clientHello.vers {
return false
}
if vers, ok := c.config.mutualVersion(hs.sessionState.vers); !ok || vers != hs.sessionState.vers {
return false
}
cipherSuiteOk := false
// Check that the client is still offering the ciphersuite in the session.
for _, id := range hs.clientHello.cipherSuites {
if id == hs.sessionState.cipherSuite {
cipherSuiteOk = true
break
}
}
if !cipherSuiteOk {
return false
}
// Check that we also support the ciphersuite from the session.
if !hs.setCipherSuite(hs.sessionState.cipherSuite, c.config.cipherSuites(), hs.sessionState.vers) {
return false
}
sessionHasClientCerts := len(hs.sessionState.certificates) != 0
needClientCerts := c.config.ClientAuth == RequireAnyClientCert || c.config.ClientAuth == RequireAndVerifyClientCert
if needClientCerts && !sessionHasClientCerts {
return false
}
if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
return false
}
return true
} | [
"func",
"(",
"hs",
"*",
"serverHandshakeState",
")",
"checkForResumption",
"(",
")",
"bool",
"{",
"c",
":=",
"hs",
".",
"c",
"\n\n",
"if",
"c",
".",
"config",
".",
"SessionTicketsDisabled",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"var",
"ok",
"bool",
"\n",
"var",
"sessionTicket",
"=",
"append",
"(",
"[",
"]",
"uint8",
"{",
"}",
",",
"hs",
".",
"clientHello",
".",
"sessionTicket",
"...",
")",
"\n",
"if",
"hs",
".",
"sessionState",
",",
"ok",
"=",
"c",
".",
"decryptTicket",
"(",
"sessionTicket",
")",
";",
"!",
"ok",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"if",
"hs",
".",
"sessionState",
".",
"vers",
">",
"hs",
".",
"clientHello",
".",
"vers",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"vers",
",",
"ok",
":=",
"c",
".",
"config",
".",
"mutualVersion",
"(",
"hs",
".",
"sessionState",
".",
"vers",
")",
";",
"!",
"ok",
"||",
"vers",
"!=",
"hs",
".",
"sessionState",
".",
"vers",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"cipherSuiteOk",
":=",
"false",
"\n",
"// Check that the client is still offering the ciphersuite in the session.",
"for",
"_",
",",
"id",
":=",
"range",
"hs",
".",
"clientHello",
".",
"cipherSuites",
"{",
"if",
"id",
"==",
"hs",
".",
"sessionState",
".",
"cipherSuite",
"{",
"cipherSuiteOk",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"cipherSuiteOk",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"// Check that we also support the ciphersuite from the session.",
"if",
"!",
"hs",
".",
"setCipherSuite",
"(",
"hs",
".",
"sessionState",
".",
"cipherSuite",
",",
"c",
".",
"config",
".",
"cipherSuites",
"(",
")",
",",
"hs",
".",
"sessionState",
".",
"vers",
")",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"sessionHasClientCerts",
":=",
"len",
"(",
"hs",
".",
"sessionState",
".",
"certificates",
")",
"!=",
"0",
"\n",
"needClientCerts",
":=",
"c",
".",
"config",
".",
"ClientAuth",
"==",
"RequireAnyClientCert",
"||",
"c",
".",
"config",
".",
"ClientAuth",
"==",
"RequireAndVerifyClientCert",
"\n",
"if",
"needClientCerts",
"&&",
"!",
"sessionHasClientCerts",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"sessionHasClientCerts",
"&&",
"c",
".",
"config",
".",
"ClientAuth",
"==",
"NoClientCert",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"return",
"true",
"\n",
"}"
] | // checkForResumption reports whether we should perform resumption on this connection. | [
"checkForResumption",
"reports",
"whether",
"we",
"should",
"perform",
"resumption",
"on",
"this",
"connection",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/handshake_server.go#L264-L311 | train |
cloudflare/cfssl | scan/crypto/tls/handshake_server.go | processCertsFromClient | func (hs *serverHandshakeState) processCertsFromClient(certificates [][]byte) (crypto.PublicKey, error) {
c := hs.c
hs.certsFromClient = certificates
certs := make([]*x509.Certificate, len(certificates))
var err error
for i, asn1Data := range certificates {
if certs[i], err = x509.ParseCertificate(asn1Data); err != nil {
c.sendAlert(alertBadCertificate)
return nil, errors.New("tls: failed to parse client certificate: " + err.Error())
}
}
if c.config.ClientAuth >= VerifyClientCertIfGiven && len(certs) > 0 {
opts := x509.VerifyOptions{
Roots: c.config.ClientCAs,
CurrentTime: c.config.time(),
Intermediates: x509.NewCertPool(),
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
}
for _, cert := range certs[1:] {
opts.Intermediates.AddCert(cert)
}
chains, err := certs[0].Verify(opts)
if err != nil {
c.sendAlert(alertBadCertificate)
return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
}
c.verifiedChains = chains
}
if len(certs) > 0 {
var pub crypto.PublicKey
switch key := certs[0].PublicKey.(type) {
case *ecdsa.PublicKey, *rsa.PublicKey:
pub = key
default:
c.sendAlert(alertUnsupportedCertificate)
return nil, fmt.Errorf("tls: client's certificate contains an unsupported public key of type %T", certs[0].PublicKey)
}
c.peerCertificates = certs
return pub, nil
}
return nil, nil
} | go | func (hs *serverHandshakeState) processCertsFromClient(certificates [][]byte) (crypto.PublicKey, error) {
c := hs.c
hs.certsFromClient = certificates
certs := make([]*x509.Certificate, len(certificates))
var err error
for i, asn1Data := range certificates {
if certs[i], err = x509.ParseCertificate(asn1Data); err != nil {
c.sendAlert(alertBadCertificate)
return nil, errors.New("tls: failed to parse client certificate: " + err.Error())
}
}
if c.config.ClientAuth >= VerifyClientCertIfGiven && len(certs) > 0 {
opts := x509.VerifyOptions{
Roots: c.config.ClientCAs,
CurrentTime: c.config.time(),
Intermediates: x509.NewCertPool(),
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
}
for _, cert := range certs[1:] {
opts.Intermediates.AddCert(cert)
}
chains, err := certs[0].Verify(opts)
if err != nil {
c.sendAlert(alertBadCertificate)
return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
}
c.verifiedChains = chains
}
if len(certs) > 0 {
var pub crypto.PublicKey
switch key := certs[0].PublicKey.(type) {
case *ecdsa.PublicKey, *rsa.PublicKey:
pub = key
default:
c.sendAlert(alertUnsupportedCertificate)
return nil, fmt.Errorf("tls: client's certificate contains an unsupported public key of type %T", certs[0].PublicKey)
}
c.peerCertificates = certs
return pub, nil
}
return nil, nil
} | [
"func",
"(",
"hs",
"*",
"serverHandshakeState",
")",
"processCertsFromClient",
"(",
"certificates",
"[",
"]",
"[",
"]",
"byte",
")",
"(",
"crypto",
".",
"PublicKey",
",",
"error",
")",
"{",
"c",
":=",
"hs",
".",
"c",
"\n\n",
"hs",
".",
"certsFromClient",
"=",
"certificates",
"\n",
"certs",
":=",
"make",
"(",
"[",
"]",
"*",
"x509",
".",
"Certificate",
",",
"len",
"(",
"certificates",
")",
")",
"\n",
"var",
"err",
"error",
"\n",
"for",
"i",
",",
"asn1Data",
":=",
"range",
"certificates",
"{",
"if",
"certs",
"[",
"i",
"]",
",",
"err",
"=",
"x509",
".",
"ParseCertificate",
"(",
"asn1Data",
")",
";",
"err",
"!=",
"nil",
"{",
"c",
".",
"sendAlert",
"(",
"alertBadCertificate",
")",
"\n",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
"+",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"config",
".",
"ClientAuth",
">=",
"VerifyClientCertIfGiven",
"&&",
"len",
"(",
"certs",
")",
">",
"0",
"{",
"opts",
":=",
"x509",
".",
"VerifyOptions",
"{",
"Roots",
":",
"c",
".",
"config",
".",
"ClientCAs",
",",
"CurrentTime",
":",
"c",
".",
"config",
".",
"time",
"(",
")",
",",
"Intermediates",
":",
"x509",
".",
"NewCertPool",
"(",
")",
",",
"KeyUsages",
":",
"[",
"]",
"x509",
".",
"ExtKeyUsage",
"{",
"x509",
".",
"ExtKeyUsageClientAuth",
"}",
",",
"}",
"\n\n",
"for",
"_",
",",
"cert",
":=",
"range",
"certs",
"[",
"1",
":",
"]",
"{",
"opts",
".",
"Intermediates",
".",
"AddCert",
"(",
"cert",
")",
"\n",
"}",
"\n\n",
"chains",
",",
"err",
":=",
"certs",
"[",
"0",
"]",
".",
"Verify",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"c",
".",
"sendAlert",
"(",
"alertBadCertificate",
")",
"\n",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
"+",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n\n",
"c",
".",
"verifiedChains",
"=",
"chains",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"certs",
")",
">",
"0",
"{",
"var",
"pub",
"crypto",
".",
"PublicKey",
"\n",
"switch",
"key",
":=",
"certs",
"[",
"0",
"]",
".",
"PublicKey",
".",
"(",
"type",
")",
"{",
"case",
"*",
"ecdsa",
".",
"PublicKey",
",",
"*",
"rsa",
".",
"PublicKey",
":",
"pub",
"=",
"key",
"\n",
"default",
":",
"c",
".",
"sendAlert",
"(",
"alertUnsupportedCertificate",
")",
"\n",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"certs",
"[",
"0",
"]",
".",
"PublicKey",
")",
"\n",
"}",
"\n",
"c",
".",
"peerCertificates",
"=",
"certs",
"\n",
"return",
"pub",
",",
"nil",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"nil",
"\n",
"}"
] | // processCertsFromClient takes a chain of client certificates either from a
// Certificates message or from a sessionState and verifies them. It returns
// the public key of the leaf certificate. | [
"processCertsFromClient",
"takes",
"a",
"chain",
"of",
"client",
"certificates",
"either",
"from",
"a",
"Certificates",
"message",
"or",
"from",
"a",
"sessionState",
"and",
"verifies",
"them",
".",
"It",
"returns",
"the",
"public",
"key",
"of",
"the",
"leaf",
"certificate",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/handshake_server.go#L659-L707 | train |
cloudflare/cfssl | scan/crypto/tls/handshake_server.go | setCipherSuite | func (hs *serverHandshakeState) setCipherSuite(id uint16, supportedCipherSuites []uint16, version uint16) bool {
for _, supported := range supportedCipherSuites {
if id == supported {
var candidate *cipherSuite
for _, s := range cipherSuites {
if s.id == id {
candidate = s
break
}
}
if candidate == nil {
continue
}
// Don't select a ciphersuite which we can't
// support for this client.
if candidate.flags&suiteECDHE != 0 {
if !hs.ellipticOk {
continue
}
if candidate.flags&suiteECDSA != 0 {
if !hs.ecdsaOk {
continue
}
} else if !hs.rsaSignOk {
continue
}
} else if !hs.rsaDecryptOk {
continue
}
if version < VersionTLS12 && candidate.flags&suiteTLS12 != 0 {
continue
}
hs.suite = candidate
return true
}
}
return false
} | go | func (hs *serverHandshakeState) setCipherSuite(id uint16, supportedCipherSuites []uint16, version uint16) bool {
for _, supported := range supportedCipherSuites {
if id == supported {
var candidate *cipherSuite
for _, s := range cipherSuites {
if s.id == id {
candidate = s
break
}
}
if candidate == nil {
continue
}
// Don't select a ciphersuite which we can't
// support for this client.
if candidate.flags&suiteECDHE != 0 {
if !hs.ellipticOk {
continue
}
if candidate.flags&suiteECDSA != 0 {
if !hs.ecdsaOk {
continue
}
} else if !hs.rsaSignOk {
continue
}
} else if !hs.rsaDecryptOk {
continue
}
if version < VersionTLS12 && candidate.flags&suiteTLS12 != 0 {
continue
}
hs.suite = candidate
return true
}
}
return false
} | [
"func",
"(",
"hs",
"*",
"serverHandshakeState",
")",
"setCipherSuite",
"(",
"id",
"uint16",
",",
"supportedCipherSuites",
"[",
"]",
"uint16",
",",
"version",
"uint16",
")",
"bool",
"{",
"for",
"_",
",",
"supported",
":=",
"range",
"supportedCipherSuites",
"{",
"if",
"id",
"==",
"supported",
"{",
"var",
"candidate",
"*",
"cipherSuite",
"\n\n",
"for",
"_",
",",
"s",
":=",
"range",
"cipherSuites",
"{",
"if",
"s",
".",
"id",
"==",
"id",
"{",
"candidate",
"=",
"s",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"candidate",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"// Don't select a ciphersuite which we can't",
"// support for this client.",
"if",
"candidate",
".",
"flags",
"&",
"suiteECDHE",
"!=",
"0",
"{",
"if",
"!",
"hs",
".",
"ellipticOk",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"candidate",
".",
"flags",
"&",
"suiteECDSA",
"!=",
"0",
"{",
"if",
"!",
"hs",
".",
"ecdsaOk",
"{",
"continue",
"\n",
"}",
"\n",
"}",
"else",
"if",
"!",
"hs",
".",
"rsaSignOk",
"{",
"continue",
"\n",
"}",
"\n",
"}",
"else",
"if",
"!",
"hs",
".",
"rsaDecryptOk",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"version",
"<",
"VersionTLS12",
"&&",
"candidate",
".",
"flags",
"&",
"suiteTLS12",
"!=",
"0",
"{",
"continue",
"\n",
"}",
"\n",
"hs",
".",
"suite",
"=",
"candidate",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // setCipherSuite sets a cipherSuite with the given id as the serverHandshakeState
// suite if that cipher suite is acceptable to use.
// It returns a bool indicating if the suite was set. | [
"setCipherSuite",
"sets",
"a",
"cipherSuite",
"with",
"the",
"given",
"id",
"as",
"the",
"serverHandshakeState",
"suite",
"if",
"that",
"cipher",
"suite",
"is",
"acceptable",
"to",
"use",
".",
"It",
"returns",
"a",
"bool",
"indicating",
"if",
"the",
"suite",
"was",
"set",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/handshake_server.go#L712-L750 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | SHA1RawPublicKey | func SHA1RawPublicKey(cert *x509.Certificate) string {
return fmt.Sprintf("%x", sha1.Sum(cert.RawSubjectPublicKeyInfo))
} | go | func SHA1RawPublicKey(cert *x509.Certificate) string {
return fmt.Sprintf("%x", sha1.Sum(cert.RawSubjectPublicKeyInfo))
} | [
"func",
"SHA1RawPublicKey",
"(",
"cert",
"*",
"x509",
".",
"Certificate",
")",
"string",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"sha1",
".",
"Sum",
"(",
"cert",
".",
"RawSubjectPublicKeyInfo",
")",
")",
"\n",
"}"
] | // SHA1RawPublicKey returns a SHA1 hash of the raw certificate public key | [
"SHA1RawPublicKey",
"returns",
"a",
"SHA1",
"hash",
"of",
"the",
"raw",
"certificate",
"public",
"key"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L21-L23 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | Lookup | func (s CertSet) Lookup(cert *x509.Certificate) bool {
return s[SHA1RawPublicKey(cert)]
} | go | func (s CertSet) Lookup(cert *x509.Certificate) bool {
return s[SHA1RawPublicKey(cert)]
} | [
"func",
"(",
"s",
"CertSet",
")",
"Lookup",
"(",
"cert",
"*",
"x509",
".",
"Certificate",
")",
"bool",
"{",
"return",
"s",
"[",
"SHA1RawPublicKey",
"(",
"cert",
")",
"]",
"\n",
"}"
] | // Lookup returns whether a certificate is stored in the set. | [
"Lookup",
"returns",
"whether",
"a",
"certificate",
"is",
"stored",
"in",
"the",
"set",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L29-L31 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | Add | func (s CertSet) Add(cert *x509.Certificate) {
s[SHA1RawPublicKey(cert)] = true
} | go | func (s CertSet) Add(cert *x509.Certificate) {
s[SHA1RawPublicKey(cert)] = true
} | [
"func",
"(",
"s",
"CertSet",
")",
"Add",
"(",
"cert",
"*",
"x509",
".",
"Certificate",
")",
"{",
"s",
"[",
"SHA1RawPublicKey",
"(",
"cert",
")",
"]",
"=",
"true",
"\n",
"}"
] | // Add adds a certificate to the set. | [
"Add",
"adds",
"a",
"certificate",
"to",
"the",
"set",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L34-L36 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | Trust | func (p Platform) Trust(root *x509.Certificate) bool {
// the key store is empty iff the platform doesn't carry a root store and trust whatever root store
// is supplied. An example is Chrome. Such platforms should not show up in the untrusted platform
// list. So always return true here. Also this won't hurt ubiquity scoring because such platforms give
// no differentiation on root cert selection.
if len(p.KeyStore) == 0 {
return true
}
return p.KeyStore.Lookup(root)
} | go | func (p Platform) Trust(root *x509.Certificate) bool {
// the key store is empty iff the platform doesn't carry a root store and trust whatever root store
// is supplied. An example is Chrome. Such platforms should not show up in the untrusted platform
// list. So always return true here. Also this won't hurt ubiquity scoring because such platforms give
// no differentiation on root cert selection.
if len(p.KeyStore) == 0 {
return true
}
return p.KeyStore.Lookup(root)
} | [
"func",
"(",
"p",
"Platform",
")",
"Trust",
"(",
"root",
"*",
"x509",
".",
"Certificate",
")",
"bool",
"{",
"// the key store is empty iff the platform doesn't carry a root store and trust whatever root store",
"// is supplied. An example is Chrome. Such platforms should not show up in the untrusted platform",
"// list. So always return true here. Also this won't hurt ubiquity scoring because such platforms give",
"// no differentiation on root cert selection.",
"if",
"len",
"(",
"p",
".",
"KeyStore",
")",
"==",
"0",
"{",
"return",
"true",
"\n",
"}",
"\n\n",
"return",
"p",
".",
"KeyStore",
".",
"Lookup",
"(",
"root",
")",
"\n",
"}"
] | // Trust returns whether the platform has the root cert in the trusted store. | [
"Trust",
"returns",
"whether",
"the",
"platform",
"has",
"the",
"root",
"cert",
"in",
"the",
"trusted",
"store",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L51-L61 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | ParseAndLoad | func (p *Platform) ParseAndLoad() (ok bool) {
p.HashUbiquity = p.hashUbiquity()
p.KeyAlgoUbiquity = p.keyAlgoUbiquity()
p.KeyStore = map[string]bool{}
if p.KeyStoreFile != "" {
pemBytes, err := ioutil.ReadFile(p.KeyStoreFile)
if err != nil {
log.Error(err)
return false
}
// Best effort parsing the PEMs such that ignore all borken pem,
// since some of CA certs have negative serial number which trigger errors.
for len(pemBytes) > 0 {
var certs []*x509.Certificate
certs, rest, err := helpers.ParseOneCertificateFromPEM(pemBytes)
// If one certificate object is parsed, possibly a PKCS#7
// structure containing multiple certs, record the raw SHA1 hash(es).
if err == nil && certs != nil {
for _, cert := range certs {
p.KeyStore.Add(cert)
}
}
if len(rest) < len(pemBytes) {
pemBytes = rest
} else {
// No progress in bytes parsing, bail out.
break
}
}
}
if p.HashUbiquity <= UnknownHashUbiquity ||
p.KeyAlgoUbiquity <= UnknownAlgoUbiquity {
return false
}
return true
} | go | func (p *Platform) ParseAndLoad() (ok bool) {
p.HashUbiquity = p.hashUbiquity()
p.KeyAlgoUbiquity = p.keyAlgoUbiquity()
p.KeyStore = map[string]bool{}
if p.KeyStoreFile != "" {
pemBytes, err := ioutil.ReadFile(p.KeyStoreFile)
if err != nil {
log.Error(err)
return false
}
// Best effort parsing the PEMs such that ignore all borken pem,
// since some of CA certs have negative serial number which trigger errors.
for len(pemBytes) > 0 {
var certs []*x509.Certificate
certs, rest, err := helpers.ParseOneCertificateFromPEM(pemBytes)
// If one certificate object is parsed, possibly a PKCS#7
// structure containing multiple certs, record the raw SHA1 hash(es).
if err == nil && certs != nil {
for _, cert := range certs {
p.KeyStore.Add(cert)
}
}
if len(rest) < len(pemBytes) {
pemBytes = rest
} else {
// No progress in bytes parsing, bail out.
break
}
}
}
if p.HashUbiquity <= UnknownHashUbiquity ||
p.KeyAlgoUbiquity <= UnknownAlgoUbiquity {
return false
}
return true
} | [
"func",
"(",
"p",
"*",
"Platform",
")",
"ParseAndLoad",
"(",
")",
"(",
"ok",
"bool",
")",
"{",
"p",
".",
"HashUbiquity",
"=",
"p",
".",
"hashUbiquity",
"(",
")",
"\n",
"p",
".",
"KeyAlgoUbiquity",
"=",
"p",
".",
"keyAlgoUbiquity",
"(",
")",
"\n",
"p",
".",
"KeyStore",
"=",
"map",
"[",
"string",
"]",
"bool",
"{",
"}",
"\n",
"if",
"p",
".",
"KeyStoreFile",
"!=",
"\"",
"\"",
"{",
"pemBytes",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"p",
".",
"KeyStoreFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"false",
"\n",
"}",
"\n",
"// Best effort parsing the PEMs such that ignore all borken pem,",
"// since some of CA certs have negative serial number which trigger errors.",
"for",
"len",
"(",
"pemBytes",
")",
">",
"0",
"{",
"var",
"certs",
"[",
"]",
"*",
"x509",
".",
"Certificate",
"\n",
"certs",
",",
"rest",
",",
"err",
":=",
"helpers",
".",
"ParseOneCertificateFromPEM",
"(",
"pemBytes",
")",
"\n",
"// If one certificate object is parsed, possibly a PKCS#7",
"// structure containing multiple certs, record the raw SHA1 hash(es).",
"if",
"err",
"==",
"nil",
"&&",
"certs",
"!=",
"nil",
"{",
"for",
"_",
",",
"cert",
":=",
"range",
"certs",
"{",
"p",
".",
"KeyStore",
".",
"Add",
"(",
"cert",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"rest",
")",
"<",
"len",
"(",
"pemBytes",
")",
"{",
"pemBytes",
"=",
"rest",
"\n",
"}",
"else",
"{",
"// No progress in bytes parsing, bail out.",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"p",
".",
"HashUbiquity",
"<=",
"UnknownHashUbiquity",
"||",
"p",
".",
"KeyAlgoUbiquity",
"<=",
"UnknownAlgoUbiquity",
"{",
"return",
"false",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}"
] | // ParseAndLoad converts HashAlgo and KeyAlgo to corresponding ubiquity value and load
// certificates into internal KeyStore from KeyStoreFiles | [
"ParseAndLoad",
"converts",
"HashAlgo",
"and",
"KeyAlgo",
"to",
"corresponding",
"ubiquity",
"value",
"and",
"load",
"certificates",
"into",
"internal",
"KeyStore",
"from",
"KeyStoreFiles"
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L91-L127 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | LoadPlatforms | func LoadPlatforms(filename string) error {
// if filename is empty, skip the metadata loading
if filename == "" {
return nil
}
relativePath := filepath.Dir(filename)
// Attempt to load root certificate metadata
log.Debug("Loading platform metadata: ", filename)
bytes, err := ioutil.ReadFile(filename)
if err != nil {
return fmt.Errorf("platform metadata failed to load: %v", err)
}
var rawPlatforms []Platform
if bytes != nil {
err = json.Unmarshal(bytes, &rawPlatforms)
if err != nil {
return fmt.Errorf("platform metadata failed to parse: %v", err)
}
}
for _, platform := range rawPlatforms {
if platform.KeyStoreFile != "" {
platform.KeyStoreFile = path.Join(relativePath, platform.KeyStoreFile)
}
ok := platform.ParseAndLoad()
if !ok {
// erase all loaded platforms
Platforms = nil
return fmt.Errorf("fail to finalize the parsing of platform metadata: %v", platform)
}
log.Infof("Platform metadata is loaded: %v %v", platform.Name, len(platform.KeyStore))
Platforms = append(Platforms, platform)
}
return nil
} | go | func LoadPlatforms(filename string) error {
// if filename is empty, skip the metadata loading
if filename == "" {
return nil
}
relativePath := filepath.Dir(filename)
// Attempt to load root certificate metadata
log.Debug("Loading platform metadata: ", filename)
bytes, err := ioutil.ReadFile(filename)
if err != nil {
return fmt.Errorf("platform metadata failed to load: %v", err)
}
var rawPlatforms []Platform
if bytes != nil {
err = json.Unmarshal(bytes, &rawPlatforms)
if err != nil {
return fmt.Errorf("platform metadata failed to parse: %v", err)
}
}
for _, platform := range rawPlatforms {
if platform.KeyStoreFile != "" {
platform.KeyStoreFile = path.Join(relativePath, platform.KeyStoreFile)
}
ok := platform.ParseAndLoad()
if !ok {
// erase all loaded platforms
Platforms = nil
return fmt.Errorf("fail to finalize the parsing of platform metadata: %v", platform)
}
log.Infof("Platform metadata is loaded: %v %v", platform.Name, len(platform.KeyStore))
Platforms = append(Platforms, platform)
}
return nil
} | [
"func",
"LoadPlatforms",
"(",
"filename",
"string",
")",
"error",
"{",
"// if filename is empty, skip the metadata loading",
"if",
"filename",
"==",
"\"",
"\"",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"relativePath",
":=",
"filepath",
".",
"Dir",
"(",
"filename",
")",
"\n",
"// Attempt to load root certificate metadata",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"filename",
")",
"\n",
"bytes",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filename",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"var",
"rawPlatforms",
"[",
"]",
"Platform",
"\n",
"if",
"bytes",
"!=",
"nil",
"{",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"bytes",
",",
"&",
"rawPlatforms",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"platform",
":=",
"range",
"rawPlatforms",
"{",
"if",
"platform",
".",
"KeyStoreFile",
"!=",
"\"",
"\"",
"{",
"platform",
".",
"KeyStoreFile",
"=",
"path",
".",
"Join",
"(",
"relativePath",
",",
"platform",
".",
"KeyStoreFile",
")",
"\n",
"}",
"\n",
"ok",
":=",
"platform",
".",
"ParseAndLoad",
"(",
")",
"\n",
"if",
"!",
"ok",
"{",
"// erase all loaded platforms",
"Platforms",
"=",
"nil",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"platform",
")",
"\n",
"}",
"\n\n",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"platform",
".",
"Name",
",",
"len",
"(",
"platform",
".",
"KeyStore",
")",
")",
"\n",
"Platforms",
"=",
"append",
"(",
"Platforms",
",",
"platform",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // LoadPlatforms reads the file content as a json object array and convert it
// to Platforms. | [
"LoadPlatforms",
"reads",
"the",
"file",
"content",
"as",
"a",
"json",
"object",
"array",
"and",
"convert",
"it",
"to",
"Platforms",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L134-L171 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | UntrustedPlatforms | func UntrustedPlatforms(root *x509.Certificate) []string {
ret := []string{}
for _, platform := range Platforms {
if !platform.Trust(root) {
ret = append(ret, platform.Name)
}
}
return ret
} | go | func UntrustedPlatforms(root *x509.Certificate) []string {
ret := []string{}
for _, platform := range Platforms {
if !platform.Trust(root) {
ret = append(ret, platform.Name)
}
}
return ret
} | [
"func",
"UntrustedPlatforms",
"(",
"root",
"*",
"x509",
".",
"Certificate",
")",
"[",
"]",
"string",
"{",
"ret",
":=",
"[",
"]",
"string",
"{",
"}",
"\n",
"for",
"_",
",",
"platform",
":=",
"range",
"Platforms",
"{",
"if",
"!",
"platform",
".",
"Trust",
"(",
"root",
")",
"{",
"ret",
"=",
"append",
"(",
"ret",
",",
"platform",
".",
"Name",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ret",
"\n",
"}"
] | // UntrustedPlatforms returns a list of platforms which don't trust the root certificate. | [
"UntrustedPlatforms",
"returns",
"a",
"list",
"of",
"platforms",
"which",
"don",
"t",
"trust",
"the",
"root",
"certificate",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L174-L182 | train |
cloudflare/cfssl | ubiquity/ubiquity_platform.go | ComparePlatformUbiquity | func ComparePlatformUbiquity(chain1, chain2 []*x509.Certificate) int {
w1 := CrossPlatformUbiquity(chain1)
w2 := CrossPlatformUbiquity(chain2)
return w1 - w2
} | go | func ComparePlatformUbiquity(chain1, chain2 []*x509.Certificate) int {
w1 := CrossPlatformUbiquity(chain1)
w2 := CrossPlatformUbiquity(chain2)
return w1 - w2
} | [
"func",
"ComparePlatformUbiquity",
"(",
"chain1",
",",
"chain2",
"[",
"]",
"*",
"x509",
".",
"Certificate",
")",
"int",
"{",
"w1",
":=",
"CrossPlatformUbiquity",
"(",
"chain1",
")",
"\n",
"w2",
":=",
"CrossPlatformUbiquity",
"(",
"chain2",
")",
"\n",
"return",
"w1",
"-",
"w2",
"\n",
"}"
] | // ComparePlatformUbiquity compares the cross-platform ubiquity between chain1 and chain2. | [
"ComparePlatformUbiquity",
"compares",
"the",
"cross",
"-",
"platform",
"ubiquity",
"between",
"chain1",
"and",
"chain2",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_platform.go#L209-L213 | train |
cloudflare/cfssl | whitelist/whitelist.go | Add | func (wl *Basic) Add(ip net.IP) {
if !validIP(ip) {
return
}
wl.lock.Lock()
defer wl.lock.Unlock()
wl.whitelist[ip.String()] = true
} | go | func (wl *Basic) Add(ip net.IP) {
if !validIP(ip) {
return
}
wl.lock.Lock()
defer wl.lock.Unlock()
wl.whitelist[ip.String()] = true
} | [
"func",
"(",
"wl",
"*",
"Basic",
")",
"Add",
"(",
"ip",
"net",
".",
"IP",
")",
"{",
"if",
"!",
"validIP",
"(",
"ip",
")",
"{",
"return",
"\n",
"}",
"\n\n",
"wl",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"wl",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"wl",
".",
"whitelist",
"[",
"ip",
".",
"String",
"(",
")",
"]",
"=",
"true",
"\n",
"}"
] | // Add whitelists an IP. | [
"Add",
"whitelists",
"an",
"IP",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L73-L81 | train |
cloudflare/cfssl | whitelist/whitelist.go | Remove | func (wl *Basic) Remove(ip net.IP) {
if !validIP(ip) {
return
}
wl.lock.Lock()
defer wl.lock.Unlock()
delete(wl.whitelist, ip.String())
} | go | func (wl *Basic) Remove(ip net.IP) {
if !validIP(ip) {
return
}
wl.lock.Lock()
defer wl.lock.Unlock()
delete(wl.whitelist, ip.String())
} | [
"func",
"(",
"wl",
"*",
"Basic",
")",
"Remove",
"(",
"ip",
"net",
".",
"IP",
")",
"{",
"if",
"!",
"validIP",
"(",
"ip",
")",
"{",
"return",
"\n",
"}",
"\n\n",
"wl",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"wl",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"delete",
"(",
"wl",
".",
"whitelist",
",",
"ip",
".",
"String",
"(",
")",
")",
"\n",
"}"
] | // Remove clears the IP from the whitelist. | [
"Remove",
"clears",
"the",
"IP",
"from",
"the",
"whitelist",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L84-L92 | train |
cloudflare/cfssl | whitelist/whitelist.go | NewBasic | func NewBasic() *Basic {
return &Basic{
lock: new(sync.Mutex),
whitelist: map[string]bool{},
}
} | go | func NewBasic() *Basic {
return &Basic{
lock: new(sync.Mutex),
whitelist: map[string]bool{},
}
} | [
"func",
"NewBasic",
"(",
")",
"*",
"Basic",
"{",
"return",
"&",
"Basic",
"{",
"lock",
":",
"new",
"(",
"sync",
".",
"Mutex",
")",
",",
"whitelist",
":",
"map",
"[",
"string",
"]",
"bool",
"{",
"}",
",",
"}",
"\n",
"}"
] | // NewBasic returns a new initialised basic whitelist. | [
"NewBasic",
"returns",
"a",
"new",
"initialised",
"basic",
"whitelist",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L95-L100 | train |
cloudflare/cfssl | whitelist/whitelist.go | MarshalJSON | func (wl *Basic) MarshalJSON() ([]byte, error) {
wl.lock.Lock()
defer wl.lock.Unlock()
var ss = make([]string, 0, len(wl.whitelist))
for ip := range wl.whitelist {
ss = append(ss, ip)
}
out := []byte(`"` + strings.Join(ss, ",") + `"`)
return out, nil
} | go | func (wl *Basic) MarshalJSON() ([]byte, error) {
wl.lock.Lock()
defer wl.lock.Unlock()
var ss = make([]string, 0, len(wl.whitelist))
for ip := range wl.whitelist {
ss = append(ss, ip)
}
out := []byte(`"` + strings.Join(ss, ",") + `"`)
return out, nil
} | [
"func",
"(",
"wl",
"*",
"Basic",
")",
"MarshalJSON",
"(",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"wl",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"wl",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"var",
"ss",
"=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"wl",
".",
"whitelist",
")",
")",
"\n",
"for",
"ip",
":=",
"range",
"wl",
".",
"whitelist",
"{",
"ss",
"=",
"append",
"(",
"ss",
",",
"ip",
")",
"\n",
"}",
"\n\n",
"out",
":=",
"[",
"]",
"byte",
"(",
"`\"`",
"+",
"strings",
".",
"Join",
"(",
"ss",
",",
"\"",
"\"",
")",
"+",
"`\"`",
")",
"\n",
"return",
"out",
",",
"nil",
"\n",
"}"
] | // MarshalJSON serialises a host whitelist to a comma-separated list of
// hosts, implementing the json.Marshaler interface. | [
"MarshalJSON",
"serialises",
"a",
"host",
"whitelist",
"to",
"a",
"comma",
"-",
"separated",
"list",
"of",
"hosts",
"implementing",
"the",
"json",
".",
"Marshaler",
"interface",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L104-L114 | train |
cloudflare/cfssl | whitelist/whitelist.go | UnmarshalJSON | func (wl *Basic) UnmarshalJSON(in []byte) error {
if in[0] != '"' || in[len(in)-1] != '"' {
return errors.New("whitelist: invalid whitelist")
}
if wl.lock == nil {
wl.lock = new(sync.Mutex)
}
wl.lock.Lock()
defer wl.lock.Unlock()
netString := strings.TrimSpace(string(in[1 : len(in)-1]))
nets := strings.Split(netString, ",")
wl.whitelist = map[string]bool{}
for i := range nets {
addr := strings.TrimSpace(nets[i])
if addr == "" {
continue
}
ip := net.ParseIP(addr)
if ip == nil {
wl.whitelist = nil
return errors.New("whitelist: invalid IP address " + addr)
}
wl.whitelist[addr] = true
}
return nil
} | go | func (wl *Basic) UnmarshalJSON(in []byte) error {
if in[0] != '"' || in[len(in)-1] != '"' {
return errors.New("whitelist: invalid whitelist")
}
if wl.lock == nil {
wl.lock = new(sync.Mutex)
}
wl.lock.Lock()
defer wl.lock.Unlock()
netString := strings.TrimSpace(string(in[1 : len(in)-1]))
nets := strings.Split(netString, ",")
wl.whitelist = map[string]bool{}
for i := range nets {
addr := strings.TrimSpace(nets[i])
if addr == "" {
continue
}
ip := net.ParseIP(addr)
if ip == nil {
wl.whitelist = nil
return errors.New("whitelist: invalid IP address " + addr)
}
wl.whitelist[addr] = true
}
return nil
} | [
"func",
"(",
"wl",
"*",
"Basic",
")",
"UnmarshalJSON",
"(",
"in",
"[",
"]",
"byte",
")",
"error",
"{",
"if",
"in",
"[",
"0",
"]",
"!=",
"'\"'",
"||",
"in",
"[",
"len",
"(",
"in",
")",
"-",
"1",
"]",
"!=",
"'\"'",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"wl",
".",
"lock",
"==",
"nil",
"{",
"wl",
".",
"lock",
"=",
"new",
"(",
"sync",
".",
"Mutex",
")",
"\n",
"}",
"\n\n",
"wl",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"wl",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"netString",
":=",
"strings",
".",
"TrimSpace",
"(",
"string",
"(",
"in",
"[",
"1",
":",
"len",
"(",
"in",
")",
"-",
"1",
"]",
")",
")",
"\n",
"nets",
":=",
"strings",
".",
"Split",
"(",
"netString",
",",
"\"",
"\"",
")",
"\n\n",
"wl",
".",
"whitelist",
"=",
"map",
"[",
"string",
"]",
"bool",
"{",
"}",
"\n",
"for",
"i",
":=",
"range",
"nets",
"{",
"addr",
":=",
"strings",
".",
"TrimSpace",
"(",
"nets",
"[",
"i",
"]",
")",
"\n",
"if",
"addr",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n\n",
"ip",
":=",
"net",
".",
"ParseIP",
"(",
"addr",
")",
"\n",
"if",
"ip",
"==",
"nil",
"{",
"wl",
".",
"whitelist",
"=",
"nil",
"\n",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
"+",
"addr",
")",
"\n",
"}",
"\n",
"wl",
".",
"whitelist",
"[",
"addr",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // UnmarshalJSON implements the json.Unmarshaler interface for host
// whitelists, taking a comma-separated string of hosts. | [
"UnmarshalJSON",
"implements",
"the",
"json",
".",
"Unmarshaler",
"interface",
"for",
"host",
"whitelists",
"taking",
"a",
"comma",
"-",
"separated",
"string",
"of",
"hosts",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L118-L149 | train |
cloudflare/cfssl | whitelist/whitelist.go | DumpBasic | func DumpBasic(wl *Basic) []byte {
wl.lock.Lock()
defer wl.lock.Unlock()
var addrs = make([]string, 0, len(wl.whitelist))
for ip := range wl.whitelist {
addrs = append(addrs, ip)
}
sort.Strings(addrs)
addrList := strings.Join(addrs, "\n")
return []byte(addrList)
} | go | func DumpBasic(wl *Basic) []byte {
wl.lock.Lock()
defer wl.lock.Unlock()
var addrs = make([]string, 0, len(wl.whitelist))
for ip := range wl.whitelist {
addrs = append(addrs, ip)
}
sort.Strings(addrs)
addrList := strings.Join(addrs, "\n")
return []byte(addrList)
} | [
"func",
"DumpBasic",
"(",
"wl",
"*",
"Basic",
")",
"[",
"]",
"byte",
"{",
"wl",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"wl",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"var",
"addrs",
"=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"wl",
".",
"whitelist",
")",
")",
"\n",
"for",
"ip",
":=",
"range",
"wl",
".",
"whitelist",
"{",
"addrs",
"=",
"append",
"(",
"addrs",
",",
"ip",
")",
"\n",
"}",
"\n\n",
"sort",
".",
"Strings",
"(",
"addrs",
")",
"\n\n",
"addrList",
":=",
"strings",
".",
"Join",
"(",
"addrs",
",",
"\"",
"\\n",
"\"",
")",
"\n",
"return",
"[",
"]",
"byte",
"(",
"addrList",
")",
"\n",
"}"
] | // DumpBasic returns a whitelist as a byte slice where each IP is on
// its own line. | [
"DumpBasic",
"returns",
"a",
"whitelist",
"as",
"a",
"byte",
"slice",
"where",
"each",
"IP",
"is",
"on",
"its",
"own",
"line",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L153-L166 | train |
cloudflare/cfssl | whitelist/whitelist.go | LoadBasic | func LoadBasic(in []byte) (*Basic, error) {
wl := NewBasic()
addrs := strings.Split(string(in), "\n")
for _, addr := range addrs {
ip := net.ParseIP(addr)
if ip == nil {
return nil, errors.New("whitelist: invalid address")
}
wl.Add(ip)
}
return wl, nil
} | go | func LoadBasic(in []byte) (*Basic, error) {
wl := NewBasic()
addrs := strings.Split(string(in), "\n")
for _, addr := range addrs {
ip := net.ParseIP(addr)
if ip == nil {
return nil, errors.New("whitelist: invalid address")
}
wl.Add(ip)
}
return wl, nil
} | [
"func",
"LoadBasic",
"(",
"in",
"[",
"]",
"byte",
")",
"(",
"*",
"Basic",
",",
"error",
")",
"{",
"wl",
":=",
"NewBasic",
"(",
")",
"\n",
"addrs",
":=",
"strings",
".",
"Split",
"(",
"string",
"(",
"in",
")",
",",
"\"",
"\\n",
"\"",
")",
"\n\n",
"for",
"_",
",",
"addr",
":=",
"range",
"addrs",
"{",
"ip",
":=",
"net",
".",
"ParseIP",
"(",
"addr",
")",
"\n",
"if",
"ip",
"==",
"nil",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"wl",
".",
"Add",
"(",
"ip",
")",
"\n",
"}",
"\n",
"return",
"wl",
",",
"nil",
"\n",
"}"
] | // LoadBasic loads a whitelist from a byteslice. | [
"LoadBasic",
"loads",
"a",
"whitelist",
"from",
"a",
"byteslice",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L169-L181 | train |
cloudflare/cfssl | whitelist/whitelist.go | Permitted | func (wl HostStub) Permitted(ip net.IP) bool {
log.Printf("WARNING: whitelist check for %s but whitelisting is stubbed", ip)
return true
} | go | func (wl HostStub) Permitted(ip net.IP) bool {
log.Printf("WARNING: whitelist check for %s but whitelisting is stubbed", ip)
return true
} | [
"func",
"(",
"wl",
"HostStub",
")",
"Permitted",
"(",
"ip",
"net",
".",
"IP",
")",
"bool",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"ip",
")",
"\n",
"return",
"true",
"\n",
"}"
] | // Permitted always returns true, but prints a warning message alerting
// that whitelisting is stubbed. | [
"Permitted",
"always",
"returns",
"true",
"but",
"prints",
"a",
"warning",
"message",
"alerting",
"that",
"whitelisting",
"is",
"stubbed",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist.go#L192-L195 | train |
cloudflare/cfssl | initca/initca.go | validator | func validator(req *csr.CertificateRequest) error {
if req.CN != "" {
return nil
}
if len(req.Names) == 0 {
return cferr.Wrap(cferr.PolicyError, cferr.InvalidRequest, errors.New("missing subject information"))
}
for i := range req.Names {
if csr.IsNameEmpty(req.Names[i]) {
return cferr.Wrap(cferr.PolicyError, cferr.InvalidRequest, errors.New("missing subject information"))
}
}
return nil
} | go | func validator(req *csr.CertificateRequest) error {
if req.CN != "" {
return nil
}
if len(req.Names) == 0 {
return cferr.Wrap(cferr.PolicyError, cferr.InvalidRequest, errors.New("missing subject information"))
}
for i := range req.Names {
if csr.IsNameEmpty(req.Names[i]) {
return cferr.Wrap(cferr.PolicyError, cferr.InvalidRequest, errors.New("missing subject information"))
}
}
return nil
} | [
"func",
"validator",
"(",
"req",
"*",
"csr",
".",
"CertificateRequest",
")",
"error",
"{",
"if",
"req",
".",
"CN",
"!=",
"\"",
"\"",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"req",
".",
"Names",
")",
"==",
"0",
"{",
"return",
"cferr",
".",
"Wrap",
"(",
"cferr",
".",
"PolicyError",
",",
"cferr",
".",
"InvalidRequest",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"for",
"i",
":=",
"range",
"req",
".",
"Names",
"{",
"if",
"csr",
".",
"IsNameEmpty",
"(",
"req",
".",
"Names",
"[",
"i",
"]",
")",
"{",
"return",
"cferr",
".",
"Wrap",
"(",
"cferr",
".",
"PolicyError",
",",
"cferr",
".",
"InvalidRequest",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // validator contains the default validation logic for certificate
// authority certificates. The only requirement here is that the
// certificate have a non-empty subject field. | [
"validator",
"contains",
"the",
"default",
"validation",
"logic",
"for",
"certificate",
"authority",
"certificates",
".",
"The",
"only",
"requirement",
"here",
"is",
"that",
"the",
"certificate",
"have",
"a",
"non",
"-",
"empty",
"subject",
"field",
"."
] | 768cd563887febaad559b511aaa5964823ccb4ab | https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L27-L43 | train |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.