repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequence
docstring
stringlengths
6
2.61k
docstring_tokens
sequence
sha
stringlengths
40
40
url
stringlengths
85
252
partition
stringclasses
1 value
cloudflare/cfssl
initca/initca.go
New
func New(req *csr.CertificateRequest) (cert, csrPEM, key []byte, err error) { policy := CAPolicy() if req.CA != nil { if req.CA.Expiry != "" { policy.Default.ExpiryString = req.CA.Expiry policy.Default.Expiry, err = time.ParseDuration(req.CA.Expiry) if err != nil { return } } if req.CA.Backdate != "" { policy.Default.Backdate, err = time.ParseDuration(req.CA.Backdate) if err != nil { return } } policy.Default.CAConstraint.MaxPathLen = req.CA.PathLength if req.CA.PathLength != 0 && req.CA.PathLenZero { log.Infof("ignore invalid 'pathlenzero' value") } else { policy.Default.CAConstraint.MaxPathLenZero = req.CA.PathLenZero } } g := &csr.Generator{Validator: validator} csrPEM, key, err = g.ProcessRequest(req) if err != nil { log.Errorf("failed to process request: %v", err) key = nil return } priv, err := helpers.ParsePrivateKeyPEM(key) if err != nil { log.Errorf("failed to parse private key: %v", err) return } s, err := local.NewSigner(priv, nil, signer.DefaultSigAlgo(priv), policy) if err != nil { log.Errorf("failed to create signer: %v", err) return } signReq := signer.SignRequest{Hosts: req.Hosts, Request: string(csrPEM)} cert, err = s.Sign(signReq) return }
go
func New(req *csr.CertificateRequest) (cert, csrPEM, key []byte, err error) { policy := CAPolicy() if req.CA != nil { if req.CA.Expiry != "" { policy.Default.ExpiryString = req.CA.Expiry policy.Default.Expiry, err = time.ParseDuration(req.CA.Expiry) if err != nil { return } } if req.CA.Backdate != "" { policy.Default.Backdate, err = time.ParseDuration(req.CA.Backdate) if err != nil { return } } policy.Default.CAConstraint.MaxPathLen = req.CA.PathLength if req.CA.PathLength != 0 && req.CA.PathLenZero { log.Infof("ignore invalid 'pathlenzero' value") } else { policy.Default.CAConstraint.MaxPathLenZero = req.CA.PathLenZero } } g := &csr.Generator{Validator: validator} csrPEM, key, err = g.ProcessRequest(req) if err != nil { log.Errorf("failed to process request: %v", err) key = nil return } priv, err := helpers.ParsePrivateKeyPEM(key) if err != nil { log.Errorf("failed to parse private key: %v", err) return } s, err := local.NewSigner(priv, nil, signer.DefaultSigAlgo(priv), policy) if err != nil { log.Errorf("failed to create signer: %v", err) return } signReq := signer.SignRequest{Hosts: req.Hosts, Request: string(csrPEM)} cert, err = s.Sign(signReq) return }
[ "func", "New", "(", "req", "*", "csr", ".", "CertificateRequest", ")", "(", "cert", ",", "csrPEM", ",", "key", "[", "]", "byte", ",", "err", "error", ")", "{", "policy", ":=", "CAPolicy", "(", ")", "\n", "if", "req", ".", "CA", "!=", "nil", "{", "if", "req", ".", "CA", ".", "Expiry", "!=", "\"", "\"", "{", "policy", ".", "Default", ".", "ExpiryString", "=", "req", ".", "CA", ".", "Expiry", "\n", "policy", ".", "Default", ".", "Expiry", ",", "err", "=", "time", ".", "ParseDuration", "(", "req", ".", "CA", ".", "Expiry", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "}", "\n\n", "if", "req", ".", "CA", ".", "Backdate", "!=", "\"", "\"", "{", "policy", ".", "Default", ".", "Backdate", ",", "err", "=", "time", ".", "ParseDuration", "(", "req", ".", "CA", ".", "Backdate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "}", "\n\n", "policy", ".", "Default", ".", "CAConstraint", ".", "MaxPathLen", "=", "req", ".", "CA", ".", "PathLength", "\n", "if", "req", ".", "CA", ".", "PathLength", "!=", "0", "&&", "req", ".", "CA", ".", "PathLenZero", "{", "log", ".", "Infof", "(", "\"", "\"", ")", "\n", "}", "else", "{", "policy", ".", "Default", ".", "CAConstraint", ".", "MaxPathLenZero", "=", "req", ".", "CA", ".", "PathLenZero", "\n", "}", "\n", "}", "\n\n", "g", ":=", "&", "csr", ".", "Generator", "{", "Validator", ":", "validator", "}", "\n", "csrPEM", ",", "key", ",", "err", "=", "g", ".", "ProcessRequest", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "key", "=", "nil", "\n", "return", "\n", "}", "\n\n", "priv", ",", "err", ":=", "helpers", ".", "ParsePrivateKeyPEM", "(", "key", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "\n", "}", "\n\n", "s", ",", "err", ":=", "local", ".", "NewSigner", "(", "priv", ",", "nil", ",", "signer", ".", "DefaultSigAlgo", "(", "priv", ")", ",", "policy", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "\n", "}", "\n\n", "signReq", ":=", "signer", ".", "SignRequest", "{", "Hosts", ":", "req", ".", "Hosts", ",", "Request", ":", "string", "(", "csrPEM", ")", "}", "\n", "cert", ",", "err", "=", "s", ".", "Sign", "(", "signReq", ")", "\n\n", "return", "\n\n", "}" ]
// New creates a new root certificate from the certificate request.
[ "New", "creates", "a", "new", "root", "certificate", "from", "the", "certificate", "request", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L46-L97
train
cloudflare/cfssl
initca/initca.go
NewFromPEM
func NewFromPEM(req *csr.CertificateRequest, keyFile string) (cert, csrPEM []byte, err error) { privData, err := helpers.ReadBytes(keyFile) if err != nil { return nil, nil, err } priv, err := helpers.ParsePrivateKeyPEM(privData) if err != nil { return nil, nil, err } return NewFromSigner(req, priv) }
go
func NewFromPEM(req *csr.CertificateRequest, keyFile string) (cert, csrPEM []byte, err error) { privData, err := helpers.ReadBytes(keyFile) if err != nil { return nil, nil, err } priv, err := helpers.ParsePrivateKeyPEM(privData) if err != nil { return nil, nil, err } return NewFromSigner(req, priv) }
[ "func", "NewFromPEM", "(", "req", "*", "csr", ".", "CertificateRequest", ",", "keyFile", "string", ")", "(", "cert", ",", "csrPEM", "[", "]", "byte", ",", "err", "error", ")", "{", "privData", ",", "err", ":=", "helpers", ".", "ReadBytes", "(", "keyFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "priv", ",", "err", ":=", "helpers", ".", "ParsePrivateKeyPEM", "(", "privData", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "NewFromSigner", "(", "req", ",", "priv", ")", "\n", "}" ]
// NewFromPEM creates a new root certificate from the key file passed in.
[ "NewFromPEM", "creates", "a", "new", "root", "certificate", "from", "the", "key", "file", "passed", "in", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L100-L112
train
cloudflare/cfssl
initca/initca.go
RenewFromPEM
func RenewFromPEM(caFile, keyFile string) ([]byte, error) { caBytes, err := helpers.ReadBytes(caFile) if err != nil { return nil, err } ca, err := helpers.ParseCertificatePEM(caBytes) if err != nil { return nil, err } keyBytes, err := helpers.ReadBytes(keyFile) if err != nil { return nil, err } key, err := helpers.ParsePrivateKeyPEM(keyBytes) if err != nil { return nil, err } return RenewFromSigner(ca, key) }
go
func RenewFromPEM(caFile, keyFile string) ([]byte, error) { caBytes, err := helpers.ReadBytes(caFile) if err != nil { return nil, err } ca, err := helpers.ParseCertificatePEM(caBytes) if err != nil { return nil, err } keyBytes, err := helpers.ReadBytes(keyFile) if err != nil { return nil, err } key, err := helpers.ParsePrivateKeyPEM(keyBytes) if err != nil { return nil, err } return RenewFromSigner(ca, key) }
[ "func", "RenewFromPEM", "(", "caFile", ",", "keyFile", "string", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "caBytes", ",", "err", ":=", "helpers", ".", "ReadBytes", "(", "caFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "ca", ",", "err", ":=", "helpers", ".", "ParseCertificatePEM", "(", "caBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "keyBytes", ",", "err", ":=", "helpers", ".", "ReadBytes", "(", "keyFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "key", ",", "err", ":=", "helpers", ".", "ParsePrivateKeyPEM", "(", "keyBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "RenewFromSigner", "(", "ca", ",", "key", ")", "\n", "}" ]
// RenewFromPEM re-creates a root certificate from the CA cert and key // files. The resulting root certificate will have the input CA certificate // as the template and have the same expiry length. E.g. the existing CA // is valid for a year from Jan 01 2015 to Jan 01 2016, the renewed certificate // will be valid from now and expire in one year as well.
[ "RenewFromPEM", "re", "-", "creates", "a", "root", "certificate", "from", "the", "CA", "cert", "and", "key", "files", ".", "The", "resulting", "root", "certificate", "will", "have", "the", "input", "CA", "certificate", "as", "the", "template", "and", "have", "the", "same", "expiry", "length", ".", "E", ".", "g", ".", "the", "existing", "CA", "is", "valid", "for", "a", "year", "from", "Jan", "01", "2015", "to", "Jan", "01", "2016", "the", "renewed", "certificate", "will", "be", "valid", "from", "now", "and", "expire", "in", "one", "year", "as", "well", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L119-L141
train
cloudflare/cfssl
initca/initca.go
NewFromSigner
func NewFromSigner(req *csr.CertificateRequest, priv crypto.Signer) (cert, csrPEM []byte, err error) { policy := CAPolicy() if req.CA != nil { if req.CA.Expiry != "" { policy.Default.ExpiryString = req.CA.Expiry policy.Default.Expiry, err = time.ParseDuration(req.CA.Expiry) if err != nil { return nil, nil, err } } policy.Default.CAConstraint.MaxPathLen = req.CA.PathLength if req.CA.PathLength != 0 && req.CA.PathLenZero == true { log.Infof("ignore invalid 'pathlenzero' value") } else { policy.Default.CAConstraint.MaxPathLenZero = req.CA.PathLenZero } } csrPEM, err = csr.Generate(priv, req) if err != nil { return nil, nil, err } s, err := local.NewSigner(priv, nil, signer.DefaultSigAlgo(priv), policy) if err != nil { log.Errorf("failed to create signer: %v", err) return } signReq := signer.SignRequest{Request: string(csrPEM)} cert, err = s.Sign(signReq) return }
go
func NewFromSigner(req *csr.CertificateRequest, priv crypto.Signer) (cert, csrPEM []byte, err error) { policy := CAPolicy() if req.CA != nil { if req.CA.Expiry != "" { policy.Default.ExpiryString = req.CA.Expiry policy.Default.Expiry, err = time.ParseDuration(req.CA.Expiry) if err != nil { return nil, nil, err } } policy.Default.CAConstraint.MaxPathLen = req.CA.PathLength if req.CA.PathLength != 0 && req.CA.PathLenZero == true { log.Infof("ignore invalid 'pathlenzero' value") } else { policy.Default.CAConstraint.MaxPathLenZero = req.CA.PathLenZero } } csrPEM, err = csr.Generate(priv, req) if err != nil { return nil, nil, err } s, err := local.NewSigner(priv, nil, signer.DefaultSigAlgo(priv), policy) if err != nil { log.Errorf("failed to create signer: %v", err) return } signReq := signer.SignRequest{Request: string(csrPEM)} cert, err = s.Sign(signReq) return }
[ "func", "NewFromSigner", "(", "req", "*", "csr", ".", "CertificateRequest", ",", "priv", "crypto", ".", "Signer", ")", "(", "cert", ",", "csrPEM", "[", "]", "byte", ",", "err", "error", ")", "{", "policy", ":=", "CAPolicy", "(", ")", "\n", "if", "req", ".", "CA", "!=", "nil", "{", "if", "req", ".", "CA", ".", "Expiry", "!=", "\"", "\"", "{", "policy", ".", "Default", ".", "ExpiryString", "=", "req", ".", "CA", ".", "Expiry", "\n", "policy", ".", "Default", ".", "Expiry", ",", "err", "=", "time", ".", "ParseDuration", "(", "req", ".", "CA", ".", "Expiry", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "policy", ".", "Default", ".", "CAConstraint", ".", "MaxPathLen", "=", "req", ".", "CA", ".", "PathLength", "\n", "if", "req", ".", "CA", ".", "PathLength", "!=", "0", "&&", "req", ".", "CA", ".", "PathLenZero", "==", "true", "{", "log", ".", "Infof", "(", "\"", "\"", ")", "\n", "}", "else", "{", "policy", ".", "Default", ".", "CAConstraint", ".", "MaxPathLenZero", "=", "req", ".", "CA", ".", "PathLenZero", "\n", "}", "\n", "}", "\n\n", "csrPEM", ",", "err", "=", "csr", ".", "Generate", "(", "priv", ",", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "s", ",", "err", ":=", "local", ".", "NewSigner", "(", "priv", ",", "nil", ",", "signer", ".", "DefaultSigAlgo", "(", "priv", ")", ",", "policy", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "\n", "}", "\n\n", "signReq", ":=", "signer", ".", "SignRequest", "{", "Request", ":", "string", "(", "csrPEM", ")", "}", "\n", "cert", ",", "err", "=", "s", ".", "Sign", "(", "signReq", ")", "\n", "return", "\n", "}" ]
// NewFromSigner creates a new root certificate from a crypto.Signer.
[ "NewFromSigner", "creates", "a", "new", "root", "certificate", "from", "a", "crypto", ".", "Signer", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L144-L177
train
cloudflare/cfssl
initca/initca.go
RenewFromSigner
func RenewFromSigner(ca *x509.Certificate, priv crypto.Signer) ([]byte, error) { if !ca.IsCA { return nil, errors.New("input certificate is not a CA cert") } // matching certificate public key vs private key switch { case ca.PublicKeyAlgorithm == x509.RSA: var rsaPublicKey *rsa.PublicKey var ok bool if rsaPublicKey, ok = priv.Public().(*rsa.PublicKey); !ok { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } if ca.PublicKey.(*rsa.PublicKey).N.Cmp(rsaPublicKey.N) != 0 { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } case ca.PublicKeyAlgorithm == x509.ECDSA: var ecdsaPublicKey *ecdsa.PublicKey var ok bool if ecdsaPublicKey, ok = priv.Public().(*ecdsa.PublicKey); !ok { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } if ca.PublicKey.(*ecdsa.PublicKey).X.Cmp(ecdsaPublicKey.X) != 0 { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } default: return nil, cferr.New(cferr.PrivateKeyError, cferr.NotRSAOrECC) } req := csr.ExtractCertificateRequest(ca) cert, _, err := NewFromSigner(req, priv) return cert, err }
go
func RenewFromSigner(ca *x509.Certificate, priv crypto.Signer) ([]byte, error) { if !ca.IsCA { return nil, errors.New("input certificate is not a CA cert") } // matching certificate public key vs private key switch { case ca.PublicKeyAlgorithm == x509.RSA: var rsaPublicKey *rsa.PublicKey var ok bool if rsaPublicKey, ok = priv.Public().(*rsa.PublicKey); !ok { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } if ca.PublicKey.(*rsa.PublicKey).N.Cmp(rsaPublicKey.N) != 0 { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } case ca.PublicKeyAlgorithm == x509.ECDSA: var ecdsaPublicKey *ecdsa.PublicKey var ok bool if ecdsaPublicKey, ok = priv.Public().(*ecdsa.PublicKey); !ok { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } if ca.PublicKey.(*ecdsa.PublicKey).X.Cmp(ecdsaPublicKey.X) != 0 { return nil, cferr.New(cferr.PrivateKeyError, cferr.KeyMismatch) } default: return nil, cferr.New(cferr.PrivateKeyError, cferr.NotRSAOrECC) } req := csr.ExtractCertificateRequest(ca) cert, _, err := NewFromSigner(req, priv) return cert, err }
[ "func", "RenewFromSigner", "(", "ca", "*", "x509", ".", "Certificate", ",", "priv", "crypto", ".", "Signer", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "if", "!", "ca", ".", "IsCA", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// matching certificate public key vs private key", "switch", "{", "case", "ca", ".", "PublicKeyAlgorithm", "==", "x509", ".", "RSA", ":", "var", "rsaPublicKey", "*", "rsa", ".", "PublicKey", "\n", "var", "ok", "bool", "\n", "if", "rsaPublicKey", ",", "ok", "=", "priv", ".", "Public", "(", ")", ".", "(", "*", "rsa", ".", "PublicKey", ")", ";", "!", "ok", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "PrivateKeyError", ",", "cferr", ".", "KeyMismatch", ")", "\n", "}", "\n", "if", "ca", ".", "PublicKey", ".", "(", "*", "rsa", ".", "PublicKey", ")", ".", "N", ".", "Cmp", "(", "rsaPublicKey", ".", "N", ")", "!=", "0", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "PrivateKeyError", ",", "cferr", ".", "KeyMismatch", ")", "\n", "}", "\n", "case", "ca", ".", "PublicKeyAlgorithm", "==", "x509", ".", "ECDSA", ":", "var", "ecdsaPublicKey", "*", "ecdsa", ".", "PublicKey", "\n", "var", "ok", "bool", "\n", "if", "ecdsaPublicKey", ",", "ok", "=", "priv", ".", "Public", "(", ")", ".", "(", "*", "ecdsa", ".", "PublicKey", ")", ";", "!", "ok", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "PrivateKeyError", ",", "cferr", ".", "KeyMismatch", ")", "\n", "}", "\n", "if", "ca", ".", "PublicKey", ".", "(", "*", "ecdsa", ".", "PublicKey", ")", ".", "X", ".", "Cmp", "(", "ecdsaPublicKey", ".", "X", ")", "!=", "0", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "PrivateKeyError", ",", "cferr", ".", "KeyMismatch", ")", "\n", "}", "\n", "default", ":", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "PrivateKeyError", ",", "cferr", ".", "NotRSAOrECC", ")", "\n", "}", "\n\n", "req", ":=", "csr", ".", "ExtractCertificateRequest", "(", "ca", ")", "\n", "cert", ",", "_", ",", "err", ":=", "NewFromSigner", "(", "req", ",", "priv", ")", "\n", "return", "cert", ",", "err", "\n\n", "}" ]
// RenewFromSigner re-creates a root certificate from the CA cert and crypto.Signer. // The resulting root certificate will have ca certificate // as the template and have the same expiry length. E.g. the existing CA // is valid for a year from Jan 01 2015 to Jan 01 2016, the renewed certificate // will be valid from now and expire in one year as well.
[ "RenewFromSigner", "re", "-", "creates", "a", "root", "certificate", "from", "the", "CA", "cert", "and", "crypto", ".", "Signer", ".", "The", "resulting", "root", "certificate", "will", "have", "ca", "certificate", "as", "the", "template", "and", "have", "the", "same", "expiry", "length", ".", "E", ".", "g", ".", "the", "existing", "CA", "is", "valid", "for", "a", "year", "from", "Jan", "01", "2015", "to", "Jan", "01", "2016", "the", "renewed", "certificate", "will", "be", "valid", "from", "now", "and", "expire", "in", "one", "year", "as", "well", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L184-L217
train
cloudflare/cfssl
initca/initca.go
Update
func Update(ca *x509.Certificate, priv crypto.Signer) (cert []byte, err error) { copy, err := x509.ParseCertificate(ca.Raw) if err != nil { return } validity := ca.NotAfter.Sub(ca.NotBefore) copy.NotBefore = time.Now().Round(time.Minute).Add(-5 * time.Minute) copy.NotAfter = copy.NotBefore.Add(validity) cert, err = x509.CreateCertificate(rand.Reader, copy, copy, priv.Public(), priv) if err != nil { return } cert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: cert}) return }
go
func Update(ca *x509.Certificate, priv crypto.Signer) (cert []byte, err error) { copy, err := x509.ParseCertificate(ca.Raw) if err != nil { return } validity := ca.NotAfter.Sub(ca.NotBefore) copy.NotBefore = time.Now().Round(time.Minute).Add(-5 * time.Minute) copy.NotAfter = copy.NotBefore.Add(validity) cert, err = x509.CreateCertificate(rand.Reader, copy, copy, priv.Public(), priv) if err != nil { return } cert = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: cert}) return }
[ "func", "Update", "(", "ca", "*", "x509", ".", "Certificate", ",", "priv", "crypto", ".", "Signer", ")", "(", "cert", "[", "]", "byte", ",", "err", "error", ")", "{", "copy", ",", "err", ":=", "x509", ".", "ParseCertificate", "(", "ca", ".", "Raw", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "validity", ":=", "ca", ".", "NotAfter", ".", "Sub", "(", "ca", ".", "NotBefore", ")", "\n", "copy", ".", "NotBefore", "=", "time", ".", "Now", "(", ")", ".", "Round", "(", "time", ".", "Minute", ")", ".", "Add", "(", "-", "5", "*", "time", ".", "Minute", ")", "\n", "copy", ".", "NotAfter", "=", "copy", ".", "NotBefore", ".", "Add", "(", "validity", ")", "\n", "cert", ",", "err", "=", "x509", ".", "CreateCertificate", "(", "rand", ".", "Reader", ",", "copy", ",", "copy", ",", "priv", ".", "Public", "(", ")", ",", "priv", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "cert", "=", "pem", ".", "EncodeToMemory", "(", "&", "pem", ".", "Block", "{", "Type", ":", "\"", "\"", ",", "Bytes", ":", "cert", "}", ")", "\n", "return", "\n", "}" ]
// Update copies the CA certificate, updates the NotBefore and // NotAfter fields, and then re-signs the certificate.
[ "Update", "copies", "the", "CA", "certificate", "updates", "the", "NotBefore", "and", "NotAfter", "fields", "and", "then", "re", "-", "signs", "the", "certificate", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/initca/initca.go#L233-L249
train
cloudflare/cfssl
cli/config.go
RootFromConfig
func RootFromConfig(c *Config) universal.Root { return universal.Root{ Config: map[string]string{ "cert-file": c.CAFile, "key-file": c.CAKeyFile, }, ForceRemote: c.Remote != "", } }
go
func RootFromConfig(c *Config) universal.Root { return universal.Root{ Config: map[string]string{ "cert-file": c.CAFile, "key-file": c.CAKeyFile, }, ForceRemote: c.Remote != "", } }
[ "func", "RootFromConfig", "(", "c", "*", "Config", ")", "universal", ".", "Root", "{", "return", "universal", ".", "Root", "{", "Config", ":", "map", "[", "string", "]", "string", "{", "\"", "\"", ":", "c", ".", "CAFile", ",", "\"", "\"", ":", "c", ".", "CAKeyFile", ",", "}", ",", "ForceRemote", ":", "c", ".", "Remote", "!=", "\"", "\"", ",", "}", "\n", "}" ]
// RootFromConfig returns a universal signer Root structure that can // be used to produce a signer.
[ "RootFromConfig", "returns", "a", "universal", "signer", "Root", "structure", "that", "can", "be", "used", "to", "produce", "a", "signer", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/config.go#L139-L147
train
cloudflare/cfssl
scan/broad.go
intermediateCAScan
func intermediateCAScan(addr, hostname string) (grade Grade, output Output, err error) { cidr, port, _ := net.SplitHostPort(addr) _, ipnet, err := net.ParseCIDR(cidr) if err != nil { return Skipped, nil, nil } b, err := bundler.NewBundler(caBundleFile, intBundleFile) if err != nil { return } var wg sync.WaitGroup wg.Add(numWorkers) dialer := &net.Dialer{Timeout: timeout} config := &tls.Config{InsecureSkipVerify: true} addrs := make(chan string) chains := make(chan []*x509.Certificate, numWorkers) go func() { for chain := range chains { b.Bundle(chain, nil, bundler.Force) } }() for i := 0; i < numWorkers; i++ { go func() { for addr := range addrs { conn, err := tls.DialWithDialer(dialer, Network, addr, config) if err != nil { continue } conn.Close() if conn.ConnectionState().HandshakeComplete { chains <- conn.ConnectionState().PeerCertificates } } wg.Done() }() } for ip := ipnet.IP.To16(); ipnet.Contains(ip); incrementBytes(ip) { addrs <- net.JoinHostPort(ip.String(), port) } close(addrs) wg.Wait() close(chains) grade = Good return }
go
func intermediateCAScan(addr, hostname string) (grade Grade, output Output, err error) { cidr, port, _ := net.SplitHostPort(addr) _, ipnet, err := net.ParseCIDR(cidr) if err != nil { return Skipped, nil, nil } b, err := bundler.NewBundler(caBundleFile, intBundleFile) if err != nil { return } var wg sync.WaitGroup wg.Add(numWorkers) dialer := &net.Dialer{Timeout: timeout} config := &tls.Config{InsecureSkipVerify: true} addrs := make(chan string) chains := make(chan []*x509.Certificate, numWorkers) go func() { for chain := range chains { b.Bundle(chain, nil, bundler.Force) } }() for i := 0; i < numWorkers; i++ { go func() { for addr := range addrs { conn, err := tls.DialWithDialer(dialer, Network, addr, config) if err != nil { continue } conn.Close() if conn.ConnectionState().HandshakeComplete { chains <- conn.ConnectionState().PeerCertificates } } wg.Done() }() } for ip := ipnet.IP.To16(); ipnet.Contains(ip); incrementBytes(ip) { addrs <- net.JoinHostPort(ip.String(), port) } close(addrs) wg.Wait() close(chains) grade = Good return }
[ "func", "intermediateCAScan", "(", "addr", ",", "hostname", "string", ")", "(", "grade", "Grade", ",", "output", "Output", ",", "err", "error", ")", "{", "cidr", ",", "port", ",", "_", ":=", "net", ".", "SplitHostPort", "(", "addr", ")", "\n", "_", ",", "ipnet", ",", "err", ":=", "net", ".", "ParseCIDR", "(", "cidr", ")", "\n", "if", "err", "!=", "nil", "{", "return", "Skipped", ",", "nil", ",", "nil", "\n", "}", "\n", "b", ",", "err", ":=", "bundler", ".", "NewBundler", "(", "caBundleFile", ",", "intBundleFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "var", "wg", "sync", ".", "WaitGroup", "\n", "wg", ".", "Add", "(", "numWorkers", ")", "\n", "dialer", ":=", "&", "net", ".", "Dialer", "{", "Timeout", ":", "timeout", "}", "\n", "config", ":=", "&", "tls", ".", "Config", "{", "InsecureSkipVerify", ":", "true", "}", "\n", "addrs", ":=", "make", "(", "chan", "string", ")", "\n", "chains", ":=", "make", "(", "chan", "[", "]", "*", "x509", ".", "Certificate", ",", "numWorkers", ")", "\n", "go", "func", "(", ")", "{", "for", "chain", ":=", "range", "chains", "{", "b", ".", "Bundle", "(", "chain", ",", "nil", ",", "bundler", ".", "Force", ")", "\n", "}", "\n", "}", "(", ")", "\n", "for", "i", ":=", "0", ";", "i", "<", "numWorkers", ";", "i", "++", "{", "go", "func", "(", ")", "{", "for", "addr", ":=", "range", "addrs", "{", "conn", ",", "err", ":=", "tls", ".", "DialWithDialer", "(", "dialer", ",", "Network", ",", "addr", ",", "config", ")", "\n", "if", "err", "!=", "nil", "{", "continue", "\n", "}", "\n", "conn", ".", "Close", "(", ")", "\n", "if", "conn", ".", "ConnectionState", "(", ")", ".", "HandshakeComplete", "{", "chains", "<-", "conn", ".", "ConnectionState", "(", ")", ".", "PeerCertificates", "\n", "}", "\n", "}", "\n", "wg", ".", "Done", "(", ")", "\n", "}", "(", ")", "\n", "}", "\n", "for", "ip", ":=", "ipnet", ".", "IP", ".", "To16", "(", ")", ";", "ipnet", ".", "Contains", "(", "ip", ")", ";", "incrementBytes", "(", "ip", ")", "{", "addrs", "<-", "net", ".", "JoinHostPort", "(", "ip", ".", "String", "(", ")", ",", "port", ")", "\n", "}", "\n", "close", "(", "addrs", ")", "\n", "wg", ".", "Wait", "(", ")", "\n", "close", "(", "chains", ")", "\n", "grade", "=", "Good", "\n", "return", "\n", "}" ]
// intermediateCAScan scans for new intermediate CAs not in the trust store.
[ "intermediateCAScan", "scans", "for", "new", "intermediate", "CAs", "not", "in", "the", "trust", "store", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/broad.go#L40-L84
train
cloudflare/cfssl
scan/crypto/rsa/pkcs1v15.go
decryptPKCS1v15
func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) { k := (priv.N.BitLen() + 7) / 8 if k < 11 { err = ErrDecryption return } c := new(big.Int).SetBytes(ciphertext) m, err := decrypt(rand, priv, c) if err != nil { return } em = leftPad(m.Bytes(), k) firstByteIsZero := subtle.ConstantTimeByteEq(em[0], 0) secondByteIsTwo := subtle.ConstantTimeByteEq(em[1], 2) // The remainder of the plaintext must be a string of non-zero random // octets, followed by a 0, followed by the message. // lookingForIndex: 1 iff we are still looking for the zero. // index: the offset of the first zero byte. lookingForIndex := 1 for i := 2; i < len(em); i++ { equals0 := subtle.ConstantTimeByteEq(em[i], 0) index = subtle.ConstantTimeSelect(lookingForIndex&equals0, i, index) lookingForIndex = subtle.ConstantTimeSelect(equals0, 0, lookingForIndex) } // The PS padding must be at least 8 bytes long, and it starts two // bytes into em. validPS := subtle.ConstantTimeLessOrEq(2+8, index) valid = firstByteIsZero & secondByteIsTwo & (^lookingForIndex & 1) & validPS index = subtle.ConstantTimeSelect(valid, index+1, 0) return valid, em, index, nil }
go
func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) { k := (priv.N.BitLen() + 7) / 8 if k < 11 { err = ErrDecryption return } c := new(big.Int).SetBytes(ciphertext) m, err := decrypt(rand, priv, c) if err != nil { return } em = leftPad(m.Bytes(), k) firstByteIsZero := subtle.ConstantTimeByteEq(em[0], 0) secondByteIsTwo := subtle.ConstantTimeByteEq(em[1], 2) // The remainder of the plaintext must be a string of non-zero random // octets, followed by a 0, followed by the message. // lookingForIndex: 1 iff we are still looking for the zero. // index: the offset of the first zero byte. lookingForIndex := 1 for i := 2; i < len(em); i++ { equals0 := subtle.ConstantTimeByteEq(em[i], 0) index = subtle.ConstantTimeSelect(lookingForIndex&equals0, i, index) lookingForIndex = subtle.ConstantTimeSelect(equals0, 0, lookingForIndex) } // The PS padding must be at least 8 bytes long, and it starts two // bytes into em. validPS := subtle.ConstantTimeLessOrEq(2+8, index) valid = firstByteIsZero & secondByteIsTwo & (^lookingForIndex & 1) & validPS index = subtle.ConstantTimeSelect(valid, index+1, 0) return valid, em, index, nil }
[ "func", "decryptPKCS1v15", "(", "rand", "io", ".", "Reader", ",", "priv", "*", "PrivateKey", ",", "ciphertext", "[", "]", "byte", ")", "(", "valid", "int", ",", "em", "[", "]", "byte", ",", "index", "int", ",", "err", "error", ")", "{", "k", ":=", "(", "priv", ".", "N", ".", "BitLen", "(", ")", "+", "7", ")", "/", "8", "\n", "if", "k", "<", "11", "{", "err", "=", "ErrDecryption", "\n", "return", "\n", "}", "\n\n", "c", ":=", "new", "(", "big", ".", "Int", ")", ".", "SetBytes", "(", "ciphertext", ")", "\n", "m", ",", "err", ":=", "decrypt", "(", "rand", ",", "priv", ",", "c", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "em", "=", "leftPad", "(", "m", ".", "Bytes", "(", ")", ",", "k", ")", "\n", "firstByteIsZero", ":=", "subtle", ".", "ConstantTimeByteEq", "(", "em", "[", "0", "]", ",", "0", ")", "\n", "secondByteIsTwo", ":=", "subtle", ".", "ConstantTimeByteEq", "(", "em", "[", "1", "]", ",", "2", ")", "\n\n", "// The remainder of the plaintext must be a string of non-zero random", "// octets, followed by a 0, followed by the message.", "// lookingForIndex: 1 iff we are still looking for the zero.", "// index: the offset of the first zero byte.", "lookingForIndex", ":=", "1", "\n\n", "for", "i", ":=", "2", ";", "i", "<", "len", "(", "em", ")", ";", "i", "++", "{", "equals0", ":=", "subtle", ".", "ConstantTimeByteEq", "(", "em", "[", "i", "]", ",", "0", ")", "\n", "index", "=", "subtle", ".", "ConstantTimeSelect", "(", "lookingForIndex", "&", "equals0", ",", "i", ",", "index", ")", "\n", "lookingForIndex", "=", "subtle", ".", "ConstantTimeSelect", "(", "equals0", ",", "0", ",", "lookingForIndex", ")", "\n", "}", "\n\n", "// The PS padding must be at least 8 bytes long, and it starts two", "// bytes into em.", "validPS", ":=", "subtle", ".", "ConstantTimeLessOrEq", "(", "2", "+", "8", ",", "index", ")", "\n\n", "valid", "=", "firstByteIsZero", "&", "secondByteIsTwo", "&", "(", "^", "lookingForIndex", "&", "1", ")", "&", "validPS", "\n", "index", "=", "subtle", ".", "ConstantTimeSelect", "(", "valid", ",", "index", "+", "1", ",", "0", ")", "\n", "return", "valid", ",", "em", ",", "index", ",", "nil", "\n", "}" ]
// decryptPKCS1v15 decrypts ciphertext using priv and blinds the operation if // rand is not nil. It returns one or zero in valid that indicates whether the // plaintext was correctly structured. In either case, the plaintext is // returned in em so that it may be read independently of whether it was valid // in order to maintain constant memory access patterns. If the plaintext was // valid then index contains the index of the original message in em.
[ "decryptPKCS1v15", "decrypts", "ciphertext", "using", "priv", "and", "blinds", "the", "operation", "if", "rand", "is", "not", "nil", ".", "It", "returns", "one", "or", "zero", "in", "valid", "that", "indicates", "whether", "the", "plaintext", "was", "correctly", "structured", ".", "In", "either", "case", "the", "plaintext", "is", "returned", "in", "em", "so", "that", "it", "may", "be", "read", "independently", "of", "whether", "it", "was", "valid", "in", "order", "to", "maintain", "constant", "memory", "access", "patterns", ".", "If", "the", "plaintext", "was", "valid", "then", "index", "contains", "the", "index", "of", "the", "original", "message", "in", "em", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/rsa/pkcs1v15.go#L137-L173
train
cloudflare/cfssl
scan/crypto/rsa/pkcs1v15.go
copyWithLeftPad
func copyWithLeftPad(dest, src []byte) { numPaddingBytes := len(dest) - len(src) for i := 0; i < numPaddingBytes; i++ { dest[i] = 0 } copy(dest[numPaddingBytes:], src) }
go
func copyWithLeftPad(dest, src []byte) { numPaddingBytes := len(dest) - len(src) for i := 0; i < numPaddingBytes; i++ { dest[i] = 0 } copy(dest[numPaddingBytes:], src) }
[ "func", "copyWithLeftPad", "(", "dest", ",", "src", "[", "]", "byte", ")", "{", "numPaddingBytes", ":=", "len", "(", "dest", ")", "-", "len", "(", "src", ")", "\n", "for", "i", ":=", "0", ";", "i", "<", "numPaddingBytes", ";", "i", "++", "{", "dest", "[", "i", "]", "=", "0", "\n", "}", "\n", "copy", "(", "dest", "[", "numPaddingBytes", ":", "]", ",", "src", ")", "\n", "}" ]
// copyWithLeftPad copies src to the end of dest, padding with zero bytes as // needed.
[ "copyWithLeftPad", "copies", "src", "to", "the", "end", "of", "dest", "padding", "with", "zero", "bytes", "as", "needed", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/rsa/pkcs1v15.go#L319-L325
train
cloudflare/cfssl
api/signhandler/signhandler.go
NewHandlerFromSigner
func NewHandlerFromSigner(signer signer.Signer) (h *api.HTTPHandler, err error) { policy := signer.Policy() if policy == nil { err = errors.New(errors.PolicyError, errors.InvalidPolicy) return } // Sign will only respond for profiles that have no auth provider. // So if all of the profiles require authentication, we return an error. haveUnauth := (policy.Default.Provider == nil) for _, profile := range policy.Profiles { haveUnauth = haveUnauth || (profile.Provider == nil) } if !haveUnauth { err = errors.New(errors.PolicyError, errors.InvalidPolicy) return } return &api.HTTPHandler{ Handler: &Handler{ signer: signer, }, Methods: []string{"POST"}, }, nil }
go
func NewHandlerFromSigner(signer signer.Signer) (h *api.HTTPHandler, err error) { policy := signer.Policy() if policy == nil { err = errors.New(errors.PolicyError, errors.InvalidPolicy) return } // Sign will only respond for profiles that have no auth provider. // So if all of the profiles require authentication, we return an error. haveUnauth := (policy.Default.Provider == nil) for _, profile := range policy.Profiles { haveUnauth = haveUnauth || (profile.Provider == nil) } if !haveUnauth { err = errors.New(errors.PolicyError, errors.InvalidPolicy) return } return &api.HTTPHandler{ Handler: &Handler{ signer: signer, }, Methods: []string{"POST"}, }, nil }
[ "func", "NewHandlerFromSigner", "(", "signer", "signer", ".", "Signer", ")", "(", "h", "*", "api", ".", "HTTPHandler", ",", "err", "error", ")", "{", "policy", ":=", "signer", ".", "Policy", "(", ")", "\n", "if", "policy", "==", "nil", "{", "err", "=", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidPolicy", ")", "\n", "return", "\n", "}", "\n\n", "// Sign will only respond for profiles that have no auth provider.", "// So if all of the profiles require authentication, we return an error.", "haveUnauth", ":=", "(", "policy", ".", "Default", ".", "Provider", "==", "nil", ")", "\n", "for", "_", ",", "profile", ":=", "range", "policy", ".", "Profiles", "{", "haveUnauth", "=", "haveUnauth", "||", "(", "profile", ".", "Provider", "==", "nil", ")", "\n", "}", "\n\n", "if", "!", "haveUnauth", "{", "err", "=", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidPolicy", ")", "\n", "return", "\n", "}", "\n\n", "return", "&", "api", ".", "HTTPHandler", "{", "Handler", ":", "&", "Handler", "{", "signer", ":", "signer", ",", "}", ",", "Methods", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "}", ",", "nil", "\n", "}" ]
// NewHandlerFromSigner generates a new Handler directly from // an existing signer.
[ "NewHandlerFromSigner", "generates", "a", "new", "Handler", "directly", "from", "an", "existing", "signer", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/signhandler/signhandler.go#L32-L57
train
cloudflare/cfssl
api/signhandler/signhandler.go
Handle
func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) error { log.Info("signature request received") body, err := ioutil.ReadAll(r.Body) if err != nil { return err } r.Body.Close() var req jsonSignRequest err = json.Unmarshal(body, &req) if err != nil { return errors.NewBadRequestString("Unable to parse sign request") } signReq := jsonReqToTrue(req) if req.Request == "" { return errors.NewBadRequestString("missing parameter 'certificate_request'") } var cert []byte profile, err := signer.Profile(h.signer, req.Profile) if err != nil { return err } if profile.Provider != nil { log.Error("profile requires authentication") return errors.NewBadRequestString("authentication required") } cert, err = h.signer.Sign(signReq) if err != nil { log.Warningf("failed to sign request: %v", err) return err } result := map[string]interface{}{"certificate": string(cert)} if req.Bundle { if h.bundler == nil { return api.SendResponseWithMessage(w, result, NoBundlerMessage, errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode) } bundle, err := h.bundler.BundleFromPEMorDER(cert, nil, bundler.Optimal, "") if err != nil { return err } result["bundle"] = bundle } log.Info("wrote response") return api.SendResponse(w, result) }
go
func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) error { log.Info("signature request received") body, err := ioutil.ReadAll(r.Body) if err != nil { return err } r.Body.Close() var req jsonSignRequest err = json.Unmarshal(body, &req) if err != nil { return errors.NewBadRequestString("Unable to parse sign request") } signReq := jsonReqToTrue(req) if req.Request == "" { return errors.NewBadRequestString("missing parameter 'certificate_request'") } var cert []byte profile, err := signer.Profile(h.signer, req.Profile) if err != nil { return err } if profile.Provider != nil { log.Error("profile requires authentication") return errors.NewBadRequestString("authentication required") } cert, err = h.signer.Sign(signReq) if err != nil { log.Warningf("failed to sign request: %v", err) return err } result := map[string]interface{}{"certificate": string(cert)} if req.Bundle { if h.bundler == nil { return api.SendResponseWithMessage(w, result, NoBundlerMessage, errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode) } bundle, err := h.bundler.BundleFromPEMorDER(cert, nil, bundler.Optimal, "") if err != nil { return err } result["bundle"] = bundle } log.Info("wrote response") return api.SendResponse(w, result) }
[ "func", "(", "h", "*", "Handler", ")", "Handle", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "error", "{", "log", ".", "Info", "(", "\"", "\"", ")", "\n\n", "body", ",", "err", ":=", "ioutil", ".", "ReadAll", "(", "r", ".", "Body", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "r", ".", "Body", ".", "Close", "(", ")", "\n\n", "var", "req", "jsonSignRequest", "\n\n", "err", "=", "json", ".", "Unmarshal", "(", "body", ",", "&", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "signReq", ":=", "jsonReqToTrue", "(", "req", ")", "\n\n", "if", "req", ".", "Request", "==", "\"", "\"", "{", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "var", "cert", "[", "]", "byte", "\n", "profile", ",", "err", ":=", "signer", ".", "Profile", "(", "h", ".", "signer", ",", "req", ".", "Profile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "profile", ".", "Provider", "!=", "nil", "{", "log", ".", "Error", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cert", ",", "err", "=", "h", ".", "signer", ".", "Sign", "(", "signReq", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n\n", "result", ":=", "map", "[", "string", "]", "interface", "{", "}", "{", "\"", "\"", ":", "string", "(", "cert", ")", "}", "\n", "if", "req", ".", "Bundle", "{", "if", "h", ".", "bundler", "==", "nil", "{", "return", "api", ".", "SendResponseWithMessage", "(", "w", ",", "result", ",", "NoBundlerMessage", ",", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidRequest", ")", ".", "ErrorCode", ")", "\n", "}", "\n\n", "bundle", ",", "err", ":=", "h", ".", "bundler", ".", "BundleFromPEMorDER", "(", "cert", ",", "nil", ",", "bundler", ".", "Optimal", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "result", "[", "\"", "\"", "]", "=", "bundle", "\n", "}", "\n", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "return", "api", ".", "SendResponse", "(", "w", ",", "result", ")", "\n", "}" ]
// Handle responds to requests for the CA to sign the certificate request // present in the "certificate_request" parameter for the host named // in the "hostname" parameter. The certificate should be PEM-encoded. If // provided, subject information from the "subject" parameter will be used // in place of the subject information from the CSR.
[ "Handle", "responds", "to", "requests", "for", "the", "CA", "to", "sign", "the", "certificate", "request", "present", "in", "the", "certificate_request", "parameter", "for", "the", "host", "named", "in", "the", "hostname", "parameter", ".", "The", "certificate", "should", "be", "PEM", "-", "encoded", ".", "If", "provided", "subject", "information", "from", "the", "subject", "parameter", "will", "be", "used", "in", "place", "of", "the", "subject", "information", "from", "the", "CSR", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/signhandler/signhandler.go#L114-L169
train
cloudflare/cfssl
api/signhandler/signhandler.go
NewAuthHandlerFromSigner
func NewAuthHandlerFromSigner(signer signer.Signer) (http.Handler, error) { policy := signer.Policy() if policy == nil { return nil, errors.New(errors.PolicyError, errors.InvalidPolicy) } if policy.Default == nil && policy.Profiles == nil { return nil, errors.New(errors.PolicyError, errors.InvalidPolicy) } // AuthSign will not respond for profiles that have no auth provider. // So if there are no profiles with auth providers in this policy, // we return an error. haveAuth := (policy.Default.Provider != nil) for _, profile := range policy.Profiles { if haveAuth { break } haveAuth = (profile.Provider != nil) } if !haveAuth { return nil, errors.New(errors.PolicyError, errors.InvalidPolicy) } return &api.HTTPHandler{ Handler: &AuthHandler{ signer: signer, }, Methods: []string{"POST"}, }, nil }
go
func NewAuthHandlerFromSigner(signer signer.Signer) (http.Handler, error) { policy := signer.Policy() if policy == nil { return nil, errors.New(errors.PolicyError, errors.InvalidPolicy) } if policy.Default == nil && policy.Profiles == nil { return nil, errors.New(errors.PolicyError, errors.InvalidPolicy) } // AuthSign will not respond for profiles that have no auth provider. // So if there are no profiles with auth providers in this policy, // we return an error. haveAuth := (policy.Default.Provider != nil) for _, profile := range policy.Profiles { if haveAuth { break } haveAuth = (profile.Provider != nil) } if !haveAuth { return nil, errors.New(errors.PolicyError, errors.InvalidPolicy) } return &api.HTTPHandler{ Handler: &AuthHandler{ signer: signer, }, Methods: []string{"POST"}, }, nil }
[ "func", "NewAuthHandlerFromSigner", "(", "signer", "signer", ".", "Signer", ")", "(", "http", ".", "Handler", ",", "error", ")", "{", "policy", ":=", "signer", ".", "Policy", "(", ")", "\n", "if", "policy", "==", "nil", "{", "return", "nil", ",", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidPolicy", ")", "\n", "}", "\n\n", "if", "policy", ".", "Default", "==", "nil", "&&", "policy", ".", "Profiles", "==", "nil", "{", "return", "nil", ",", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidPolicy", ")", "\n", "}", "\n\n", "// AuthSign will not respond for profiles that have no auth provider.", "// So if there are no profiles with auth providers in this policy,", "// we return an error.", "haveAuth", ":=", "(", "policy", ".", "Default", ".", "Provider", "!=", "nil", ")", "\n", "for", "_", ",", "profile", ":=", "range", "policy", ".", "Profiles", "{", "if", "haveAuth", "{", "break", "\n", "}", "\n", "haveAuth", "=", "(", "profile", ".", "Provider", "!=", "nil", ")", "\n", "}", "\n\n", "if", "!", "haveAuth", "{", "return", "nil", ",", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidPolicy", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "HTTPHandler", "{", "Handler", ":", "&", "AuthHandler", "{", "signer", ":", "signer", ",", "}", ",", "Methods", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "}", ",", "nil", "\n", "}" ]
// NewAuthHandlerFromSigner creates a new AuthHandler from the signer // that is passed in.
[ "NewAuthHandlerFromSigner", "creates", "a", "new", "AuthHandler", "from", "the", "signer", "that", "is", "passed", "in", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/signhandler/signhandler.go#L179-L210
train
cloudflare/cfssl
api/signhandler/signhandler.go
SetBundler
func (h *AuthHandler) SetBundler(caBundleFile, intBundleFile string) (err error) { h.bundler, err = bundler.NewBundler(caBundleFile, intBundleFile) return err }
go
func (h *AuthHandler) SetBundler(caBundleFile, intBundleFile string) (err error) { h.bundler, err = bundler.NewBundler(caBundleFile, intBundleFile) return err }
[ "func", "(", "h", "*", "AuthHandler", ")", "SetBundler", "(", "caBundleFile", ",", "intBundleFile", "string", ")", "(", "err", "error", ")", "{", "h", ".", "bundler", ",", "err", "=", "bundler", ".", "NewBundler", "(", "caBundleFile", ",", "intBundleFile", ")", "\n", "return", "err", "\n", "}" ]
// SetBundler allows injecting an optional Bundler into the Handler.
[ "SetBundler", "allows", "injecting", "an", "optional", "Bundler", "into", "the", "Handler", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/signhandler/signhandler.go#L213-L216
train
cloudflare/cfssl
api/signhandler/signhandler.go
Handle
func (h *AuthHandler) Handle(w http.ResponseWriter, r *http.Request) error { log.Info("signature request received") body, err := ioutil.ReadAll(r.Body) if err != nil { log.Errorf("failed to read response body: %v", err) return err } r.Body.Close() var aReq auth.AuthenticatedRequest err = json.Unmarshal(body, &aReq) if err != nil { log.Errorf("failed to unmarshal authenticated request: %v", err) return errors.NewBadRequest(err) } var req jsonSignRequest err = json.Unmarshal(aReq.Request, &req) if err != nil { log.Errorf("failed to unmarshal request from authenticated request: %v", err) return errors.NewBadRequestString("Unable to parse authenticated sign request") } // Sanity checks to ensure that we have a valid policy. This // should have been checked in NewAuthHandler. policy := h.signer.Policy() if policy == nil { log.Critical("signer was initialised without a signing policy") return errors.NewBadRequestString("invalid policy") } profile, err := signer.Profile(h.signer, req.Profile) if err != nil { return err } if profile.Provider == nil { log.Error("profile has no authentication provider") return errors.NewBadRequestString("no authentication provider") } if !profile.Provider.Verify(&aReq) { log.Warning("received authenticated request with invalid token") return errors.NewBadRequestString("invalid token") } signReq := jsonReqToTrue(req) if signReq.Request == "" { return errors.NewBadRequestString("missing parameter 'certificate_request'") } cert, err := h.signer.Sign(signReq) if err != nil { log.Errorf("signature failed: %v", err) return err } result := map[string]interface{}{"certificate": string(cert)} if req.Bundle { if h.bundler == nil { return api.SendResponseWithMessage(w, result, NoBundlerMessage, errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode) } bundle, err := h.bundler.BundleFromPEMorDER(cert, nil, bundler.Optimal, "") if err != nil { return err } result["bundle"] = bundle } log.Info("wrote response") return api.SendResponse(w, result) }
go
func (h *AuthHandler) Handle(w http.ResponseWriter, r *http.Request) error { log.Info("signature request received") body, err := ioutil.ReadAll(r.Body) if err != nil { log.Errorf("failed to read response body: %v", err) return err } r.Body.Close() var aReq auth.AuthenticatedRequest err = json.Unmarshal(body, &aReq) if err != nil { log.Errorf("failed to unmarshal authenticated request: %v", err) return errors.NewBadRequest(err) } var req jsonSignRequest err = json.Unmarshal(aReq.Request, &req) if err != nil { log.Errorf("failed to unmarshal request from authenticated request: %v", err) return errors.NewBadRequestString("Unable to parse authenticated sign request") } // Sanity checks to ensure that we have a valid policy. This // should have been checked in NewAuthHandler. policy := h.signer.Policy() if policy == nil { log.Critical("signer was initialised without a signing policy") return errors.NewBadRequestString("invalid policy") } profile, err := signer.Profile(h.signer, req.Profile) if err != nil { return err } if profile.Provider == nil { log.Error("profile has no authentication provider") return errors.NewBadRequestString("no authentication provider") } if !profile.Provider.Verify(&aReq) { log.Warning("received authenticated request with invalid token") return errors.NewBadRequestString("invalid token") } signReq := jsonReqToTrue(req) if signReq.Request == "" { return errors.NewBadRequestString("missing parameter 'certificate_request'") } cert, err := h.signer.Sign(signReq) if err != nil { log.Errorf("signature failed: %v", err) return err } result := map[string]interface{}{"certificate": string(cert)} if req.Bundle { if h.bundler == nil { return api.SendResponseWithMessage(w, result, NoBundlerMessage, errors.New(errors.PolicyError, errors.InvalidRequest).ErrorCode) } bundle, err := h.bundler.BundleFromPEMorDER(cert, nil, bundler.Optimal, "") if err != nil { return err } result["bundle"] = bundle } log.Info("wrote response") return api.SendResponse(w, result) }
[ "func", "(", "h", "*", "AuthHandler", ")", "Handle", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "error", "{", "log", ".", "Info", "(", "\"", "\"", ")", "\n\n", "body", ",", "err", ":=", "ioutil", ".", "ReadAll", "(", "r", ".", "Body", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n", "r", ".", "Body", ".", "Close", "(", ")", "\n\n", "var", "aReq", "auth", ".", "AuthenticatedRequest", "\n", "err", "=", "json", ".", "Unmarshal", "(", "body", ",", "&", "aReq", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "errors", ".", "NewBadRequest", "(", "err", ")", "\n", "}", "\n\n", "var", "req", "jsonSignRequest", "\n", "err", "=", "json", ".", "Unmarshal", "(", "aReq", ".", "Request", ",", "&", "req", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// Sanity checks to ensure that we have a valid policy. This", "// should have been checked in NewAuthHandler.", "policy", ":=", "h", ".", "signer", ".", "Policy", "(", ")", "\n", "if", "policy", "==", "nil", "{", "log", ".", "Critical", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "profile", ",", "err", ":=", "signer", ".", "Profile", "(", "h", ".", "signer", ",", "req", ".", "Profile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "profile", ".", "Provider", "==", "nil", "{", "log", ".", "Error", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "!", "profile", ".", "Provider", ".", "Verify", "(", "&", "aReq", ")", "{", "log", ".", "Warning", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "signReq", ":=", "jsonReqToTrue", "(", "req", ")", "\n\n", "if", "signReq", ".", "Request", "==", "\"", "\"", "{", "return", "errors", ".", "NewBadRequestString", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cert", ",", "err", ":=", "h", ".", "signer", ".", "Sign", "(", "signReq", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n\n", "result", ":=", "map", "[", "string", "]", "interface", "{", "}", "{", "\"", "\"", ":", "string", "(", "cert", ")", "}", "\n", "if", "req", ".", "Bundle", "{", "if", "h", ".", "bundler", "==", "nil", "{", "return", "api", ".", "SendResponseWithMessage", "(", "w", ",", "result", ",", "NoBundlerMessage", ",", "errors", ".", "New", "(", "errors", ".", "PolicyError", ",", "errors", ".", "InvalidRequest", ")", ".", "ErrorCode", ")", "\n", "}", "\n\n", "bundle", ",", "err", ":=", "h", ".", "bundler", ".", "BundleFromPEMorDER", "(", "cert", ",", "nil", ",", "bundler", ".", "Optimal", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "result", "[", "\"", "\"", "]", "=", "bundle", "\n", "}", "\n", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "return", "api", ".", "SendResponse", "(", "w", ",", "result", ")", "\n", "}" ]
// Handle receives the incoming request, validates it, and processes it.
[ "Handle", "receives", "the", "incoming", "request", "validates", "it", "and", "processes", "it", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/signhandler/signhandler.go#L219-L294
train
cloudflare/cfssl
crypto/pkcs7/pkcs7.go
ParsePKCS7
func ParsePKCS7(raw []byte) (msg *PKCS7, err error) { var pkcs7 initPKCS7 _, err = asn1.Unmarshal(raw, &pkcs7) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } msg = new(PKCS7) msg.Raw = pkcs7.Raw msg.ContentInfo = pkcs7.ContentType.String() switch { case msg.ContentInfo == ObjIDData: msg.ContentInfo = "Data" _, err = asn1.Unmarshal(pkcs7.Content.Bytes, &msg.Content.Data) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } case msg.ContentInfo == ObjIDSignedData: msg.ContentInfo = "SignedData" var signedData signedData _, err = asn1.Unmarshal(pkcs7.Content.Bytes, &signedData) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } if len(signedData.Certificates.Bytes) != 0 { msg.Content.SignedData.Certificates, err = x509.ParseCertificates(signedData.Certificates.Bytes) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } } if len(signedData.Crls.Bytes) != 0 { msg.Content.SignedData.Crl, err = x509.ParseDERCRL(signedData.Crls.Bytes) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } } msg.Content.SignedData.Version = signedData.Version msg.Content.SignedData.Raw = pkcs7.Content.Bytes case msg.ContentInfo == ObjIDEncryptedData: msg.ContentInfo = "EncryptedData" var encryptedData EncryptedData _, err = asn1.Unmarshal(pkcs7.Content.Bytes, &encryptedData) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } if encryptedData.Version != 0 { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, errors.New("Only support for PKCS #7 encryptedData version 0")) } msg.Content.EncryptedData = encryptedData default: return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, errors.New("Attempt to parse PKCS# 7 Content not of type data, signed data or encrypted data")) } return msg, nil }
go
func ParsePKCS7(raw []byte) (msg *PKCS7, err error) { var pkcs7 initPKCS7 _, err = asn1.Unmarshal(raw, &pkcs7) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } msg = new(PKCS7) msg.Raw = pkcs7.Raw msg.ContentInfo = pkcs7.ContentType.String() switch { case msg.ContentInfo == ObjIDData: msg.ContentInfo = "Data" _, err = asn1.Unmarshal(pkcs7.Content.Bytes, &msg.Content.Data) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } case msg.ContentInfo == ObjIDSignedData: msg.ContentInfo = "SignedData" var signedData signedData _, err = asn1.Unmarshal(pkcs7.Content.Bytes, &signedData) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } if len(signedData.Certificates.Bytes) != 0 { msg.Content.SignedData.Certificates, err = x509.ParseCertificates(signedData.Certificates.Bytes) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } } if len(signedData.Crls.Bytes) != 0 { msg.Content.SignedData.Crl, err = x509.ParseDERCRL(signedData.Crls.Bytes) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } } msg.Content.SignedData.Version = signedData.Version msg.Content.SignedData.Raw = pkcs7.Content.Bytes case msg.ContentInfo == ObjIDEncryptedData: msg.ContentInfo = "EncryptedData" var encryptedData EncryptedData _, err = asn1.Unmarshal(pkcs7.Content.Bytes, &encryptedData) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, err) } if encryptedData.Version != 0 { return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, errors.New("Only support for PKCS #7 encryptedData version 0")) } msg.Content.EncryptedData = encryptedData default: return nil, cferr.Wrap(cferr.CertificateError, cferr.ParseFailed, errors.New("Attempt to parse PKCS# 7 Content not of type data, signed data or encrypted data")) } return msg, nil }
[ "func", "ParsePKCS7", "(", "raw", "[", "]", "byte", ")", "(", "msg", "*", "PKCS7", ",", "err", "error", ")", "{", "var", "pkcs7", "initPKCS7", "\n", "_", ",", "err", "=", "asn1", ".", "Unmarshal", "(", "raw", ",", "&", "pkcs7", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "}", "\n\n", "msg", "=", "new", "(", "PKCS7", ")", "\n", "msg", ".", "Raw", "=", "pkcs7", ".", "Raw", "\n", "msg", ".", "ContentInfo", "=", "pkcs7", ".", "ContentType", ".", "String", "(", ")", "\n", "switch", "{", "case", "msg", ".", "ContentInfo", "==", "ObjIDData", ":", "msg", ".", "ContentInfo", "=", "\"", "\"", "\n", "_", ",", "err", "=", "asn1", ".", "Unmarshal", "(", "pkcs7", ".", "Content", ".", "Bytes", ",", "&", "msg", ".", "Content", ".", "Data", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "}", "\n", "case", "msg", ".", "ContentInfo", "==", "ObjIDSignedData", ":", "msg", ".", "ContentInfo", "=", "\"", "\"", "\n", "var", "signedData", "signedData", "\n", "_", ",", "err", "=", "asn1", ".", "Unmarshal", "(", "pkcs7", ".", "Content", ".", "Bytes", ",", "&", "signedData", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "}", "\n", "if", "len", "(", "signedData", ".", "Certificates", ".", "Bytes", ")", "!=", "0", "{", "msg", ".", "Content", ".", "SignedData", ".", "Certificates", ",", "err", "=", "x509", ".", "ParseCertificates", "(", "signedData", ".", "Certificates", ".", "Bytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "}", "\n", "}", "\n", "if", "len", "(", "signedData", ".", "Crls", ".", "Bytes", ")", "!=", "0", "{", "msg", ".", "Content", ".", "SignedData", ".", "Crl", ",", "err", "=", "x509", ".", "ParseDERCRL", "(", "signedData", ".", "Crls", ".", "Bytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "}", "\n", "}", "\n", "msg", ".", "Content", ".", "SignedData", ".", "Version", "=", "signedData", ".", "Version", "\n", "msg", ".", "Content", ".", "SignedData", ".", "Raw", "=", "pkcs7", ".", "Content", ".", "Bytes", "\n", "case", "msg", ".", "ContentInfo", "==", "ObjIDEncryptedData", ":", "msg", ".", "ContentInfo", "=", "\"", "\"", "\n", "var", "encryptedData", "EncryptedData", "\n", "_", ",", "err", "=", "asn1", ".", "Unmarshal", "(", "pkcs7", ".", "Content", ".", "Bytes", ",", "&", "encryptedData", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "}", "\n", "if", "encryptedData", ".", "Version", "!=", "0", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "errors", ".", "New", "(", "\"", "\"", ")", ")", "\n", "}", "\n", "msg", ".", "Content", ".", "EncryptedData", "=", "encryptedData", "\n\n", "default", ":", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ParseFailed", ",", "errors", ".", "New", "(", "\"", "\"", ")", ")", "\n", "}", "\n\n", "return", "msg", ",", "nil", "\n\n", "}" ]
// ParsePKCS7 attempts to parse the DER encoded bytes of a // PKCS7 structure.
[ "ParsePKCS7", "attempts", "to", "parse", "the", "DER", "encoded", "bytes", "of", "a", "PKCS7", "structure", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/crypto/pkcs7/pkcs7.go#L131-L188
train
cloudflare/cfssl
signer/local/local.go
NewSigner
func NewSigner(priv crypto.Signer, cert *x509.Certificate, sigAlgo x509.SignatureAlgorithm, policy *config.Signing) (*Signer, error) { if policy == nil { policy = &config.Signing{ Profiles: map[string]*config.SigningProfile{}, Default: config.DefaultConfig()} } if !policy.Valid() { return nil, cferr.New(cferr.PolicyError, cferr.InvalidPolicy) } return &Signer{ ca: cert, priv: priv, sigAlgo: sigAlgo, policy: policy, }, nil }
go
func NewSigner(priv crypto.Signer, cert *x509.Certificate, sigAlgo x509.SignatureAlgorithm, policy *config.Signing) (*Signer, error) { if policy == nil { policy = &config.Signing{ Profiles: map[string]*config.SigningProfile{}, Default: config.DefaultConfig()} } if !policy.Valid() { return nil, cferr.New(cferr.PolicyError, cferr.InvalidPolicy) } return &Signer{ ca: cert, priv: priv, sigAlgo: sigAlgo, policy: policy, }, nil }
[ "func", "NewSigner", "(", "priv", "crypto", ".", "Signer", ",", "cert", "*", "x509", ".", "Certificate", ",", "sigAlgo", "x509", ".", "SignatureAlgorithm", ",", "policy", "*", "config", ".", "Signing", ")", "(", "*", "Signer", ",", "error", ")", "{", "if", "policy", "==", "nil", "{", "policy", "=", "&", "config", ".", "Signing", "{", "Profiles", ":", "map", "[", "string", "]", "*", "config", ".", "SigningProfile", "{", "}", ",", "Default", ":", "config", ".", "DefaultConfig", "(", ")", "}", "\n", "}", "\n\n", "if", "!", "policy", ".", "Valid", "(", ")", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "PolicyError", ",", "cferr", ".", "InvalidPolicy", ")", "\n", "}", "\n\n", "return", "&", "Signer", "{", "ca", ":", "cert", ",", "priv", ":", "priv", ",", "sigAlgo", ":", "sigAlgo", ",", "policy", ":", "policy", ",", "}", ",", "nil", "\n", "}" ]
// NewSigner creates a new Signer directly from a // private key and certificate, with optional policy.
[ "NewSigner", "creates", "a", "new", "Signer", "directly", "from", "a", "private", "key", "and", "certificate", "with", "optional", "policy", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L47-L64
train
cloudflare/cfssl
signer/local/local.go
NewSignerFromFile
func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { log.Debug("Loading CA: ", caFile) ca, err := helpers.ReadBytes(caFile) if err != nil { return nil, err } log.Debug("Loading CA key: ", caKeyFile) cakey, err := helpers.ReadBytes(caKeyFile) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ReadFailed, err) } parsedCa, err := helpers.ParseCertificatePEM(ca) if err != nil { return nil, err } strPassword := os.Getenv("CFSSL_CA_PK_PASSWORD") password := []byte(strPassword) if strPassword == "" { password = nil } priv, err := helpers.ParsePrivateKeyPEMWithPassword(cakey, password) if err != nil { log.Debug("Malformed private key %v", err) return nil, err } return NewSigner(priv, parsedCa, signer.DefaultSigAlgo(priv), policy) }
go
func NewSignerFromFile(caFile, caKeyFile string, policy *config.Signing) (*Signer, error) { log.Debug("Loading CA: ", caFile) ca, err := helpers.ReadBytes(caFile) if err != nil { return nil, err } log.Debug("Loading CA key: ", caKeyFile) cakey, err := helpers.ReadBytes(caKeyFile) if err != nil { return nil, cferr.Wrap(cferr.CertificateError, cferr.ReadFailed, err) } parsedCa, err := helpers.ParseCertificatePEM(ca) if err != nil { return nil, err } strPassword := os.Getenv("CFSSL_CA_PK_PASSWORD") password := []byte(strPassword) if strPassword == "" { password = nil } priv, err := helpers.ParsePrivateKeyPEMWithPassword(cakey, password) if err != nil { log.Debug("Malformed private key %v", err) return nil, err } return NewSigner(priv, parsedCa, signer.DefaultSigAlgo(priv), policy) }
[ "func", "NewSignerFromFile", "(", "caFile", ",", "caKeyFile", "string", ",", "policy", "*", "config", ".", "Signing", ")", "(", "*", "Signer", ",", "error", ")", "{", "log", ".", "Debug", "(", "\"", "\"", ",", "caFile", ")", "\n", "ca", ",", "err", ":=", "helpers", ".", "ReadBytes", "(", "caFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "log", ".", "Debug", "(", "\"", "\"", ",", "caKeyFile", ")", "\n", "cakey", ",", "err", ":=", "helpers", ".", "ReadBytes", "(", "caKeyFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CertificateError", ",", "cferr", ".", "ReadFailed", ",", "err", ")", "\n", "}", "\n\n", "parsedCa", ",", "err", ":=", "helpers", ".", "ParseCertificatePEM", "(", "ca", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "strPassword", ":=", "os", ".", "Getenv", "(", "\"", "\"", ")", "\n", "password", ":=", "[", "]", "byte", "(", "strPassword", ")", "\n", "if", "strPassword", "==", "\"", "\"", "{", "password", "=", "nil", "\n", "}", "\n\n", "priv", ",", "err", ":=", "helpers", ".", "ParsePrivateKeyPEMWithPassword", "(", "cakey", ",", "password", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Debug", "(", "\"", "\"", ",", "err", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "NewSigner", "(", "priv", ",", "parsedCa", ",", "signer", ".", "DefaultSigAlgo", "(", "priv", ")", ",", "policy", ")", "\n", "}" ]
// NewSignerFromFile generates a new local signer from a caFile // and a caKey file, both PEM encoded.
[ "NewSignerFromFile", "generates", "a", "new", "local", "signer", "from", "a", "caFile", "and", "a", "caKey", "file", "both", "PEM", "encoded", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L68-L98
train
cloudflare/cfssl
signer/local/local.go
PopulateSubjectFromCSR
func PopulateSubjectFromCSR(s *signer.Subject, req pkix.Name) pkix.Name { // if no subject, use req if s == nil { return req } name := s.Name() if name.CommonName == "" { name.CommonName = req.CommonName } replaceSliceIfEmpty(&name.Country, &req.Country) replaceSliceIfEmpty(&name.Province, &req.Province) replaceSliceIfEmpty(&name.Locality, &req.Locality) replaceSliceIfEmpty(&name.Organization, &req.Organization) replaceSliceIfEmpty(&name.OrganizationalUnit, &req.OrganizationalUnit) if name.SerialNumber == "" { name.SerialNumber = req.SerialNumber } return name }
go
func PopulateSubjectFromCSR(s *signer.Subject, req pkix.Name) pkix.Name { // if no subject, use req if s == nil { return req } name := s.Name() if name.CommonName == "" { name.CommonName = req.CommonName } replaceSliceIfEmpty(&name.Country, &req.Country) replaceSliceIfEmpty(&name.Province, &req.Province) replaceSliceIfEmpty(&name.Locality, &req.Locality) replaceSliceIfEmpty(&name.Organization, &req.Organization) replaceSliceIfEmpty(&name.OrganizationalUnit, &req.OrganizationalUnit) if name.SerialNumber == "" { name.SerialNumber = req.SerialNumber } return name }
[ "func", "PopulateSubjectFromCSR", "(", "s", "*", "signer", ".", "Subject", ",", "req", "pkix", ".", "Name", ")", "pkix", ".", "Name", "{", "// if no subject, use req", "if", "s", "==", "nil", "{", "return", "req", "\n", "}", "\n\n", "name", ":=", "s", ".", "Name", "(", ")", "\n\n", "if", "name", ".", "CommonName", "==", "\"", "\"", "{", "name", ".", "CommonName", "=", "req", ".", "CommonName", "\n", "}", "\n\n", "replaceSliceIfEmpty", "(", "&", "name", ".", "Country", ",", "&", "req", ".", "Country", ")", "\n", "replaceSliceIfEmpty", "(", "&", "name", ".", "Province", ",", "&", "req", ".", "Province", ")", "\n", "replaceSliceIfEmpty", "(", "&", "name", ".", "Locality", ",", "&", "req", ".", "Locality", ")", "\n", "replaceSliceIfEmpty", "(", "&", "name", ".", "Organization", ",", "&", "req", ".", "Organization", ")", "\n", "replaceSliceIfEmpty", "(", "&", "name", ".", "OrganizationalUnit", ",", "&", "req", ".", "OrganizationalUnit", ")", "\n", "if", "name", ".", "SerialNumber", "==", "\"", "\"", "{", "name", ".", "SerialNumber", "=", "req", ".", "SerialNumber", "\n", "}", "\n", "return", "name", "\n", "}" ]
// PopulateSubjectFromCSR has functionality similar to Name, except // it fills the fields of the resulting pkix.Name with req's if the // subject's corresponding fields are empty
[ "PopulateSubjectFromCSR", "has", "functionality", "similar", "to", "Name", "except", "it", "fills", "the", "fields", "of", "the", "resulting", "pkix", ".", "Name", "with", "req", "s", "if", "the", "subject", "s", "corresponding", "fields", "are", "empty" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L141-L162
train
cloudflare/cfssl
signer/local/local.go
OverrideHosts
func OverrideHosts(template *x509.Certificate, hosts []string) { if hosts != nil { template.IPAddresses = []net.IP{} template.EmailAddresses = []string{} template.DNSNames = []string{} template.URIs = []*url.URL{} } for i := range hosts { if ip := net.ParseIP(hosts[i]); ip != nil { template.IPAddresses = append(template.IPAddresses, ip) } else if email, err := mail.ParseAddress(hosts[i]); err == nil && email != nil { template.EmailAddresses = append(template.EmailAddresses, email.Address) } else if uri, err := url.ParseRequestURI(hosts[i]); err == nil && uri != nil { template.URIs = append(template.URIs, uri) } else { template.DNSNames = append(template.DNSNames, hosts[i]) } } }
go
func OverrideHosts(template *x509.Certificate, hosts []string) { if hosts != nil { template.IPAddresses = []net.IP{} template.EmailAddresses = []string{} template.DNSNames = []string{} template.URIs = []*url.URL{} } for i := range hosts { if ip := net.ParseIP(hosts[i]); ip != nil { template.IPAddresses = append(template.IPAddresses, ip) } else if email, err := mail.ParseAddress(hosts[i]); err == nil && email != nil { template.EmailAddresses = append(template.EmailAddresses, email.Address) } else if uri, err := url.ParseRequestURI(hosts[i]); err == nil && uri != nil { template.URIs = append(template.URIs, uri) } else { template.DNSNames = append(template.DNSNames, hosts[i]) } } }
[ "func", "OverrideHosts", "(", "template", "*", "x509", ".", "Certificate", ",", "hosts", "[", "]", "string", ")", "{", "if", "hosts", "!=", "nil", "{", "template", ".", "IPAddresses", "=", "[", "]", "net", ".", "IP", "{", "}", "\n", "template", ".", "EmailAddresses", "=", "[", "]", "string", "{", "}", "\n", "template", ".", "DNSNames", "=", "[", "]", "string", "{", "}", "\n", "template", ".", "URIs", "=", "[", "]", "*", "url", ".", "URL", "{", "}", "\n", "}", "\n\n", "for", "i", ":=", "range", "hosts", "{", "if", "ip", ":=", "net", ".", "ParseIP", "(", "hosts", "[", "i", "]", ")", ";", "ip", "!=", "nil", "{", "template", ".", "IPAddresses", "=", "append", "(", "template", ".", "IPAddresses", ",", "ip", ")", "\n", "}", "else", "if", "email", ",", "err", ":=", "mail", ".", "ParseAddress", "(", "hosts", "[", "i", "]", ")", ";", "err", "==", "nil", "&&", "email", "!=", "nil", "{", "template", ".", "EmailAddresses", "=", "append", "(", "template", ".", "EmailAddresses", ",", "email", ".", "Address", ")", "\n", "}", "else", "if", "uri", ",", "err", ":=", "url", ".", "ParseRequestURI", "(", "hosts", "[", "i", "]", ")", ";", "err", "==", "nil", "&&", "uri", "!=", "nil", "{", "template", ".", "URIs", "=", "append", "(", "template", ".", "URIs", ",", "uri", ")", "\n", "}", "else", "{", "template", ".", "DNSNames", "=", "append", "(", "template", ".", "DNSNames", ",", "hosts", "[", "i", "]", ")", "\n", "}", "\n", "}", "\n\n", "}" ]
// OverrideHosts fills template's IPAddresses, EmailAddresses, DNSNames, and URIs with the // content of hosts, if it is not nil.
[ "OverrideHosts", "fills", "template", "s", "IPAddresses", "EmailAddresses", "DNSNames", "and", "URIs", "with", "the", "content", "of", "hosts", "if", "it", "is", "not", "nil", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L166-L186
train
cloudflare/cfssl
signer/local/local.go
SignFromPrecert
func (s *Signer) SignFromPrecert(precert *x509.Certificate, scts []ct.SignedCertificateTimestamp) ([]byte, error) { // Verify certificate was signed by s.ca if err := precert.CheckSignatureFrom(s.ca); err != nil { return nil, err } // Verify certificate is a precert isPrecert := false poisonIndex := 0 for i, ext := range precert.Extensions { if ext.Id.Equal(signer.CTPoisonOID) { if !ext.Critical { return nil, cferr.New(cferr.CTError, cferr.PrecertInvalidPoison) } // Check extension contains ASN.1 NULL if bytes.Compare(ext.Value, []byte{0x05, 0x00}) != 0 { return nil, cferr.New(cferr.CTError, cferr.PrecertInvalidPoison) } isPrecert = true poisonIndex = i break } } if !isPrecert { return nil, cferr.New(cferr.CTError, cferr.PrecertMissingPoison) } // Serialize SCTs into list format and create extension serializedList, err := helpers.SerializeSCTList(scts) if err != nil { return nil, err } // Serialize again as an octet string before embedding serializedList, err = asn1.Marshal(serializedList) if err != nil { return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, err) } sctExt := pkix.Extension{Id: signer.SCTListOID, Critical: false, Value: serializedList} // Create the new tbsCert from precert. Do explicit copies of any slices so that we don't // use memory that may be altered by us or the caller at a later stage. tbsCert := x509.Certificate{ SignatureAlgorithm: precert.SignatureAlgorithm, PublicKeyAlgorithm: precert.PublicKeyAlgorithm, PublicKey: precert.PublicKey, Version: precert.Version, SerialNumber: precert.SerialNumber, Issuer: precert.Issuer, Subject: precert.Subject, NotBefore: precert.NotBefore, NotAfter: precert.NotAfter, KeyUsage: precert.KeyUsage, BasicConstraintsValid: precert.BasicConstraintsValid, IsCA: precert.IsCA, MaxPathLen: precert.MaxPathLen, MaxPathLenZero: precert.MaxPathLenZero, PermittedDNSDomainsCritical: precert.PermittedDNSDomainsCritical, } if len(precert.Extensions) > 0 { tbsCert.ExtraExtensions = make([]pkix.Extension, len(precert.Extensions)) copy(tbsCert.ExtraExtensions, precert.Extensions) } // Remove the poison extension from ExtraExtensions tbsCert.ExtraExtensions = append(tbsCert.ExtraExtensions[:poisonIndex], tbsCert.ExtraExtensions[poisonIndex+1:]...) // Insert the SCT list extension tbsCert.ExtraExtensions = append(tbsCert.ExtraExtensions, sctExt) // Sign the tbsCert return s.sign(&tbsCert) }
go
func (s *Signer) SignFromPrecert(precert *x509.Certificate, scts []ct.SignedCertificateTimestamp) ([]byte, error) { // Verify certificate was signed by s.ca if err := precert.CheckSignatureFrom(s.ca); err != nil { return nil, err } // Verify certificate is a precert isPrecert := false poisonIndex := 0 for i, ext := range precert.Extensions { if ext.Id.Equal(signer.CTPoisonOID) { if !ext.Critical { return nil, cferr.New(cferr.CTError, cferr.PrecertInvalidPoison) } // Check extension contains ASN.1 NULL if bytes.Compare(ext.Value, []byte{0x05, 0x00}) != 0 { return nil, cferr.New(cferr.CTError, cferr.PrecertInvalidPoison) } isPrecert = true poisonIndex = i break } } if !isPrecert { return nil, cferr.New(cferr.CTError, cferr.PrecertMissingPoison) } // Serialize SCTs into list format and create extension serializedList, err := helpers.SerializeSCTList(scts) if err != nil { return nil, err } // Serialize again as an octet string before embedding serializedList, err = asn1.Marshal(serializedList) if err != nil { return nil, cferr.Wrap(cferr.CTError, cferr.Unknown, err) } sctExt := pkix.Extension{Id: signer.SCTListOID, Critical: false, Value: serializedList} // Create the new tbsCert from precert. Do explicit copies of any slices so that we don't // use memory that may be altered by us or the caller at a later stage. tbsCert := x509.Certificate{ SignatureAlgorithm: precert.SignatureAlgorithm, PublicKeyAlgorithm: precert.PublicKeyAlgorithm, PublicKey: precert.PublicKey, Version: precert.Version, SerialNumber: precert.SerialNumber, Issuer: precert.Issuer, Subject: precert.Subject, NotBefore: precert.NotBefore, NotAfter: precert.NotAfter, KeyUsage: precert.KeyUsage, BasicConstraintsValid: precert.BasicConstraintsValid, IsCA: precert.IsCA, MaxPathLen: precert.MaxPathLen, MaxPathLenZero: precert.MaxPathLenZero, PermittedDNSDomainsCritical: precert.PermittedDNSDomainsCritical, } if len(precert.Extensions) > 0 { tbsCert.ExtraExtensions = make([]pkix.Extension, len(precert.Extensions)) copy(tbsCert.ExtraExtensions, precert.Extensions) } // Remove the poison extension from ExtraExtensions tbsCert.ExtraExtensions = append(tbsCert.ExtraExtensions[:poisonIndex], tbsCert.ExtraExtensions[poisonIndex+1:]...) // Insert the SCT list extension tbsCert.ExtraExtensions = append(tbsCert.ExtraExtensions, sctExt) // Sign the tbsCert return s.sign(&tbsCert) }
[ "func", "(", "s", "*", "Signer", ")", "SignFromPrecert", "(", "precert", "*", "x509", ".", "Certificate", ",", "scts", "[", "]", "ct", ".", "SignedCertificateTimestamp", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "// Verify certificate was signed by s.ca", "if", "err", ":=", "precert", ".", "CheckSignatureFrom", "(", "s", ".", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Verify certificate is a precert", "isPrecert", ":=", "false", "\n", "poisonIndex", ":=", "0", "\n", "for", "i", ",", "ext", ":=", "range", "precert", ".", "Extensions", "{", "if", "ext", ".", "Id", ".", "Equal", "(", "signer", ".", "CTPoisonOID", ")", "{", "if", "!", "ext", ".", "Critical", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "CTError", ",", "cferr", ".", "PrecertInvalidPoison", ")", "\n", "}", "\n", "// Check extension contains ASN.1 NULL", "if", "bytes", ".", "Compare", "(", "ext", ".", "Value", ",", "[", "]", "byte", "{", "0x05", ",", "0x00", "}", ")", "!=", "0", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "CTError", ",", "cferr", ".", "PrecertInvalidPoison", ")", "\n", "}", "\n", "isPrecert", "=", "true", "\n", "poisonIndex", "=", "i", "\n", "break", "\n", "}", "\n", "}", "\n", "if", "!", "isPrecert", "{", "return", "nil", ",", "cferr", ".", "New", "(", "cferr", ".", "CTError", ",", "cferr", ".", "PrecertMissingPoison", ")", "\n", "}", "\n\n", "// Serialize SCTs into list format and create extension", "serializedList", ",", "err", ":=", "helpers", ".", "SerializeSCTList", "(", "scts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "// Serialize again as an octet string before embedding", "serializedList", ",", "err", "=", "asn1", ".", "Marshal", "(", "serializedList", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "cferr", ".", "Wrap", "(", "cferr", ".", "CTError", ",", "cferr", ".", "Unknown", ",", "err", ")", "\n", "}", "\n", "sctExt", ":=", "pkix", ".", "Extension", "{", "Id", ":", "signer", ".", "SCTListOID", ",", "Critical", ":", "false", ",", "Value", ":", "serializedList", "}", "\n\n", "// Create the new tbsCert from precert. Do explicit copies of any slices so that we don't", "// use memory that may be altered by us or the caller at a later stage.", "tbsCert", ":=", "x509", ".", "Certificate", "{", "SignatureAlgorithm", ":", "precert", ".", "SignatureAlgorithm", ",", "PublicKeyAlgorithm", ":", "precert", ".", "PublicKeyAlgorithm", ",", "PublicKey", ":", "precert", ".", "PublicKey", ",", "Version", ":", "precert", ".", "Version", ",", "SerialNumber", ":", "precert", ".", "SerialNumber", ",", "Issuer", ":", "precert", ".", "Issuer", ",", "Subject", ":", "precert", ".", "Subject", ",", "NotBefore", ":", "precert", ".", "NotBefore", ",", "NotAfter", ":", "precert", ".", "NotAfter", ",", "KeyUsage", ":", "precert", ".", "KeyUsage", ",", "BasicConstraintsValid", ":", "precert", ".", "BasicConstraintsValid", ",", "IsCA", ":", "precert", ".", "IsCA", ",", "MaxPathLen", ":", "precert", ".", "MaxPathLen", ",", "MaxPathLenZero", ":", "precert", ".", "MaxPathLenZero", ",", "PermittedDNSDomainsCritical", ":", "precert", ".", "PermittedDNSDomainsCritical", ",", "}", "\n", "if", "len", "(", "precert", ".", "Extensions", ")", ">", "0", "{", "tbsCert", ".", "ExtraExtensions", "=", "make", "(", "[", "]", "pkix", ".", "Extension", ",", "len", "(", "precert", ".", "Extensions", ")", ")", "\n", "copy", "(", "tbsCert", ".", "ExtraExtensions", ",", "precert", ".", "Extensions", ")", "\n", "}", "\n\n", "// Remove the poison extension from ExtraExtensions", "tbsCert", ".", "ExtraExtensions", "=", "append", "(", "tbsCert", ".", "ExtraExtensions", "[", ":", "poisonIndex", "]", ",", "tbsCert", ".", "ExtraExtensions", "[", "poisonIndex", "+", "1", ":", "]", "...", ")", "\n", "// Insert the SCT list extension", "tbsCert", ".", "ExtraExtensions", "=", "append", "(", "tbsCert", ".", "ExtraExtensions", ",", "sctExt", ")", "\n\n", "// Sign the tbsCert", "return", "s", ".", "sign", "(", "&", "tbsCert", ")", "\n", "}" ]
// SignFromPrecert creates and signs a certificate from an existing precertificate // that was previously signed by Signer.ca and inserts the provided SCTs into the // new certificate. The resulting certificate will be a exact copy of the precert // except for the removal of the poison extension and the addition of the SCT list // extension. SignFromPrecert does not verify that the contents of the certificate // still match the signing profile of the signer, it only requires that the precert // was previously signed by the Signers CA.
[ "SignFromPrecert", "creates", "and", "signs", "a", "certificate", "from", "an", "existing", "precertificate", "that", "was", "previously", "signed", "by", "Signer", ".", "ca", "and", "inserts", "the", "provided", "SCTs", "into", "the", "new", "certificate", ".", "The", "resulting", "certificate", "will", "be", "a", "exact", "copy", "of", "the", "precert", "except", "for", "the", "removal", "of", "the", "poison", "extension", "and", "the", "addition", "of", "the", "SCT", "list", "extension", ".", "SignFromPrecert", "does", "not", "verify", "that", "the", "contents", "of", "the", "certificate", "still", "match", "the", "signing", "profile", "of", "the", "signer", "it", "only", "requires", "that", "the", "precert", "was", "previously", "signed", "by", "the", "Signers", "CA", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L441-L511
train
cloudflare/cfssl
signer/local/local.go
Info
func (s *Signer) Info(req info.Req) (resp *info.Resp, err error) { cert, err := s.Certificate(req.Label, req.Profile) if err != nil { return } profile, err := signer.Profile(s, req.Profile) if err != nil { return } resp = new(info.Resp) if cert.Raw != nil { resp.Certificate = string(bytes.TrimSpace(pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: cert.Raw}))) } resp.Usage = profile.Usage resp.ExpiryString = profile.ExpiryString return }
go
func (s *Signer) Info(req info.Req) (resp *info.Resp, err error) { cert, err := s.Certificate(req.Label, req.Profile) if err != nil { return } profile, err := signer.Profile(s, req.Profile) if err != nil { return } resp = new(info.Resp) if cert.Raw != nil { resp.Certificate = string(bytes.TrimSpace(pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: cert.Raw}))) } resp.Usage = profile.Usage resp.ExpiryString = profile.ExpiryString return }
[ "func", "(", "s", "*", "Signer", ")", "Info", "(", "req", "info", ".", "Req", ")", "(", "resp", "*", "info", ".", "Resp", ",", "err", "error", ")", "{", "cert", ",", "err", ":=", "s", ".", "Certificate", "(", "req", ".", "Label", ",", "req", ".", "Profile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "profile", ",", "err", ":=", "signer", ".", "Profile", "(", "s", ",", "req", ".", "Profile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "resp", "=", "new", "(", "info", ".", "Resp", ")", "\n", "if", "cert", ".", "Raw", "!=", "nil", "{", "resp", ".", "Certificate", "=", "string", "(", "bytes", ".", "TrimSpace", "(", "pem", ".", "EncodeToMemory", "(", "&", "pem", ".", "Block", "{", "Type", ":", "\"", "\"", ",", "Bytes", ":", "cert", ".", "Raw", "}", ")", ")", ")", "\n", "}", "\n", "resp", ".", "Usage", "=", "profile", ".", "Usage", "\n", "resp", ".", "ExpiryString", "=", "profile", ".", "ExpiryString", "\n\n", "return", "\n", "}" ]
// Info return a populated info.Resp struct or an error.
[ "Info", "return", "a", "populated", "info", ".", "Resp", "struct", "or", "an", "error", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L514-L533
train
cloudflare/cfssl
signer/local/local.go
Certificate
func (s *Signer) Certificate(label, profile string) (*x509.Certificate, error) { cert := *s.ca return &cert, nil }
go
func (s *Signer) Certificate(label, profile string) (*x509.Certificate, error) { cert := *s.ca return &cert, nil }
[ "func", "(", "s", "*", "Signer", ")", "Certificate", "(", "label", ",", "profile", "string", ")", "(", "*", "x509", ".", "Certificate", ",", "error", ")", "{", "cert", ":=", "*", "s", ".", "ca", "\n", "return", "&", "cert", ",", "nil", "\n", "}" ]
// Certificate returns the signer's certificate.
[ "Certificate", "returns", "the", "signer", "s", "certificate", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/signer/local/local.go#L541-L544
train
cloudflare/cfssl
api/initca/initca.go
initialCAHandler
func initialCAHandler(w http.ResponseWriter, r *http.Request) error { log.Info("setting up initial CA handler") body, err := ioutil.ReadAll(r.Body) if err != nil { log.Warningf("failed to read request body: %v", err) return errors.NewBadRequest(err) } r.Body.Close() req := new(csr.CertificateRequest) req.KeyRequest = csr.NewBasicKeyRequest() err = json.Unmarshal(body, req) if err != nil { log.Warningf("failed to unmarshal request: %v", err) return errors.NewBadRequest(err) } cert, _, key, err := initca.New(req) if err != nil { log.Warningf("failed to initialise new CA: %v", err) return err } response := api.NewSuccessResponse(&NewCA{string(key), string(cert)}) enc := json.NewEncoder(w) err = enc.Encode(response) return err }
go
func initialCAHandler(w http.ResponseWriter, r *http.Request) error { log.Info("setting up initial CA handler") body, err := ioutil.ReadAll(r.Body) if err != nil { log.Warningf("failed to read request body: %v", err) return errors.NewBadRequest(err) } r.Body.Close() req := new(csr.CertificateRequest) req.KeyRequest = csr.NewBasicKeyRequest() err = json.Unmarshal(body, req) if err != nil { log.Warningf("failed to unmarshal request: %v", err) return errors.NewBadRequest(err) } cert, _, key, err := initca.New(req) if err != nil { log.Warningf("failed to initialise new CA: %v", err) return err } response := api.NewSuccessResponse(&NewCA{string(key), string(cert)}) enc := json.NewEncoder(w) err = enc.Encode(response) return err }
[ "func", "initialCAHandler", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "error", "{", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "body", ",", "err", ":=", "ioutil", ".", "ReadAll", "(", "r", ".", "Body", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "errors", ".", "NewBadRequest", "(", "err", ")", "\n", "}", "\n", "r", ".", "Body", ".", "Close", "(", ")", "\n\n", "req", ":=", "new", "(", "csr", ".", "CertificateRequest", ")", "\n", "req", ".", "KeyRequest", "=", "csr", ".", "NewBasicKeyRequest", "(", ")", "\n", "err", "=", "json", ".", "Unmarshal", "(", "body", ",", "req", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "errors", ".", "NewBadRequest", "(", "err", ")", "\n", "}", "\n\n", "cert", ",", "_", ",", "key", ",", "err", ":=", "initca", ".", "New", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n\n", "response", ":=", "api", ".", "NewSuccessResponse", "(", "&", "NewCA", "{", "string", "(", "key", ")", ",", "string", "(", "cert", ")", "}", ")", "\n\n", "enc", ":=", "json", ".", "NewEncoder", "(", "w", ")", "\n", "err", "=", "enc", ".", "Encode", "(", "response", ")", "\n", "return", "err", "\n", "}" ]
// initialCAHandler is an HTTP handler that accepts a JSON blob in the // same format as the CSR endpoint; this blob should contain the // identity information for the CA's root key. This endpoint is not // suitable for creating intermediate certificates.
[ "initialCAHandler", "is", "an", "HTTP", "handler", "that", "accepts", "a", "JSON", "blob", "in", "the", "same", "format", "as", "the", "CSR", "endpoint", ";", "this", "blob", "should", "contain", "the", "identity", "information", "for", "the", "CA", "s", "root", "key", ".", "This", "endpoint", "is", "not", "suitable", "for", "creating", "intermediate", "certificates", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/api/initca/initca.go#L27-L55
train
cloudflare/cfssl
transport/ca/cfssl_provider.go
newStandardProvider
func newStandardProvider(ak config.AuthKey, ad []byte) (auth.Provider, error) { return auth.New(ak.Key, ad) }
go
func newStandardProvider(ak config.AuthKey, ad []byte) (auth.Provider, error) { return auth.New(ak.Key, ad) }
[ "func", "newStandardProvider", "(", "ak", "config", ".", "AuthKey", ",", "ad", "[", "]", "byte", ")", "(", "auth", ".", "Provider", ",", "error", ")", "{", "return", "auth", ".", "New", "(", "ak", ".", "Key", ",", "ad", ")", "\n", "}" ]
// Create a standard provider without providing any additional data.
[ "Create", "a", "standard", "provider", "without", "providing", "any", "additional", "data", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/cfssl_provider.go#L36-L38
train
cloudflare/cfssl
transport/ca/cfssl_provider.go
newProvider
func newProvider(ak config.AuthKey, ad []byte) (auth.Provider, error) { // If no auth key was provided, use unauthenticated // requests. This is useful when a local CFSSL is being used. if ak.Type == "" && ak.Key == "" { return nil, nil } f, ok := authTypes[ak.Type] if !ok { return nil, &authError{authType: ak.Type} } return f(ak, ad) }
go
func newProvider(ak config.AuthKey, ad []byte) (auth.Provider, error) { // If no auth key was provided, use unauthenticated // requests. This is useful when a local CFSSL is being used. if ak.Type == "" && ak.Key == "" { return nil, nil } f, ok := authTypes[ak.Type] if !ok { return nil, &authError{authType: ak.Type} } return f(ak, ad) }
[ "func", "newProvider", "(", "ak", "config", ".", "AuthKey", ",", "ad", "[", "]", "byte", ")", "(", "auth", ".", "Provider", ",", "error", ")", "{", "// If no auth key was provided, use unauthenticated", "// requests. This is useful when a local CFSSL is being used.", "if", "ak", ".", "Type", "==", "\"", "\"", "&&", "ak", ".", "Key", "==", "\"", "\"", "{", "return", "nil", ",", "nil", "\n", "}", "\n\n", "f", ",", "ok", ":=", "authTypes", "[", "ak", ".", "Type", "]", "\n", "if", "!", "ok", "{", "return", "nil", ",", "&", "authError", "{", "authType", ":", "ak", ".", "Type", "}", "\n", "}", "\n\n", "return", "f", "(", "ak", ",", "ad", ")", "\n", "}" ]
// Create a new provider from an authentication key and possibly // additional data.
[ "Create", "a", "new", "provider", "from", "an", "authentication", "key", "and", "possibly", "additional", "data", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/cfssl_provider.go#L42-L55
train
cloudflare/cfssl
transport/ca/cfssl_provider.go
validateAuth
func (cap *CFSSL) validateAuth() error { // The client is using some form of authentication, and the best way // to figure out that the auth is invalid is when it's used. Therefore, // we'll delay checking the credentials until that time. if cap.provider != nil { return nil } hosts := cap.remote.Hosts() for i := range hosts { ips, err := net.LookupIP(hosts[i]) if err != nil { return err } for _, ip := range ips { if !ipIsLocal(ip) { return ErrNoAuth } } } return nil }
go
func (cap *CFSSL) validateAuth() error { // The client is using some form of authentication, and the best way // to figure out that the auth is invalid is when it's used. Therefore, // we'll delay checking the credentials until that time. if cap.provider != nil { return nil } hosts := cap.remote.Hosts() for i := range hosts { ips, err := net.LookupIP(hosts[i]) if err != nil { return err } for _, ip := range ips { if !ipIsLocal(ip) { return ErrNoAuth } } } return nil }
[ "func", "(", "cap", "*", "CFSSL", ")", "validateAuth", "(", ")", "error", "{", "// The client is using some form of authentication, and the best way", "// to figure out that the auth is invalid is when it's used. Therefore,", "// we'll delay checking the credentials until that time.", "if", "cap", ".", "provider", "!=", "nil", "{", "return", "nil", "\n", "}", "\n\n", "hosts", ":=", "cap", ".", "remote", ".", "Hosts", "(", ")", "\n", "for", "i", ":=", "range", "hosts", "{", "ips", ",", "err", ":=", "net", ".", "LookupIP", "(", "hosts", "[", "i", "]", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "for", "_", ",", "ip", ":=", "range", "ips", "{", "if", "!", "ipIsLocal", "(", "ip", ")", "{", "return", "ErrNoAuth", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// The only time a client should be doing unauthenticated requests is // when a local CFSSL is being used.
[ "The", "only", "time", "a", "client", "should", "be", "doing", "unauthenticated", "requests", "is", "when", "a", "local", "CFSSL", "is", "being", "used", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/cfssl_provider.go#L77-L100
train
cloudflare/cfssl
transport/ca/cfssl_provider.go
loadAuth
func (cap *CFSSL) loadAuth() error { var err error cap.provider, err = newProvider(cap.DefaultAuth, nil) return err }
go
func (cap *CFSSL) loadAuth() error { var err error cap.provider, err = newProvider(cap.DefaultAuth, nil) return err }
[ "func", "(", "cap", "*", "CFSSL", ")", "loadAuth", "(", ")", "error", "{", "var", "err", "error", "\n", "cap", ".", "provider", ",", "err", "=", "newProvider", "(", "cap", ".", "DefaultAuth", ",", "nil", ")", "\n", "return", "err", "\n", "}" ]
// loadAuth loads an authentication provider from the client config's // explicitly set auth key.
[ "loadAuth", "loads", "an", "authentication", "provider", "from", "the", "client", "config", "s", "explicitly", "set", "auth", "key", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/cfssl_provider.go#L145-L149
train
cloudflare/cfssl
transport/ca/cfssl_provider.go
SignCSR
func (cap *CFSSL) SignCSR(csrPEM []byte) (cert []byte, err error) { p, _ := pem.Decode(csrPEM) if p == nil || p.Type != "CERTIFICATE REQUEST" { return nil, errors.New("transport: invalid PEM-encoded certificate signing request") } csr, err := x509.ParseCertificateRequest(p.Bytes) if err != nil { return nil, err } hosts := make([]string, len(csr.DNSNames), len(csr.DNSNames)+len(csr.IPAddresses)) copy(hosts, csr.DNSNames) for i := range csr.IPAddresses { hosts = append(hosts, csr.IPAddresses[i].String()) } sreq := &signer.SignRequest{ Hosts: hosts, Request: string(csrPEM), Profile: cap.Profile, Label: cap.Label, } out, err := json.Marshal(sreq) if err != nil { return nil, err } if cap.provider != nil { return cap.remote.AuthSign(out, nil, cap.provider) } return cap.remote.Sign(out) }
go
func (cap *CFSSL) SignCSR(csrPEM []byte) (cert []byte, err error) { p, _ := pem.Decode(csrPEM) if p == nil || p.Type != "CERTIFICATE REQUEST" { return nil, errors.New("transport: invalid PEM-encoded certificate signing request") } csr, err := x509.ParseCertificateRequest(p.Bytes) if err != nil { return nil, err } hosts := make([]string, len(csr.DNSNames), len(csr.DNSNames)+len(csr.IPAddresses)) copy(hosts, csr.DNSNames) for i := range csr.IPAddresses { hosts = append(hosts, csr.IPAddresses[i].String()) } sreq := &signer.SignRequest{ Hosts: hosts, Request: string(csrPEM), Profile: cap.Profile, Label: cap.Label, } out, err := json.Marshal(sreq) if err != nil { return nil, err } if cap.provider != nil { return cap.remote.AuthSign(out, nil, cap.provider) } return cap.remote.Sign(out) }
[ "func", "(", "cap", "*", "CFSSL", ")", "SignCSR", "(", "csrPEM", "[", "]", "byte", ")", "(", "cert", "[", "]", "byte", ",", "err", "error", ")", "{", "p", ",", "_", ":=", "pem", ".", "Decode", "(", "csrPEM", ")", "\n", "if", "p", "==", "nil", "||", "p", ".", "Type", "!=", "\"", "\"", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "csr", ",", "err", ":=", "x509", ".", "ParseCertificateRequest", "(", "p", ".", "Bytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "hosts", ":=", "make", "(", "[", "]", "string", ",", "len", "(", "csr", ".", "DNSNames", ")", ",", "len", "(", "csr", ".", "DNSNames", ")", "+", "len", "(", "csr", ".", "IPAddresses", ")", ")", "\n", "copy", "(", "hosts", ",", "csr", ".", "DNSNames", ")", "\n\n", "for", "i", ":=", "range", "csr", ".", "IPAddresses", "{", "hosts", "=", "append", "(", "hosts", ",", "csr", ".", "IPAddresses", "[", "i", "]", ".", "String", "(", ")", ")", "\n", "}", "\n\n", "sreq", ":=", "&", "signer", ".", "SignRequest", "{", "Hosts", ":", "hosts", ",", "Request", ":", "string", "(", "csrPEM", ")", ",", "Profile", ":", "cap", ".", "Profile", ",", "Label", ":", "cap", ".", "Label", ",", "}", "\n\n", "out", ",", "err", ":=", "json", ".", "Marshal", "(", "sreq", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "if", "cap", ".", "provider", "!=", "nil", "{", "return", "cap", ".", "remote", ".", "AuthSign", "(", "out", ",", "nil", ",", "cap", ".", "provider", ")", "\n", "}", "\n\n", "return", "cap", ".", "remote", ".", "Sign", "(", "out", ")", "\n", "}" ]
// SignCSR requests a certificate from a CFSSL signer.
[ "SignCSR", "requests", "a", "certificate", "from", "a", "CFSSL", "signer", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/cfssl_provider.go#L198-L233
train
cloudflare/cfssl
transport/ca/cfssl_provider.go
CACertificate
func (cap *CFSSL) CACertificate() ([]byte, error) { req := &info.Req{ Label: cap.Label, Profile: cap.Profile, } out, err := json.Marshal(req) if err != nil { return nil, err } resp, err := cap.remote.Info(out) if err != nil { return nil, err } return []byte(resp.Certificate), nil }
go
func (cap *CFSSL) CACertificate() ([]byte, error) { req := &info.Req{ Label: cap.Label, Profile: cap.Profile, } out, err := json.Marshal(req) if err != nil { return nil, err } resp, err := cap.remote.Info(out) if err != nil { return nil, err } return []byte(resp.Certificate), nil }
[ "func", "(", "cap", "*", "CFSSL", ")", "CACertificate", "(", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "req", ":=", "&", "info", ".", "Req", "{", "Label", ":", "cap", ".", "Label", ",", "Profile", ":", "cap", ".", "Profile", ",", "}", "\n", "out", ",", "err", ":=", "json", ".", "Marshal", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "resp", ",", "err", ":=", "cap", ".", "remote", ".", "Info", "(", "out", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "[", "]", "byte", "(", "resp", ".", "Certificate", ")", ",", "nil", "\n", "}" ]
// CACertificate returns the certificate for a CFSSL CA.
[ "CACertificate", "returns", "the", "certificate", "for", "a", "CFSSL", "CA", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/cfssl_provider.go#L236-L252
train
cloudflare/cfssl
transport/example/exlib/exlib.go
Unpack
func Unpack(r io.Reader) ([]byte, error) { var bl [2]byte _, err := io.ReadFull(r, bl[:]) if err != nil { return nil, err } n := binary.LittleEndian.Uint16(bl[:]) buf := make([]byte, int(n)) _, err = io.ReadFull(r, buf) return buf, err }
go
func Unpack(r io.Reader) ([]byte, error) { var bl [2]byte _, err := io.ReadFull(r, bl[:]) if err != nil { return nil, err } n := binary.LittleEndian.Uint16(bl[:]) buf := make([]byte, int(n)) _, err = io.ReadFull(r, buf) return buf, err }
[ "func", "Unpack", "(", "r", "io", ".", "Reader", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "var", "bl", "[", "2", "]", "byte", "\n\n", "_", ",", "err", ":=", "io", ".", "ReadFull", "(", "r", ",", "bl", "[", ":", "]", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "n", ":=", "binary", ".", "LittleEndian", ".", "Uint16", "(", "bl", "[", ":", "]", ")", "\n", "buf", ":=", "make", "(", "[", "]", "byte", ",", "int", "(", "n", ")", ")", "\n", "_", ",", "err", "=", "io", ".", "ReadFull", "(", "r", ",", "buf", ")", "\n", "return", "buf", ",", "err", "\n", "}" ]
// Unpack reads a message from an io.Reader.
[ "Unpack", "reads", "a", "message", "from", "an", "io", ".", "Reader", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/example/exlib/exlib.go#L50-L62
train
cloudflare/cfssl
transport/example/exlib/exlib.go
Pack
func Pack(w io.Writer, buf []byte) error { if len(buf) > messageMax { return errors.New("message is too large") } var bl [2]byte binary.LittleEndian.PutUint16(bl[:], uint16(len(buf))) _, err := w.Write(bl[:]) if err != nil { return err } _, err = w.Write(buf) return err }
go
func Pack(w io.Writer, buf []byte) error { if len(buf) > messageMax { return errors.New("message is too large") } var bl [2]byte binary.LittleEndian.PutUint16(bl[:], uint16(len(buf))) _, err := w.Write(bl[:]) if err != nil { return err } _, err = w.Write(buf) return err }
[ "func", "Pack", "(", "w", "io", ".", "Writer", ",", "buf", "[", "]", "byte", ")", "error", "{", "if", "len", "(", "buf", ")", ">", "messageMax", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "var", "bl", "[", "2", "]", "byte", "\n", "binary", ".", "LittleEndian", ".", "PutUint16", "(", "bl", "[", ":", "]", ",", "uint16", "(", "len", "(", "buf", ")", ")", ")", "\n", "_", ",", "err", ":=", "w", ".", "Write", "(", "bl", "[", ":", "]", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "_", ",", "err", "=", "w", ".", "Write", "(", "buf", ")", "\n", "return", "err", "\n", "}" ]
// Pack writes a message to an io.Writer.
[ "Pack", "writes", "a", "message", "to", "an", "io", ".", "Writer", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/example/exlib/exlib.go#L67-L81
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
hashUbiquity
func hashUbiquity(cert *x509.Certificate) HashUbiquity { switch cert.SignatureAlgorithm { case x509.ECDSAWithSHA1, x509.DSAWithSHA1, x509.SHA1WithRSA: return SHA1Ubiquity case x509.ECDSAWithSHA256, x509.ECDSAWithSHA384, x509.ECDSAWithSHA512, x509.DSAWithSHA256, x509.SHA256WithRSA, x509.SHA384WithRSA, x509.SHA512WithRSA: return SHA2Ubiquity case x509.MD5WithRSA, x509.MD2WithRSA: return MD5Ubiquity default: return UnknownHashUbiquity } }
go
func hashUbiquity(cert *x509.Certificate) HashUbiquity { switch cert.SignatureAlgorithm { case x509.ECDSAWithSHA1, x509.DSAWithSHA1, x509.SHA1WithRSA: return SHA1Ubiquity case x509.ECDSAWithSHA256, x509.ECDSAWithSHA384, x509.ECDSAWithSHA512, x509.DSAWithSHA256, x509.SHA256WithRSA, x509.SHA384WithRSA, x509.SHA512WithRSA: return SHA2Ubiquity case x509.MD5WithRSA, x509.MD2WithRSA: return MD5Ubiquity default: return UnknownHashUbiquity } }
[ "func", "hashUbiquity", "(", "cert", "*", "x509", ".", "Certificate", ")", "HashUbiquity", "{", "switch", "cert", ".", "SignatureAlgorithm", "{", "case", "x509", ".", "ECDSAWithSHA1", ",", "x509", ".", "DSAWithSHA1", ",", "x509", ".", "SHA1WithRSA", ":", "return", "SHA1Ubiquity", "\n", "case", "x509", ".", "ECDSAWithSHA256", ",", "x509", ".", "ECDSAWithSHA384", ",", "x509", ".", "ECDSAWithSHA512", ",", "x509", ".", "DSAWithSHA256", ",", "x509", ".", "SHA256WithRSA", ",", "x509", ".", "SHA384WithRSA", ",", "x509", ".", "SHA512WithRSA", ":", "return", "SHA2Ubiquity", "\n", "case", "x509", ".", "MD5WithRSA", ",", "x509", ".", "MD2WithRSA", ":", "return", "MD5Ubiquity", "\n", "default", ":", "return", "UnknownHashUbiquity", "\n", "}", "\n", "}" ]
// hashUbiquity computes the ubiquity of the hash algorithm in the // signature algorithm of a cert. // SHA1 > SHA2 > MD > Others
[ "hashUbiquity", "computes", "the", "ubiquity", "of", "the", "hash", "algorithm", "in", "the", "signature", "algorithm", "of", "a", "cert", ".", "SHA1", ">", "SHA2", ">", "MD", ">", "Others" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L49-L62
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
keyAlgoUbiquity
func keyAlgoUbiquity(cert *x509.Certificate) KeyAlgoUbiquity { switch cert.PublicKeyAlgorithm { case x509.ECDSA: switch cert.PublicKey.(*ecdsa.PublicKey).Curve { case elliptic.P256(): return ECDSA256Ubiquity case elliptic.P384(): return ECDSA384Ubiquity case elliptic.P521(): return ECDSA521Ubiquity default: return UnknownAlgoUbiquity } case x509.RSA: if cert.PublicKey.(*rsa.PublicKey).N.BitLen() >= 1024 { return RSAUbiquity } return UnknownAlgoUbiquity case x509.DSA: return DSAUbiquity default: return UnknownAlgoUbiquity } }
go
func keyAlgoUbiquity(cert *x509.Certificate) KeyAlgoUbiquity { switch cert.PublicKeyAlgorithm { case x509.ECDSA: switch cert.PublicKey.(*ecdsa.PublicKey).Curve { case elliptic.P256(): return ECDSA256Ubiquity case elliptic.P384(): return ECDSA384Ubiquity case elliptic.P521(): return ECDSA521Ubiquity default: return UnknownAlgoUbiquity } case x509.RSA: if cert.PublicKey.(*rsa.PublicKey).N.BitLen() >= 1024 { return RSAUbiquity } return UnknownAlgoUbiquity case x509.DSA: return DSAUbiquity default: return UnknownAlgoUbiquity } }
[ "func", "keyAlgoUbiquity", "(", "cert", "*", "x509", ".", "Certificate", ")", "KeyAlgoUbiquity", "{", "switch", "cert", ".", "PublicKeyAlgorithm", "{", "case", "x509", ".", "ECDSA", ":", "switch", "cert", ".", "PublicKey", ".", "(", "*", "ecdsa", ".", "PublicKey", ")", ".", "Curve", "{", "case", "elliptic", ".", "P256", "(", ")", ":", "return", "ECDSA256Ubiquity", "\n", "case", "elliptic", ".", "P384", "(", ")", ":", "return", "ECDSA384Ubiquity", "\n", "case", "elliptic", ".", "P521", "(", ")", ":", "return", "ECDSA521Ubiquity", "\n", "default", ":", "return", "UnknownAlgoUbiquity", "\n", "}", "\n", "case", "x509", ".", "RSA", ":", "if", "cert", ".", "PublicKey", ".", "(", "*", "rsa", ".", "PublicKey", ")", ".", "N", ".", "BitLen", "(", ")", ">=", "1024", "{", "return", "RSAUbiquity", "\n", "}", "\n", "return", "UnknownAlgoUbiquity", "\n", "case", "x509", ".", "DSA", ":", "return", "DSAUbiquity", "\n", "default", ":", "return", "UnknownAlgoUbiquity", "\n", "}", "\n", "}" ]
// keyAlgoUbiquity compute the ubiquity of the cert's public key algorithm // RSA, DSA>ECDSA>Unknown
[ "keyAlgoUbiquity", "compute", "the", "ubiquity", "of", "the", "cert", "s", "public", "key", "algorithm", "RSA", "DSA", ">", "ECDSA", ">", "Unknown" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L66-L89
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
ChainHashUbiquity
func ChainHashUbiquity(chain []*x509.Certificate) HashUbiquity { ret := math.MaxInt32 for _, cert := range chain { uscore := int(hashUbiquity(cert)) if ret > uscore { ret = uscore } } return HashUbiquity(ret) }
go
func ChainHashUbiquity(chain []*x509.Certificate) HashUbiquity { ret := math.MaxInt32 for _, cert := range chain { uscore := int(hashUbiquity(cert)) if ret > uscore { ret = uscore } } return HashUbiquity(ret) }
[ "func", "ChainHashUbiquity", "(", "chain", "[", "]", "*", "x509", ".", "Certificate", ")", "HashUbiquity", "{", "ret", ":=", "math", ".", "MaxInt32", "\n", "for", "_", ",", "cert", ":=", "range", "chain", "{", "uscore", ":=", "int", "(", "hashUbiquity", "(", "cert", ")", ")", "\n", "if", "ret", ">", "uscore", "{", "ret", "=", "uscore", "\n", "}", "\n", "}", "\n", "return", "HashUbiquity", "(", "ret", ")", "\n", "}" ]
// ChainHashUbiquity scores a chain based on the hash algorithms used // by the certificates in the chain.
[ "ChainHashUbiquity", "scores", "a", "chain", "based", "on", "the", "hash", "algorithms", "used", "by", "the", "certificates", "in", "the", "chain", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L93-L102
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
ChainKeyAlgoUbiquity
func ChainKeyAlgoUbiquity(chain []*x509.Certificate) KeyAlgoUbiquity { ret := math.MaxInt32 for _, cert := range chain { uscore := int(keyAlgoUbiquity(cert)) if ret > uscore { ret = uscore } } return KeyAlgoUbiquity(ret) }
go
func ChainKeyAlgoUbiquity(chain []*x509.Certificate) KeyAlgoUbiquity { ret := math.MaxInt32 for _, cert := range chain { uscore := int(keyAlgoUbiquity(cert)) if ret > uscore { ret = uscore } } return KeyAlgoUbiquity(ret) }
[ "func", "ChainKeyAlgoUbiquity", "(", "chain", "[", "]", "*", "x509", ".", "Certificate", ")", "KeyAlgoUbiquity", "{", "ret", ":=", "math", ".", "MaxInt32", "\n", "for", "_", ",", "cert", ":=", "range", "chain", "{", "uscore", ":=", "int", "(", "keyAlgoUbiquity", "(", "cert", ")", ")", "\n", "if", "ret", ">", "uscore", "{", "ret", "=", "uscore", "\n", "}", "\n", "}", "\n", "return", "KeyAlgoUbiquity", "(", "ret", ")", "\n", "}" ]
// ChainKeyAlgoUbiquity scores a chain based on the public-key algorithms // used by the certificates in the chain.
[ "ChainKeyAlgoUbiquity", "scores", "a", "chain", "based", "on", "the", "public", "-", "key", "algorithms", "used", "by", "the", "certificates", "in", "the", "chain", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L106-L115
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
CompareChainHashUbiquity
func CompareChainHashUbiquity(chain1, chain2 []*x509.Certificate) int { hu1 := ChainHashUbiquity(chain1) hu2 := ChainHashUbiquity(chain2) return int(hu1) - int(hu2) }
go
func CompareChainHashUbiquity(chain1, chain2 []*x509.Certificate) int { hu1 := ChainHashUbiquity(chain1) hu2 := ChainHashUbiquity(chain2) return int(hu1) - int(hu2) }
[ "func", "CompareChainHashUbiquity", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "hu1", ":=", "ChainHashUbiquity", "(", "chain1", ")", "\n", "hu2", ":=", "ChainHashUbiquity", "(", "chain2", ")", "\n", "return", "int", "(", "hu1", ")", "-", "int", "(", "hu2", ")", "\n", "}" ]
// CompareChainHashUbiquity returns a positive, zero, or negative value // if the hash ubiquity of the first chain is greater, equal, or less // than the second chain.
[ "CompareChainHashUbiquity", "returns", "a", "positive", "zero", "or", "negative", "value", "if", "the", "hash", "ubiquity", "of", "the", "first", "chain", "is", "greater", "equal", "or", "less", "than", "the", "second", "chain", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L120-L124
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
CompareChainKeyAlgoUbiquity
func CompareChainKeyAlgoUbiquity(chain1, chain2 []*x509.Certificate) int { kau1 := ChainKeyAlgoUbiquity(chain1) kau2 := ChainKeyAlgoUbiquity(chain2) return int(kau1) - int(kau2) }
go
func CompareChainKeyAlgoUbiquity(chain1, chain2 []*x509.Certificate) int { kau1 := ChainKeyAlgoUbiquity(chain1) kau2 := ChainKeyAlgoUbiquity(chain2) return int(kau1) - int(kau2) }
[ "func", "CompareChainKeyAlgoUbiquity", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "kau1", ":=", "ChainKeyAlgoUbiquity", "(", "chain1", ")", "\n", "kau2", ":=", "ChainKeyAlgoUbiquity", "(", "chain2", ")", "\n", "return", "int", "(", "kau1", ")", "-", "int", "(", "kau2", ")", "\n", "}" ]
// CompareChainKeyAlgoUbiquity returns a positive, zero, or negative value // if the public-key ubiquity of the first chain is greater, equal, // or less than the second chain.
[ "CompareChainKeyAlgoUbiquity", "returns", "a", "positive", "zero", "or", "negative", "value", "if", "the", "public", "-", "key", "ubiquity", "of", "the", "first", "chain", "is", "greater", "equal", "or", "less", "than", "the", "second", "chain", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L129-L133
train
cloudflare/cfssl
ubiquity/ubiquity_crypto.go
CompareExpiryUbiquity
func CompareExpiryUbiquity(chain1, chain2 []*x509.Certificate) int { for i := 0; ; i++ { if i >= len(chain1) || i >= len(chain2) { break } c1 := chain1[len(chain1)-1-i] c2 := chain2[len(chain2)-1-i] t1 := c1.NotAfter t2 := c2.NotAfter // Check if expiry dates valid. Return if one or other is invalid. // Otherwise rank by expiry date. Later is ranked higher. c1Valid := helpers.ValidExpiry(c1) c2Valid := helpers.ValidExpiry(c2) if c1Valid && !c2Valid { return 1 } if !c1Valid && c2Valid { return -1 } r := compareTime(t1, t2) // Return when we find rank difference. if r != 0 { return r } } return 0 }
go
func CompareExpiryUbiquity(chain1, chain2 []*x509.Certificate) int { for i := 0; ; i++ { if i >= len(chain1) || i >= len(chain2) { break } c1 := chain1[len(chain1)-1-i] c2 := chain2[len(chain2)-1-i] t1 := c1.NotAfter t2 := c2.NotAfter // Check if expiry dates valid. Return if one or other is invalid. // Otherwise rank by expiry date. Later is ranked higher. c1Valid := helpers.ValidExpiry(c1) c2Valid := helpers.ValidExpiry(c2) if c1Valid && !c2Valid { return 1 } if !c1Valid && c2Valid { return -1 } r := compareTime(t1, t2) // Return when we find rank difference. if r != 0 { return r } } return 0 }
[ "func", "CompareExpiryUbiquity", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "for", "i", ":=", "0", ";", ";", "i", "++", "{", "if", "i", ">=", "len", "(", "chain1", ")", "||", "i", ">=", "len", "(", "chain2", ")", "{", "break", "\n", "}", "\n", "c1", ":=", "chain1", "[", "len", "(", "chain1", ")", "-", "1", "-", "i", "]", "\n", "c2", ":=", "chain2", "[", "len", "(", "chain2", ")", "-", "1", "-", "i", "]", "\n", "t1", ":=", "c1", ".", "NotAfter", "\n", "t2", ":=", "c2", ".", "NotAfter", "\n\n", "// Check if expiry dates valid. Return if one or other is invalid.", "// Otherwise rank by expiry date. Later is ranked higher.", "c1Valid", ":=", "helpers", ".", "ValidExpiry", "(", "c1", ")", "\n", "c2Valid", ":=", "helpers", ".", "ValidExpiry", "(", "c2", ")", "\n", "if", "c1Valid", "&&", "!", "c2Valid", "{", "return", "1", "\n", "}", "\n", "if", "!", "c1Valid", "&&", "c2Valid", "{", "return", "-", "1", "\n", "}", "\n\n", "r", ":=", "compareTime", "(", "t1", ",", "t2", ")", "\n", "// Return when we find rank difference.", "if", "r", "!=", "0", "{", "return", "r", "\n", "}", "\n", "}", "\n", "return", "0", "\n", "}" ]
// CompareExpiryUbiquity ranks two certificate chains based on the exiry dates of intermediates and roots. // Certs expire later are ranked higher than ones expire earlier. The ranking between chains are determined by // the first pair of intermediates, scanned from the root level, that ar ranked differently.
[ "CompareExpiryUbiquity", "ranks", "two", "certificate", "chains", "based", "on", "the", "exiry", "dates", "of", "intermediates", "and", "roots", ".", "Certs", "expire", "later", "are", "ranked", "higher", "than", "ones", "expire", "earlier", ".", "The", "ranking", "between", "chains", "are", "determined", "by", "the", "first", "pair", "of", "intermediates", "scanned", "from", "the", "root", "level", "that", "ar", "ranked", "differently", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/ubiquity_crypto.go#L138-L166
train
cloudflare/cfssl
whitelist/whitelist_net.go
Remove
func (wl *BasicNet) Remove(n *net.IPNet) { if n == nil { return } index := -1 wl.lock.Lock() defer wl.lock.Unlock() for i := range wl.whitelist { if wl.whitelist[i].String() == n.String() { index = i break } } if index == -1 { return } wl.whitelist = append(wl.whitelist[:index], wl.whitelist[index+1:]...) }
go
func (wl *BasicNet) Remove(n *net.IPNet) { if n == nil { return } index := -1 wl.lock.Lock() defer wl.lock.Unlock() for i := range wl.whitelist { if wl.whitelist[i].String() == n.String() { index = i break } } if index == -1 { return } wl.whitelist = append(wl.whitelist[:index], wl.whitelist[index+1:]...) }
[ "func", "(", "wl", "*", "BasicNet", ")", "Remove", "(", "n", "*", "net", ".", "IPNet", ")", "{", "if", "n", "==", "nil", "{", "return", "\n", "}", "\n\n", "index", ":=", "-", "1", "\n", "wl", ".", "lock", ".", "Lock", "(", ")", "\n", "defer", "wl", ".", "lock", ".", "Unlock", "(", ")", "\n", "for", "i", ":=", "range", "wl", ".", "whitelist", "{", "if", "wl", ".", "whitelist", "[", "i", "]", ".", "String", "(", ")", "==", "n", ".", "String", "(", ")", "{", "index", "=", "i", "\n", "break", "\n", "}", "\n", "}", "\n\n", "if", "index", "==", "-", "1", "{", "return", "\n", "}", "\n\n", "wl", ".", "whitelist", "=", "append", "(", "wl", ".", "whitelist", "[", ":", "index", "]", ",", "wl", ".", "whitelist", "[", "index", "+", "1", ":", "]", "...", ")", "\n", "}" ]
// Remove removes a network from the whitelist.
[ "Remove", "removes", "a", "network", "from", "the", "whitelist", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist_net.go#L68-L88
train
cloudflare/cfssl
whitelist/whitelist_net.go
MarshalJSON
func (wl *BasicNet) MarshalJSON() ([]byte, error) { var ss = make([]string, 0, len(wl.whitelist)) for i := range wl.whitelist { ss = append(ss, wl.whitelist[i].String()) } out := []byte(`"` + strings.Join(ss, ",") + `"`) return out, nil }
go
func (wl *BasicNet) MarshalJSON() ([]byte, error) { var ss = make([]string, 0, len(wl.whitelist)) for i := range wl.whitelist { ss = append(ss, wl.whitelist[i].String()) } out := []byte(`"` + strings.Join(ss, ",") + `"`) return out, nil }
[ "func", "(", "wl", "*", "BasicNet", ")", "MarshalJSON", "(", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "var", "ss", "=", "make", "(", "[", "]", "string", ",", "0", ",", "len", "(", "wl", ".", "whitelist", ")", ")", "\n", "for", "i", ":=", "range", "wl", ".", "whitelist", "{", "ss", "=", "append", "(", "ss", ",", "wl", ".", "whitelist", "[", "i", "]", ".", "String", "(", ")", ")", "\n", "}", "\n\n", "out", ":=", "[", "]", "byte", "(", "`\"`", "+", "strings", ".", "Join", "(", "ss", ",", "\"", "\"", ")", "+", "`\"`", ")", "\n", "return", "out", ",", "nil", "\n", "}" ]
// MarshalJSON serialises a network whitelist to a comma-separated // list of networks.
[ "MarshalJSON", "serialises", "a", "network", "whitelist", "to", "a", "comma", "-", "separated", "list", "of", "networks", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist_net.go#L99-L107
train
cloudflare/cfssl
whitelist/whitelist_net.go
UnmarshalJSON
func (wl *BasicNet) UnmarshalJSON(in []byte) error { if in[0] != '"' || in[len(in)-1] != '"' { return errors.New("whitelist: invalid whitelist") } if wl.lock == nil { wl.lock = new(sync.Mutex) } wl.lock.Lock() defer wl.lock.Unlock() var err error netString := strings.TrimSpace(string(in[1 : len(in)-1])) nets := strings.Split(netString, ",") wl.whitelist = make([]*net.IPNet, len(nets)) for i := range nets { addr := strings.TrimSpace(nets[i]) if addr == "" { continue } _, wl.whitelist[i], err = net.ParseCIDR(addr) if err != nil { wl.whitelist = nil return err } } return nil }
go
func (wl *BasicNet) UnmarshalJSON(in []byte) error { if in[0] != '"' || in[len(in)-1] != '"' { return errors.New("whitelist: invalid whitelist") } if wl.lock == nil { wl.lock = new(sync.Mutex) } wl.lock.Lock() defer wl.lock.Unlock() var err error netString := strings.TrimSpace(string(in[1 : len(in)-1])) nets := strings.Split(netString, ",") wl.whitelist = make([]*net.IPNet, len(nets)) for i := range nets { addr := strings.TrimSpace(nets[i]) if addr == "" { continue } _, wl.whitelist[i], err = net.ParseCIDR(addr) if err != nil { wl.whitelist = nil return err } } return nil }
[ "func", "(", "wl", "*", "BasicNet", ")", "UnmarshalJSON", "(", "in", "[", "]", "byte", ")", "error", "{", "if", "in", "[", "0", "]", "!=", "'\"'", "||", "in", "[", "len", "(", "in", ")", "-", "1", "]", "!=", "'\"'", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "wl", ".", "lock", "==", "nil", "{", "wl", ".", "lock", "=", "new", "(", "sync", ".", "Mutex", ")", "\n", "}", "\n\n", "wl", ".", "lock", ".", "Lock", "(", ")", "\n", "defer", "wl", ".", "lock", ".", "Unlock", "(", ")", "\n\n", "var", "err", "error", "\n", "netString", ":=", "strings", ".", "TrimSpace", "(", "string", "(", "in", "[", "1", ":", "len", "(", "in", ")", "-", "1", "]", ")", ")", "\n", "nets", ":=", "strings", ".", "Split", "(", "netString", ",", "\"", "\"", ")", "\n", "wl", ".", "whitelist", "=", "make", "(", "[", "]", "*", "net", ".", "IPNet", ",", "len", "(", "nets", ")", ")", "\n", "for", "i", ":=", "range", "nets", "{", "addr", ":=", "strings", ".", "TrimSpace", "(", "nets", "[", "i", "]", ")", "\n", "if", "addr", "==", "\"", "\"", "{", "continue", "\n", "}", "\n", "_", ",", "wl", ".", "whitelist", "[", "i", "]", ",", "err", "=", "net", ".", "ParseCIDR", "(", "addr", ")", "\n", "if", "err", "!=", "nil", "{", "wl", ".", "whitelist", "=", "nil", "\n", "return", "err", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// UnmarshalJSON implements the json.Unmarshaler interface for network // whitelists, taking a comma-separated string of networks.
[ "UnmarshalJSON", "implements", "the", "json", ".", "Unmarshaler", "interface", "for", "network", "whitelists", "taking", "a", "comma", "-", "separated", "string", "of", "networks", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/whitelist/whitelist_net.go#L111-L140
train
cloudflare/cfssl
scan/crypto/tls/prf.go
splitPreMasterSecret
func splitPreMasterSecret(secret []byte) (s1, s2 []byte) { s1 = secret[0 : (len(secret)+1)/2] s2 = secret[len(secret)/2:] return }
go
func splitPreMasterSecret(secret []byte) (s1, s2 []byte) { s1 = secret[0 : (len(secret)+1)/2] s2 = secret[len(secret)/2:] return }
[ "func", "splitPreMasterSecret", "(", "secret", "[", "]", "byte", ")", "(", "s1", ",", "s2", "[", "]", "byte", ")", "{", "s1", "=", "secret", "[", "0", ":", "(", "len", "(", "secret", ")", "+", "1", ")", "/", "2", "]", "\n", "s2", "=", "secret", "[", "len", "(", "secret", ")", "/", "2", ":", "]", "\n", "return", "\n", "}" ]
// Split a premaster secret in two as specified in RFC 4346, section 5.
[ "Split", "a", "premaster", "secret", "in", "two", "as", "specified", "in", "RFC", "4346", "section", "5", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L19-L23
train
cloudflare/cfssl
scan/crypto/tls/prf.go
pHash
func pHash(result, secret, seed []byte, hash func() hash.Hash) { h := hmac.New(hash, secret) h.Write(seed) a := h.Sum(nil) j := 0 for j < len(result) { h.Reset() h.Write(a) h.Write(seed) b := h.Sum(nil) todo := len(b) if j+todo > len(result) { todo = len(result) - j } copy(result[j:j+todo], b) j += todo h.Reset() h.Write(a) a = h.Sum(nil) } }
go
func pHash(result, secret, seed []byte, hash func() hash.Hash) { h := hmac.New(hash, secret) h.Write(seed) a := h.Sum(nil) j := 0 for j < len(result) { h.Reset() h.Write(a) h.Write(seed) b := h.Sum(nil) todo := len(b) if j+todo > len(result) { todo = len(result) - j } copy(result[j:j+todo], b) j += todo h.Reset() h.Write(a) a = h.Sum(nil) } }
[ "func", "pHash", "(", "result", ",", "secret", ",", "seed", "[", "]", "byte", ",", "hash", "func", "(", ")", "hash", ".", "Hash", ")", "{", "h", ":=", "hmac", ".", "New", "(", "hash", ",", "secret", ")", "\n", "h", ".", "Write", "(", "seed", ")", "\n", "a", ":=", "h", ".", "Sum", "(", "nil", ")", "\n\n", "j", ":=", "0", "\n", "for", "j", "<", "len", "(", "result", ")", "{", "h", ".", "Reset", "(", ")", "\n", "h", ".", "Write", "(", "a", ")", "\n", "h", ".", "Write", "(", "seed", ")", "\n", "b", ":=", "h", ".", "Sum", "(", "nil", ")", "\n", "todo", ":=", "len", "(", "b", ")", "\n", "if", "j", "+", "todo", ">", "len", "(", "result", ")", "{", "todo", "=", "len", "(", "result", ")", "-", "j", "\n", "}", "\n", "copy", "(", "result", "[", "j", ":", "j", "+", "todo", "]", ",", "b", ")", "\n", "j", "+=", "todo", "\n\n", "h", ".", "Reset", "(", ")", "\n", "h", ".", "Write", "(", "a", ")", "\n", "a", "=", "h", ".", "Sum", "(", "nil", ")", "\n", "}", "\n", "}" ]
// pHash implements the P_hash function, as defined in RFC 4346, section 5.
[ "pHash", "implements", "the", "P_hash", "function", "as", "defined", "in", "RFC", "4346", "section", "5", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L26-L48
train
cloudflare/cfssl
scan/crypto/tls/prf.go
prf10
func prf10(result, secret, label, seed []byte) { hashSHA1 := sha1.New hashMD5 := md5.New labelAndSeed := make([]byte, len(label)+len(seed)) copy(labelAndSeed, label) copy(labelAndSeed[len(label):], seed) s1, s2 := splitPreMasterSecret(secret) pHash(result, s1, labelAndSeed, hashMD5) result2 := make([]byte, len(result)) pHash(result2, s2, labelAndSeed, hashSHA1) for i, b := range result2 { result[i] ^= b } }
go
func prf10(result, secret, label, seed []byte) { hashSHA1 := sha1.New hashMD5 := md5.New labelAndSeed := make([]byte, len(label)+len(seed)) copy(labelAndSeed, label) copy(labelAndSeed[len(label):], seed) s1, s2 := splitPreMasterSecret(secret) pHash(result, s1, labelAndSeed, hashMD5) result2 := make([]byte, len(result)) pHash(result2, s2, labelAndSeed, hashSHA1) for i, b := range result2 { result[i] ^= b } }
[ "func", "prf10", "(", "result", ",", "secret", ",", "label", ",", "seed", "[", "]", "byte", ")", "{", "hashSHA1", ":=", "sha1", ".", "New", "\n", "hashMD5", ":=", "md5", ".", "New", "\n\n", "labelAndSeed", ":=", "make", "(", "[", "]", "byte", ",", "len", "(", "label", ")", "+", "len", "(", "seed", ")", ")", "\n", "copy", "(", "labelAndSeed", ",", "label", ")", "\n", "copy", "(", "labelAndSeed", "[", "len", "(", "label", ")", ":", "]", ",", "seed", ")", "\n\n", "s1", ",", "s2", ":=", "splitPreMasterSecret", "(", "secret", ")", "\n", "pHash", "(", "result", ",", "s1", ",", "labelAndSeed", ",", "hashMD5", ")", "\n", "result2", ":=", "make", "(", "[", "]", "byte", ",", "len", "(", "result", ")", ")", "\n", "pHash", "(", "result2", ",", "s2", ",", "labelAndSeed", ",", "hashSHA1", ")", "\n\n", "for", "i", ",", "b", ":=", "range", "result2", "{", "result", "[", "i", "]", "^=", "b", "\n", "}", "\n", "}" ]
// prf10 implements the TLS 1.0 pseudo-random function, as defined in RFC 2246, section 5.
[ "prf10", "implements", "the", "TLS", "1", ".", "0", "pseudo", "-", "random", "function", "as", "defined", "in", "RFC", "2246", "section", "5", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L51-L67
train
cloudflare/cfssl
scan/crypto/tls/prf.go
prf12
func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) { return func(result, secret, label, seed []byte) { labelAndSeed := make([]byte, len(label)+len(seed)) copy(labelAndSeed, label) copy(labelAndSeed[len(label):], seed) pHash(result, secret, labelAndSeed, hashFunc) } }
go
func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) { return func(result, secret, label, seed []byte) { labelAndSeed := make([]byte, len(label)+len(seed)) copy(labelAndSeed, label) copy(labelAndSeed[len(label):], seed) pHash(result, secret, labelAndSeed, hashFunc) } }
[ "func", "prf12", "(", "hashFunc", "func", "(", ")", "hash", ".", "Hash", ")", "func", "(", "result", ",", "secret", ",", "label", ",", "seed", "[", "]", "byte", ")", "{", "return", "func", "(", "result", ",", "secret", ",", "label", ",", "seed", "[", "]", "byte", ")", "{", "labelAndSeed", ":=", "make", "(", "[", "]", "byte", ",", "len", "(", "label", ")", "+", "len", "(", "seed", ")", ")", "\n", "copy", "(", "labelAndSeed", ",", "label", ")", "\n", "copy", "(", "labelAndSeed", "[", "len", "(", "label", ")", ":", "]", ",", "seed", ")", "\n\n", "pHash", "(", "result", ",", "secret", ",", "labelAndSeed", ",", "hashFunc", ")", "\n", "}", "\n", "}" ]
// prf12 implements the TLS 1.2 pseudo-random function, as defined in RFC 5246, section 5.
[ "prf12", "implements", "the", "TLS", "1", ".", "2", "pseudo", "-", "random", "function", "as", "defined", "in", "RFC", "5246", "section", "5", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L70-L78
train
cloudflare/cfssl
scan/crypto/tls/prf.go
keysFromMasterSecret
func keysFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte, macLen, keyLen, ivLen int) (clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV []byte) { seed := make([]byte, 0, len(serverRandom)+len(clientRandom)) seed = append(seed, serverRandom...) seed = append(seed, clientRandom...) n := 2*macLen + 2*keyLen + 2*ivLen keyMaterial := make([]byte, n) prfForVersion(version, suite)(keyMaterial, masterSecret, keyExpansionLabel, seed) clientMAC = keyMaterial[:macLen] keyMaterial = keyMaterial[macLen:] serverMAC = keyMaterial[:macLen] keyMaterial = keyMaterial[macLen:] clientKey = keyMaterial[:keyLen] keyMaterial = keyMaterial[keyLen:] serverKey = keyMaterial[:keyLen] keyMaterial = keyMaterial[keyLen:] clientIV = keyMaterial[:ivLen] keyMaterial = keyMaterial[ivLen:] serverIV = keyMaterial[:ivLen] return }
go
func keysFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte, macLen, keyLen, ivLen int) (clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV []byte) { seed := make([]byte, 0, len(serverRandom)+len(clientRandom)) seed = append(seed, serverRandom...) seed = append(seed, clientRandom...) n := 2*macLen + 2*keyLen + 2*ivLen keyMaterial := make([]byte, n) prfForVersion(version, suite)(keyMaterial, masterSecret, keyExpansionLabel, seed) clientMAC = keyMaterial[:macLen] keyMaterial = keyMaterial[macLen:] serverMAC = keyMaterial[:macLen] keyMaterial = keyMaterial[macLen:] clientKey = keyMaterial[:keyLen] keyMaterial = keyMaterial[keyLen:] serverKey = keyMaterial[:keyLen] keyMaterial = keyMaterial[keyLen:] clientIV = keyMaterial[:ivLen] keyMaterial = keyMaterial[ivLen:] serverIV = keyMaterial[:ivLen] return }
[ "func", "keysFromMasterSecret", "(", "version", "uint16", ",", "suite", "*", "cipherSuite", ",", "masterSecret", ",", "clientRandom", ",", "serverRandom", "[", "]", "byte", ",", "macLen", ",", "keyLen", ",", "ivLen", "int", ")", "(", "clientMAC", ",", "serverMAC", ",", "clientKey", ",", "serverKey", ",", "clientIV", ",", "serverIV", "[", "]", "byte", ")", "{", "seed", ":=", "make", "(", "[", "]", "byte", ",", "0", ",", "len", "(", "serverRandom", ")", "+", "len", "(", "clientRandom", ")", ")", "\n", "seed", "=", "append", "(", "seed", ",", "serverRandom", "...", ")", "\n", "seed", "=", "append", "(", "seed", ",", "clientRandom", "...", ")", "\n\n", "n", ":=", "2", "*", "macLen", "+", "2", "*", "keyLen", "+", "2", "*", "ivLen", "\n", "keyMaterial", ":=", "make", "(", "[", "]", "byte", ",", "n", ")", "\n", "prfForVersion", "(", "version", ",", "suite", ")", "(", "keyMaterial", ",", "masterSecret", ",", "keyExpansionLabel", ",", "seed", ")", "\n", "clientMAC", "=", "keyMaterial", "[", ":", "macLen", "]", "\n", "keyMaterial", "=", "keyMaterial", "[", "macLen", ":", "]", "\n", "serverMAC", "=", "keyMaterial", "[", ":", "macLen", "]", "\n", "keyMaterial", "=", "keyMaterial", "[", "macLen", ":", "]", "\n", "clientKey", "=", "keyMaterial", "[", ":", "keyLen", "]", "\n", "keyMaterial", "=", "keyMaterial", "[", "keyLen", ":", "]", "\n", "serverKey", "=", "keyMaterial", "[", ":", "keyLen", "]", "\n", "keyMaterial", "=", "keyMaterial", "[", "keyLen", ":", "]", "\n", "clientIV", "=", "keyMaterial", "[", ":", "ivLen", "]", "\n", "keyMaterial", "=", "keyMaterial", "[", "ivLen", ":", "]", "\n", "serverIV", "=", "keyMaterial", "[", ":", "ivLen", "]", "\n", "return", "\n", "}" ]
// keysFromMasterSecret generates the connection keys from the master // secret, given the lengths of the MAC key, cipher key and IV, as defined in // RFC 2246, section 6.3.
[ "keysFromMasterSecret", "generates", "the", "connection", "keys", "from", "the", "master", "secret", "given", "the", "lengths", "of", "the", "MAC", "key", "cipher", "key", "and", "IV", "as", "defined", "in", "RFC", "2246", "section", "6", ".", "3", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L160-L180
train
cloudflare/cfssl
scan/crypto/tls/prf.go
lookupTLSHash
func lookupTLSHash(hash uint8) (crypto.Hash, error) { switch hash { case hashSHA1: return crypto.SHA1, nil case hashSHA256: return crypto.SHA256, nil case hashSHA384: return crypto.SHA384, nil default: return 0, errors.New("tls: unsupported hash algorithm") } }
go
func lookupTLSHash(hash uint8) (crypto.Hash, error) { switch hash { case hashSHA1: return crypto.SHA1, nil case hashSHA256: return crypto.SHA256, nil case hashSHA384: return crypto.SHA384, nil default: return 0, errors.New("tls: unsupported hash algorithm") } }
[ "func", "lookupTLSHash", "(", "hash", "uint8", ")", "(", "crypto", ".", "Hash", ",", "error", ")", "{", "switch", "hash", "{", "case", "hashSHA1", ":", "return", "crypto", ".", "SHA1", ",", "nil", "\n", "case", "hashSHA256", ":", "return", "crypto", ".", "SHA256", ",", "nil", "\n", "case", "hashSHA384", ":", "return", "crypto", ".", "SHA384", ",", "nil", "\n", "default", ":", "return", "0", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "}" ]
// lookupTLSHash looks up the corresponding crypto.Hash for a given // TLS hash identifier.
[ "lookupTLSHash", "looks", "up", "the", "corresponding", "crypto", ".", "Hash", "for", "a", "given", "TLS", "hash", "identifier", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L184-L195
train
cloudflare/cfssl
scan/crypto/tls/prf.go
finishedSum30
func finishedSum30(md5, sha1 hash.Hash, masterSecret []byte, magic []byte) []byte { md5.Write(magic) md5.Write(masterSecret) md5.Write(ssl30Pad1[:]) md5Digest := md5.Sum(nil) md5.Reset() md5.Write(masterSecret) md5.Write(ssl30Pad2[:]) md5.Write(md5Digest) md5Digest = md5.Sum(nil) sha1.Write(magic) sha1.Write(masterSecret) sha1.Write(ssl30Pad1[:40]) sha1Digest := sha1.Sum(nil) sha1.Reset() sha1.Write(masterSecret) sha1.Write(ssl30Pad2[:40]) sha1.Write(sha1Digest) sha1Digest = sha1.Sum(nil) ret := make([]byte, len(md5Digest)+len(sha1Digest)) copy(ret, md5Digest) copy(ret[len(md5Digest):], sha1Digest) return ret }
go
func finishedSum30(md5, sha1 hash.Hash, masterSecret []byte, magic []byte) []byte { md5.Write(magic) md5.Write(masterSecret) md5.Write(ssl30Pad1[:]) md5Digest := md5.Sum(nil) md5.Reset() md5.Write(masterSecret) md5.Write(ssl30Pad2[:]) md5.Write(md5Digest) md5Digest = md5.Sum(nil) sha1.Write(magic) sha1.Write(masterSecret) sha1.Write(ssl30Pad1[:40]) sha1Digest := sha1.Sum(nil) sha1.Reset() sha1.Write(masterSecret) sha1.Write(ssl30Pad2[:40]) sha1.Write(sha1Digest) sha1Digest = sha1.Sum(nil) ret := make([]byte, len(md5Digest)+len(sha1Digest)) copy(ret, md5Digest) copy(ret[len(md5Digest):], sha1Digest) return ret }
[ "func", "finishedSum30", "(", "md5", ",", "sha1", "hash", ".", "Hash", ",", "masterSecret", "[", "]", "byte", ",", "magic", "[", "]", "byte", ")", "[", "]", "byte", "{", "md5", ".", "Write", "(", "magic", ")", "\n", "md5", ".", "Write", "(", "masterSecret", ")", "\n", "md5", ".", "Write", "(", "ssl30Pad1", "[", ":", "]", ")", "\n", "md5Digest", ":=", "md5", ".", "Sum", "(", "nil", ")", "\n\n", "md5", ".", "Reset", "(", ")", "\n", "md5", ".", "Write", "(", "masterSecret", ")", "\n", "md5", ".", "Write", "(", "ssl30Pad2", "[", ":", "]", ")", "\n", "md5", ".", "Write", "(", "md5Digest", ")", "\n", "md5Digest", "=", "md5", ".", "Sum", "(", "nil", ")", "\n\n", "sha1", ".", "Write", "(", "magic", ")", "\n", "sha1", ".", "Write", "(", "masterSecret", ")", "\n", "sha1", ".", "Write", "(", "ssl30Pad1", "[", ":", "40", "]", ")", "\n", "sha1Digest", ":=", "sha1", ".", "Sum", "(", "nil", ")", "\n\n", "sha1", ".", "Reset", "(", ")", "\n", "sha1", ".", "Write", "(", "masterSecret", ")", "\n", "sha1", ".", "Write", "(", "ssl30Pad2", "[", ":", "40", "]", ")", "\n", "sha1", ".", "Write", "(", "sha1Digest", ")", "\n", "sha1Digest", "=", "sha1", ".", "Sum", "(", "nil", ")", "\n\n", "ret", ":=", "make", "(", "[", "]", "byte", ",", "len", "(", "md5Digest", ")", "+", "len", "(", "sha1Digest", ")", ")", "\n", "copy", "(", "ret", ",", "md5Digest", ")", "\n", "copy", "(", "ret", "[", "len", "(", "md5Digest", ")", ":", "]", ",", "sha1Digest", ")", "\n", "return", "ret", "\n", "}" ]
// finishedSum30 calculates the contents of the verify_data member of a SSLv3 // Finished message given the MD5 and SHA1 hashes of a set of handshake // messages.
[ "finishedSum30", "calculates", "the", "contents", "of", "the", "verify_data", "member", "of", "a", "SSLv3", "Finished", "message", "given", "the", "MD5", "and", "SHA1", "hashes", "of", "a", "set", "of", "handshake", "messages", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L257-L284
train
cloudflare/cfssl
scan/crypto/tls/prf.go
clientSum
func (h finishedHash) clientSum(masterSecret []byte) []byte { if h.version == VersionSSL30 { return finishedSum30(h.clientMD5, h.client, masterSecret, ssl3ClientFinishedMagic[:]) } out := make([]byte, finishedVerifyLength) h.prf(out, masterSecret, clientFinishedLabel, h.Sum()) return out }
go
func (h finishedHash) clientSum(masterSecret []byte) []byte { if h.version == VersionSSL30 { return finishedSum30(h.clientMD5, h.client, masterSecret, ssl3ClientFinishedMagic[:]) } out := make([]byte, finishedVerifyLength) h.prf(out, masterSecret, clientFinishedLabel, h.Sum()) return out }
[ "func", "(", "h", "finishedHash", ")", "clientSum", "(", "masterSecret", "[", "]", "byte", ")", "[", "]", "byte", "{", "if", "h", ".", "version", "==", "VersionSSL30", "{", "return", "finishedSum30", "(", "h", ".", "clientMD5", ",", "h", ".", "client", ",", "masterSecret", ",", "ssl3ClientFinishedMagic", "[", ":", "]", ")", "\n", "}", "\n\n", "out", ":=", "make", "(", "[", "]", "byte", ",", "finishedVerifyLength", ")", "\n", "h", ".", "prf", "(", "out", ",", "masterSecret", ",", "clientFinishedLabel", ",", "h", ".", "Sum", "(", ")", ")", "\n", "return", "out", "\n", "}" ]
// clientSum returns the contents of the verify_data member of a client's // Finished message.
[ "clientSum", "returns", "the", "contents", "of", "the", "verify_data", "member", "of", "a", "client", "s", "Finished", "message", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L291-L299
train
cloudflare/cfssl
scan/crypto/tls/prf.go
serverSum
func (h finishedHash) serverSum(masterSecret []byte) []byte { if h.version == VersionSSL30 { return finishedSum30(h.serverMD5, h.server, masterSecret, ssl3ServerFinishedMagic[:]) } out := make([]byte, finishedVerifyLength) h.prf(out, masterSecret, serverFinishedLabel, h.Sum()) return out }
go
func (h finishedHash) serverSum(masterSecret []byte) []byte { if h.version == VersionSSL30 { return finishedSum30(h.serverMD5, h.server, masterSecret, ssl3ServerFinishedMagic[:]) } out := make([]byte, finishedVerifyLength) h.prf(out, masterSecret, serverFinishedLabel, h.Sum()) return out }
[ "func", "(", "h", "finishedHash", ")", "serverSum", "(", "masterSecret", "[", "]", "byte", ")", "[", "]", "byte", "{", "if", "h", ".", "version", "==", "VersionSSL30", "{", "return", "finishedSum30", "(", "h", ".", "serverMD5", ",", "h", ".", "server", ",", "masterSecret", ",", "ssl3ServerFinishedMagic", "[", ":", "]", ")", "\n", "}", "\n\n", "out", ":=", "make", "(", "[", "]", "byte", ",", "finishedVerifyLength", ")", "\n", "h", ".", "prf", "(", "out", ",", "masterSecret", ",", "serverFinishedLabel", ",", "h", ".", "Sum", "(", ")", ")", "\n", "return", "out", "\n", "}" ]
// serverSum returns the contents of the verify_data member of a server's // Finished message.
[ "serverSum", "returns", "the", "contents", "of", "the", "verify_data", "member", "of", "a", "server", "s", "Finished", "message", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L303-L311
train
cloudflare/cfssl
scan/crypto/tls/prf.go
selectClientCertSignatureAlgorithm
func (h finishedHash) selectClientCertSignatureAlgorithm(serverList []signatureAndHash, sigType uint8) (signatureAndHash, error) { if h.version < VersionTLS12 { // Nothing to negotiate before TLS 1.2. return signatureAndHash{signature: sigType}, nil } for _, v := range serverList { if v.signature == sigType && isSupportedSignatureAndHash(v, supportedSignatureAlgorithms) { return v, nil } } return signatureAndHash{}, errors.New("tls: no supported signature algorithm found for signing client certificate") }
go
func (h finishedHash) selectClientCertSignatureAlgorithm(serverList []signatureAndHash, sigType uint8) (signatureAndHash, error) { if h.version < VersionTLS12 { // Nothing to negotiate before TLS 1.2. return signatureAndHash{signature: sigType}, nil } for _, v := range serverList { if v.signature == sigType && isSupportedSignatureAndHash(v, supportedSignatureAlgorithms) { return v, nil } } return signatureAndHash{}, errors.New("tls: no supported signature algorithm found for signing client certificate") }
[ "func", "(", "h", "finishedHash", ")", "selectClientCertSignatureAlgorithm", "(", "serverList", "[", "]", "signatureAndHash", ",", "sigType", "uint8", ")", "(", "signatureAndHash", ",", "error", ")", "{", "if", "h", ".", "version", "<", "VersionTLS12", "{", "// Nothing to negotiate before TLS 1.2.", "return", "signatureAndHash", "{", "signature", ":", "sigType", "}", ",", "nil", "\n", "}", "\n\n", "for", "_", ",", "v", ":=", "range", "serverList", "{", "if", "v", ".", "signature", "==", "sigType", "&&", "isSupportedSignatureAndHash", "(", "v", ",", "supportedSignatureAlgorithms", ")", "{", "return", "v", ",", "nil", "\n", "}", "\n", "}", "\n", "return", "signatureAndHash", "{", "}", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}" ]
// selectClientCertSignatureAlgorithm returns a signatureAndHash to sign a // client's CertificateVerify with, or an error if none can be found.
[ "selectClientCertSignatureAlgorithm", "returns", "a", "signatureAndHash", "to", "sign", "a", "client", "s", "CertificateVerify", "with", "or", "an", "error", "if", "none", "can", "be", "found", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L315-L327
train
cloudflare/cfssl
scan/crypto/tls/prf.go
hashForClientCertificate
func (h finishedHash) hashForClientCertificate(signatureAndHash signatureAndHash, masterSecret []byte) ([]byte, crypto.Hash, error) { if (h.version == VersionSSL30 || h.version >= VersionTLS12) && h.buffer == nil { panic("a handshake hash for a client-certificate was requested after discarding the handshake buffer") } if h.version == VersionSSL30 { if signatureAndHash.signature != signatureRSA { return nil, 0, errors.New("tls: unsupported signature type for client certificate") } md5Hash := md5.New() md5Hash.Write(h.buffer) sha1Hash := sha1.New() sha1Hash.Write(h.buffer) return finishedSum30(md5Hash, sha1Hash, masterSecret, nil), crypto.MD5SHA1, nil } if h.version >= VersionTLS12 { hashAlg, err := lookupTLSHash(signatureAndHash.hash) if err != nil { return nil, 0, err } hash := hashAlg.New() hash.Write(h.buffer) return hash.Sum(nil), hashAlg, nil } if signatureAndHash.signature == signatureECDSA { return h.server.Sum(nil), crypto.SHA1, nil } return h.Sum(), crypto.MD5SHA1, nil }
go
func (h finishedHash) hashForClientCertificate(signatureAndHash signatureAndHash, masterSecret []byte) ([]byte, crypto.Hash, error) { if (h.version == VersionSSL30 || h.version >= VersionTLS12) && h.buffer == nil { panic("a handshake hash for a client-certificate was requested after discarding the handshake buffer") } if h.version == VersionSSL30 { if signatureAndHash.signature != signatureRSA { return nil, 0, errors.New("tls: unsupported signature type for client certificate") } md5Hash := md5.New() md5Hash.Write(h.buffer) sha1Hash := sha1.New() sha1Hash.Write(h.buffer) return finishedSum30(md5Hash, sha1Hash, masterSecret, nil), crypto.MD5SHA1, nil } if h.version >= VersionTLS12 { hashAlg, err := lookupTLSHash(signatureAndHash.hash) if err != nil { return nil, 0, err } hash := hashAlg.New() hash.Write(h.buffer) return hash.Sum(nil), hashAlg, nil } if signatureAndHash.signature == signatureECDSA { return h.server.Sum(nil), crypto.SHA1, nil } return h.Sum(), crypto.MD5SHA1, nil }
[ "func", "(", "h", "finishedHash", ")", "hashForClientCertificate", "(", "signatureAndHash", "signatureAndHash", ",", "masterSecret", "[", "]", "byte", ")", "(", "[", "]", "byte", ",", "crypto", ".", "Hash", ",", "error", ")", "{", "if", "(", "h", ".", "version", "==", "VersionSSL30", "||", "h", ".", "version", ">=", "VersionTLS12", ")", "&&", "h", ".", "buffer", "==", "nil", "{", "panic", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "h", ".", "version", "==", "VersionSSL30", "{", "if", "signatureAndHash", ".", "signature", "!=", "signatureRSA", "{", "return", "nil", ",", "0", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "md5Hash", ":=", "md5", ".", "New", "(", ")", "\n", "md5Hash", ".", "Write", "(", "h", ".", "buffer", ")", "\n", "sha1Hash", ":=", "sha1", ".", "New", "(", ")", "\n", "sha1Hash", ".", "Write", "(", "h", ".", "buffer", ")", "\n", "return", "finishedSum30", "(", "md5Hash", ",", "sha1Hash", ",", "masterSecret", ",", "nil", ")", ",", "crypto", ".", "MD5SHA1", ",", "nil", "\n", "}", "\n", "if", "h", ".", "version", ">=", "VersionTLS12", "{", "hashAlg", ",", "err", ":=", "lookupTLSHash", "(", "signatureAndHash", ".", "hash", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "0", ",", "err", "\n", "}", "\n", "hash", ":=", "hashAlg", ".", "New", "(", ")", "\n", "hash", ".", "Write", "(", "h", ".", "buffer", ")", "\n", "return", "hash", ".", "Sum", "(", "nil", ")", ",", "hashAlg", ",", "nil", "\n", "}", "\n\n", "if", "signatureAndHash", ".", "signature", "==", "signatureECDSA", "{", "return", "h", ".", "server", ".", "Sum", "(", "nil", ")", ",", "crypto", ".", "SHA1", ",", "nil", "\n", "}", "\n\n", "return", "h", ".", "Sum", "(", ")", ",", "crypto", ".", "MD5SHA1", ",", "nil", "\n", "}" ]
// hashForClientCertificate returns a digest, hash function, and TLS 1.2 hash // id suitable for signing by a TLS client certificate.
[ "hashForClientCertificate", "returns", "a", "digest", "hash", "function", "and", "TLS", "1", ".", "2", "hash", "id", "suitable", "for", "signing", "by", "a", "TLS", "client", "certificate", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/tls/prf.go#L331-L362
train
cloudflare/cfssl
transport/ca/localca/signer.go
CACertificate
func (lca *CA) CACertificate() ([]byte, error) { if lca.s == nil { return nil, errNotSetup } cert, err := lca.s.Certificate(lca.Label, lca.Profile) if err != nil { return nil, err } p := &pem.Block{ Type: "CERTIFICATE", Bytes: cert.Raw, } return pem.EncodeToMemory(p), nil }
go
func (lca *CA) CACertificate() ([]byte, error) { if lca.s == nil { return nil, errNotSetup } cert, err := lca.s.Certificate(lca.Label, lca.Profile) if err != nil { return nil, err } p := &pem.Block{ Type: "CERTIFICATE", Bytes: cert.Raw, } return pem.EncodeToMemory(p), nil }
[ "func", "(", "lca", "*", "CA", ")", "CACertificate", "(", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "if", "lca", ".", "s", "==", "nil", "{", "return", "nil", ",", "errNotSetup", "\n", "}", "\n\n", "cert", ",", "err", ":=", "lca", ".", "s", ".", "Certificate", "(", "lca", ".", "Label", ",", "lca", ".", "Profile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "p", ":=", "&", "pem", ".", "Block", "{", "Type", ":", "\"", "\"", ",", "Bytes", ":", "cert", ".", "Raw", ",", "}", "\n", "return", "pem", ".", "EncodeToMemory", "(", "p", ")", ",", "nil", "\n", "}" ]
// CACertificate returns the certificate authority's certificate.
[ "CACertificate", "returns", "the", "certificate", "authority", "s", "certificate", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/localca/signer.go#L48-L63
train
cloudflare/cfssl
transport/ca/localca/signer.go
ExampleRequest
func ExampleRequest() *csr.CertificateRequest { return &csr.CertificateRequest{ Hosts: []string{"localhost"}, KeyRequest: &csr.BasicKeyRequest{ A: "ecdsa", S: 256, }, CN: "Transport Failover Test Local CA", CA: &csr.CAConfig{ PathLength: 1, Expiry: "30m", }, } }
go
func ExampleRequest() *csr.CertificateRequest { return &csr.CertificateRequest{ Hosts: []string{"localhost"}, KeyRequest: &csr.BasicKeyRequest{ A: "ecdsa", S: 256, }, CN: "Transport Failover Test Local CA", CA: &csr.CAConfig{ PathLength: 1, Expiry: "30m", }, } }
[ "func", "ExampleRequest", "(", ")", "*", "csr", ".", "CertificateRequest", "{", "return", "&", "csr", ".", "CertificateRequest", "{", "Hosts", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "KeyRequest", ":", "&", "csr", ".", "BasicKeyRequest", "{", "A", ":", "\"", "\"", ",", "S", ":", "256", ",", "}", ",", "CN", ":", "\"", "\"", ",", "CA", ":", "&", "csr", ".", "CAConfig", "{", "PathLength", ":", "1", ",", "Expiry", ":", "\"", "\"", ",", "}", ",", "}", "\n", "}" ]
// ExampleRequest can be used as a sample request, or the returned // request can be modified.
[ "ExampleRequest", "can", "be", "used", "as", "a", "sample", "request", "or", "the", "returned", "request", "can", "be", "modified", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/localca/signer.go#L107-L120
train
cloudflare/cfssl
transport/ca/localca/signer.go
ExampleSigningConfig
func ExampleSigningConfig() *config.Signing { return &config.Signing{ Default: &config.SigningProfile{ Expiry: 15 * time.Minute, Usage: []string{ "server auth", "client auth", "signing", "key encipherment", }, }, } }
go
func ExampleSigningConfig() *config.Signing { return &config.Signing{ Default: &config.SigningProfile{ Expiry: 15 * time.Minute, Usage: []string{ "server auth", "client auth", "signing", "key encipherment", }, }, } }
[ "func", "ExampleSigningConfig", "(", ")", "*", "config", ".", "Signing", "{", "return", "&", "config", ".", "Signing", "{", "Default", ":", "&", "config", ".", "SigningProfile", "{", "Expiry", ":", "15", "*", "time", ".", "Minute", ",", "Usage", ":", "[", "]", "string", "{", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "}", ",", "}", ",", "}", "\n", "}" ]
// ExampleSigningConfig returns a sample config.Signing with only a // default profile.
[ "ExampleSigningConfig", "returns", "a", "sample", "config", ".", "Signing", "with", "only", "a", "default", "profile", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/localca/signer.go#L124-L134
train
cloudflare/cfssl
transport/ca/localca/signer.go
New
func New(req *csr.CertificateRequest, profiles *config.Signing) (*CA, error) { certPEM, _, keyPEM, err := initca.New(req) if err != nil { return nil, err } // If initca returns successfully, the following (which are // all CFSSL internal functions) should not return an // error. If they do, we should abort --- something about // CFSSL has become inconsistent, and it can't be trusted. priv, err := helpers.ParsePrivateKeyPEM(keyPEM) assert.NoError(err, "CFSSL-generated private key can't be parsed") cert, err := helpers.ParseCertificatePEM(certPEM) assert.NoError(err, "CFSSL-generated certificate can't be parsed") s, err := local.NewSigner(priv, cert, helpers.SignerAlgo(priv), profiles) assert.NoError(err, "a signer could not be constructed") return NewFromSigner(s), nil }
go
func New(req *csr.CertificateRequest, profiles *config.Signing) (*CA, error) { certPEM, _, keyPEM, err := initca.New(req) if err != nil { return nil, err } // If initca returns successfully, the following (which are // all CFSSL internal functions) should not return an // error. If they do, we should abort --- something about // CFSSL has become inconsistent, and it can't be trusted. priv, err := helpers.ParsePrivateKeyPEM(keyPEM) assert.NoError(err, "CFSSL-generated private key can't be parsed") cert, err := helpers.ParseCertificatePEM(certPEM) assert.NoError(err, "CFSSL-generated certificate can't be parsed") s, err := local.NewSigner(priv, cert, helpers.SignerAlgo(priv), profiles) assert.NoError(err, "a signer could not be constructed") return NewFromSigner(s), nil }
[ "func", "New", "(", "req", "*", "csr", ".", "CertificateRequest", ",", "profiles", "*", "config", ".", "Signing", ")", "(", "*", "CA", ",", "error", ")", "{", "certPEM", ",", "_", ",", "keyPEM", ",", "err", ":=", "initca", ".", "New", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// If initca returns successfully, the following (which are", "// all CFSSL internal functions) should not return an", "// error. If they do, we should abort --- something about", "// CFSSL has become inconsistent, and it can't be trusted.", "priv", ",", "err", ":=", "helpers", ".", "ParsePrivateKeyPEM", "(", "keyPEM", ")", "\n", "assert", ".", "NoError", "(", "err", ",", "\"", "\"", ")", "\n\n", "cert", ",", "err", ":=", "helpers", ".", "ParseCertificatePEM", "(", "certPEM", ")", "\n", "assert", ".", "NoError", "(", "err", ",", "\"", "\"", ")", "\n\n", "s", ",", "err", ":=", "local", ".", "NewSigner", "(", "priv", ",", "cert", ",", "helpers", ".", "SignerAlgo", "(", "priv", ")", ",", "profiles", ")", "\n", "assert", ".", "NoError", "(", "err", ",", "\"", "\"", ")", "\n\n", "return", "NewFromSigner", "(", "s", ")", ",", "nil", "\n", "}" ]
// New generates a new CA from a certificate request and signing profile.
[ "New", "generates", "a", "new", "CA", "from", "a", "certificate", "request", "and", "signing", "profile", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/localca/signer.go#L137-L158
train
cloudflare/cfssl
transport/ca/localca/signer.go
Load
func Load(lca *CA, profiles *config.Signing) (err error) { lca.s, err = local.NewSignerFromFile(lca.CertFile, lca.KeyFile, profiles) return err }
go
func Load(lca *CA, profiles *config.Signing) (err error) { lca.s, err = local.NewSignerFromFile(lca.CertFile, lca.KeyFile, profiles) return err }
[ "func", "Load", "(", "lca", "*", "CA", ",", "profiles", "*", "config", ".", "Signing", ")", "(", "err", "error", ")", "{", "lca", ".", "s", ",", "err", "=", "local", ".", "NewSignerFromFile", "(", "lca", ".", "CertFile", ",", "lca", ".", "KeyFile", ",", "profiles", ")", "\n", "return", "err", "\n", "}" ]
// Load reads the key and certificate from the files specified in the // CA.
[ "Load", "reads", "the", "key", "and", "certificate", "from", "the", "files", "specified", "in", "the", "CA", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/ca/localca/signer.go#L167-L170
train
cloudflare/cfssl
ubiquity/performance.go
hashPriority
func hashPriority(cert *x509.Certificate) int { switch cert.SignatureAlgorithm { case x509.ECDSAWithSHA1, x509.DSAWithSHA1, x509.SHA1WithRSA: return 10 case x509.ECDSAWithSHA256, x509.ECDSAWithSHA384, x509.ECDSAWithSHA512, x509.DSAWithSHA256, x509.SHA256WithRSA, x509.SHA384WithRSA, x509.SHA512WithRSA: return 100 default: return 0 } }
go
func hashPriority(cert *x509.Certificate) int { switch cert.SignatureAlgorithm { case x509.ECDSAWithSHA1, x509.DSAWithSHA1, x509.SHA1WithRSA: return 10 case x509.ECDSAWithSHA256, x509.ECDSAWithSHA384, x509.ECDSAWithSHA512, x509.DSAWithSHA256, x509.SHA256WithRSA, x509.SHA384WithRSA, x509.SHA512WithRSA: return 100 default: return 0 } }
[ "func", "hashPriority", "(", "cert", "*", "x509", ".", "Certificate", ")", "int", "{", "switch", "cert", ".", "SignatureAlgorithm", "{", "case", "x509", ".", "ECDSAWithSHA1", ",", "x509", ".", "DSAWithSHA1", ",", "x509", ".", "SHA1WithRSA", ":", "return", "10", "\n", "case", "x509", ".", "ECDSAWithSHA256", ",", "x509", ".", "ECDSAWithSHA384", ",", "x509", ".", "ECDSAWithSHA512", ",", "x509", ".", "DSAWithSHA256", ",", "x509", ".", "SHA256WithRSA", ",", "x509", ".", "SHA384WithRSA", ",", "x509", ".", "SHA512WithRSA", ":", "return", "100", "\n", "default", ":", "return", "0", "\n", "}", "\n", "}" ]
// Compute the priority of different hash algorithm based on security // SHA2 > SHA1 >> MD = Others = Unknown
[ "Compute", "the", "priority", "of", "different", "hash", "algorithm", "based", "on", "security", "SHA2", ">", "SHA1", ">>", "MD", "=", "Others", "=", "Unknown" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L16-L27
train
cloudflare/cfssl
ubiquity/performance.go
keyAlgoPriority
func keyAlgoPriority(cert *x509.Certificate) int { switch cert.PublicKeyAlgorithm { case x509.ECDSA: switch cert.PublicKey.(*ecdsa.PublicKey).Curve { case elliptic.P256(): return 100 case elliptic.P384(): return 120 case elliptic.P521(): return 140 default: return 100 } case x509.RSA: switch cert.PublicKey.(*rsa.PublicKey).N.BitLen() { case 4096: return 70 case 3072: return 50 case 2048: return 30 // key size <= 1024 are discouraged. default: return 0 } // we do not want to bundle a DSA cert. case x509.DSA: return 0 default: return 0 } }
go
func keyAlgoPriority(cert *x509.Certificate) int { switch cert.PublicKeyAlgorithm { case x509.ECDSA: switch cert.PublicKey.(*ecdsa.PublicKey).Curve { case elliptic.P256(): return 100 case elliptic.P384(): return 120 case elliptic.P521(): return 140 default: return 100 } case x509.RSA: switch cert.PublicKey.(*rsa.PublicKey).N.BitLen() { case 4096: return 70 case 3072: return 50 case 2048: return 30 // key size <= 1024 are discouraged. default: return 0 } // we do not want to bundle a DSA cert. case x509.DSA: return 0 default: return 0 } }
[ "func", "keyAlgoPriority", "(", "cert", "*", "x509", ".", "Certificate", ")", "int", "{", "switch", "cert", ".", "PublicKeyAlgorithm", "{", "case", "x509", ".", "ECDSA", ":", "switch", "cert", ".", "PublicKey", ".", "(", "*", "ecdsa", ".", "PublicKey", ")", ".", "Curve", "{", "case", "elliptic", ".", "P256", "(", ")", ":", "return", "100", "\n", "case", "elliptic", ".", "P384", "(", ")", ":", "return", "120", "\n", "case", "elliptic", ".", "P521", "(", ")", ":", "return", "140", "\n", "default", ":", "return", "100", "\n", "}", "\n", "case", "x509", ".", "RSA", ":", "switch", "cert", ".", "PublicKey", ".", "(", "*", "rsa", ".", "PublicKey", ")", ".", "N", ".", "BitLen", "(", ")", "{", "case", "4096", ":", "return", "70", "\n", "case", "3072", ":", "return", "50", "\n", "case", "2048", ":", "return", "30", "\n", "// key size <= 1024 are discouraged.", "default", ":", "return", "0", "\n", "}", "\n", "// we do not want to bundle a DSA cert.", "case", "x509", ".", "DSA", ":", "return", "0", "\n", "default", ":", "return", "0", "\n", "}", "\n", "}" ]
// Compute the priority of different key algorithm based performance and security // ECDSA>RSA>DSA>Unknown
[ "Compute", "the", "priority", "of", "different", "key", "algorithm", "based", "performance", "and", "security", "ECDSA", ">", "RSA", ">", "DSA", ">", "Unknown" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L31-L62
train
cloudflare/cfssl
ubiquity/performance.go
HashPriority
func HashPriority(certs []*x509.Certificate) int { ret := 0.0 for i, cert := range certs { f1 := 1.0 / (float64(i) + 1.0) f2 := 1.0 - f1 ret = ret*f2 + float64(hashPriority(cert))*f1 } return int(ret) }
go
func HashPriority(certs []*x509.Certificate) int { ret := 0.0 for i, cert := range certs { f1 := 1.0 / (float64(i) + 1.0) f2 := 1.0 - f1 ret = ret*f2 + float64(hashPriority(cert))*f1 } return int(ret) }
[ "func", "HashPriority", "(", "certs", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "ret", ":=", "0.0", "\n", "for", "i", ",", "cert", ":=", "range", "certs", "{", "f1", ":=", "1.0", "/", "(", "float64", "(", "i", ")", "+", "1.0", ")", "\n", "f2", ":=", "1.0", "-", "f1", "\n", "ret", "=", "ret", "*", "f2", "+", "float64", "(", "hashPriority", "(", "cert", ")", ")", "*", "f1", "\n", "}", "\n", "return", "int", "(", "ret", ")", "\n", "}" ]
// HashPriority returns the hash priority of the chain as the average of hash priority of certs in it.
[ "HashPriority", "returns", "the", "hash", "priority", "of", "the", "chain", "as", "the", "average", "of", "hash", "priority", "of", "certs", "in", "it", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L65-L73
train
cloudflare/cfssl
ubiquity/performance.go
KeyAlgoPriority
func KeyAlgoPriority(certs []*x509.Certificate) int { ret := 0.0 for i, cert := range certs { f1 := 1.0 / (float64(i) + 1.0) f2 := 1.0 - f1 ret = float64(keyAlgoPriority(cert))*f1 + ret*f2 } return int(ret) }
go
func KeyAlgoPriority(certs []*x509.Certificate) int { ret := 0.0 for i, cert := range certs { f1 := 1.0 / (float64(i) + 1.0) f2 := 1.0 - f1 ret = float64(keyAlgoPriority(cert))*f1 + ret*f2 } return int(ret) }
[ "func", "KeyAlgoPriority", "(", "certs", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "ret", ":=", "0.0", "\n", "for", "i", ",", "cert", ":=", "range", "certs", "{", "f1", ":=", "1.0", "/", "(", "float64", "(", "i", ")", "+", "1.0", ")", "\n", "f2", ":=", "1.0", "-", "f1", "\n", "ret", "=", "float64", "(", "keyAlgoPriority", "(", "cert", ")", ")", "*", "f1", "+", "ret", "*", "f2", "\n", "}", "\n", "return", "int", "(", "ret", ")", "\n", "}" ]
// KeyAlgoPriority returns the key algorithm priority of the chain as the average of key algorithm priority of certs in it.
[ "KeyAlgoPriority", "returns", "the", "key", "algorithm", "priority", "of", "the", "chain", "as", "the", "average", "of", "key", "algorithm", "priority", "of", "certs", "in", "it", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L76-L84
train
cloudflare/cfssl
ubiquity/performance.go
CompareChainHashPriority
func CompareChainHashPriority(chain1, chain2 []*x509.Certificate) int { hp1 := HashPriority(chain1) hp2 := HashPriority(chain2) return hp1 - hp2 }
go
func CompareChainHashPriority(chain1, chain2 []*x509.Certificate) int { hp1 := HashPriority(chain1) hp2 := HashPriority(chain2) return hp1 - hp2 }
[ "func", "CompareChainHashPriority", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "hp1", ":=", "HashPriority", "(", "chain1", ")", "\n", "hp2", ":=", "HashPriority", "(", "chain2", ")", "\n", "return", "hp1", "-", "hp2", "\n", "}" ]
// CompareChainHashPriority ranks chains with more current hash functions higher.
[ "CompareChainHashPriority", "ranks", "chains", "with", "more", "current", "hash", "functions", "higher", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L87-L91
train
cloudflare/cfssl
ubiquity/performance.go
CompareChainKeyAlgoPriority
func CompareChainKeyAlgoPriority(chain1, chain2 []*x509.Certificate) int { kap1 := KeyAlgoPriority(chain1) kap2 := KeyAlgoPriority(chain2) return kap1 - kap2 }
go
func CompareChainKeyAlgoPriority(chain1, chain2 []*x509.Certificate) int { kap1 := KeyAlgoPriority(chain1) kap2 := KeyAlgoPriority(chain2) return kap1 - kap2 }
[ "func", "CompareChainKeyAlgoPriority", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "kap1", ":=", "KeyAlgoPriority", "(", "chain1", ")", "\n", "kap2", ":=", "KeyAlgoPriority", "(", "chain2", ")", "\n", "return", "kap1", "-", "kap2", "\n", "}" ]
// CompareChainKeyAlgoPriority ranks chains with more current key algorithm higher.
[ "CompareChainKeyAlgoPriority", "ranks", "chains", "with", "more", "current", "key", "algorithm", "higher", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L94-L98
train
cloudflare/cfssl
ubiquity/performance.go
CompareChainCryptoSuite
func CompareChainCryptoSuite(chain1, chain2 []*x509.Certificate) int { cs1 := HashPriority(chain1) + KeyAlgoPriority(chain1) cs2 := HashPriority(chain2) + KeyAlgoPriority(chain2) return cs1 - cs2 }
go
func CompareChainCryptoSuite(chain1, chain2 []*x509.Certificate) int { cs1 := HashPriority(chain1) + KeyAlgoPriority(chain1) cs2 := HashPriority(chain2) + KeyAlgoPriority(chain2) return cs1 - cs2 }
[ "func", "CompareChainCryptoSuite", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "cs1", ":=", "HashPriority", "(", "chain1", ")", "+", "KeyAlgoPriority", "(", "chain1", ")", "\n", "cs2", ":=", "HashPriority", "(", "chain2", ")", "+", "KeyAlgoPriority", "(", "chain2", ")", "\n", "return", "cs1", "-", "cs2", "\n", "}" ]
// CompareChainCryptoSuite ranks chains with more current crypto suite higher.
[ "CompareChainCryptoSuite", "ranks", "chains", "with", "more", "current", "crypto", "suite", "higher", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L101-L105
train
cloudflare/cfssl
ubiquity/performance.go
CompareChainLength
func CompareChainLength(chain1, chain2 []*x509.Certificate) int { return len(chain2) - len(chain1) }
go
func CompareChainLength(chain1, chain2 []*x509.Certificate) int { return len(chain2) - len(chain1) }
[ "func", "CompareChainLength", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "return", "len", "(", "chain2", ")", "-", "len", "(", "chain1", ")", "\n", "}" ]
// CompareChainLength ranks shorter chain higher.
[ "CompareChainLength", "ranks", "shorter", "chain", "higher", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L108-L110
train
cloudflare/cfssl
ubiquity/performance.go
CompareChainExpiry
func CompareChainExpiry(chain1, chain2 []*x509.Certificate) int { t1 := helpers.ExpiryTime(chain1) t2 := helpers.ExpiryTime(chain2) return compareTime(t1, t2) }
go
func CompareChainExpiry(chain1, chain2 []*x509.Certificate) int { t1 := helpers.ExpiryTime(chain1) t2 := helpers.ExpiryTime(chain2) return compareTime(t1, t2) }
[ "func", "CompareChainExpiry", "(", "chain1", ",", "chain2", "[", "]", "*", "x509", ".", "Certificate", ")", "int", "{", "t1", ":=", "helpers", ".", "ExpiryTime", "(", "chain1", ")", "\n", "t2", ":=", "helpers", ".", "ExpiryTime", "(", "chain2", ")", "\n", "return", "compareTime", "(", "t1", ",", "t2", ")", "\n", "}" ]
// CompareChainExpiry ranks chain that lasts longer higher.
[ "CompareChainExpiry", "ranks", "chain", "that", "lasts", "longer", "higher", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/performance.go#L122-L126
train
cloudflare/cfssl
cli/version/version.go
versionMain
func versionMain(args []string, c cli.Config) (err error) { fmt.Printf("%s", FormatVersion()) return nil }
go
func versionMain(args []string, c cli.Config) (err error) { fmt.Printf("%s", FormatVersion()) return nil }
[ "func", "versionMain", "(", "args", "[", "]", "string", ",", "c", "cli", ".", "Config", ")", "(", "err", "error", ")", "{", "fmt", ".", "Printf", "(", "\"", "\"", ",", "FormatVersion", "(", ")", ")", "\n", "return", "nil", "\n", "}" ]
// The main functionality of 'cfssl version' is to print out the version info.
[ "The", "main", "functionality", "of", "cfssl", "version", "is", "to", "print", "out", "the", "version", "info", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/version/version.go#L36-L39
train
cloudflare/cfssl
transport/roots/system/root.go
New
func New(metadata map[string]string) ([]*x509.Certificate, error) { roots := initSystemRoots() if len(roots) == 0 { return nil, errors.New("transport: unable to find system roots") } return roots, nil }
go
func New(metadata map[string]string) ([]*x509.Certificate, error) { roots := initSystemRoots() if len(roots) == 0 { return nil, errors.New("transport: unable to find system roots") } return roots, nil }
[ "func", "New", "(", "metadata", "map", "[", "string", "]", "string", ")", "(", "[", "]", "*", "x509", ".", "Certificate", ",", "error", ")", "{", "roots", ":=", "initSystemRoots", "(", ")", "\n", "if", "len", "(", "roots", ")", "==", "0", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "roots", ",", "nil", "\n", "}" ]
// New returns a new certificate pool loaded with the system // roots. The provided argument is not used; it is included for // compatibility with other functions.
[ "New", "returns", "a", "new", "certificate", "pool", "loaded", "with", "the", "system", "roots", ".", "The", "provided", "argument", "is", "not", "used", ";", "it", "is", "included", "for", "compatibility", "with", "other", "functions", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/roots/system/root.go#L41-L47
train
cloudflare/cfssl
cli/ocsprefresh/ocsprefresh.go
ocsprefreshMain
func ocsprefreshMain(args []string, c cli.Config) error { if c.DBConfigFile == "" { return errors.New("need DB config file (provide with -db-config)") } if c.ResponderFile == "" { return errors.New("need responder certificate (provide with -responder)") } if c.ResponderKeyFile == "" { return errors.New("need responder key (provide with -responder-key)") } if c.CAFile == "" { return errors.New("need CA certificate (provide with -ca)") } s, err := SignerFromConfig(c) if err != nil { log.Critical("Unable to create OCSP signer: ", err) return err } db, err := dbconf.DBFromConfig(c.DBConfigFile) if err != nil { return err } dbAccessor := sql.NewAccessor(db) certs, err := dbAccessor.GetUnexpiredCertificates() if err != nil { return err } // Set an expiry timestamp for all certificates refreshed in this batch ocspExpiry := time.Now().Add(c.Interval) for _, certRecord := range certs { cert, err := helpers.ParseCertificatePEM([]byte(certRecord.PEM)) if err != nil { log.Critical("Unable to parse certificate: ", err) return err } req := ocsp.SignRequest{ Certificate: cert, Status: certRecord.Status, } if certRecord.Status == "revoked" { req.Reason = int(certRecord.Reason) req.RevokedAt = certRecord.RevokedAt } resp, err := s.Sign(req) if err != nil { log.Critical("Unable to sign OCSP response: ", err) return err } err = dbAccessor.UpsertOCSP(cert.SerialNumber.String(), hex.EncodeToString(cert.AuthorityKeyId), string(resp), ocspExpiry) if err != nil { log.Critical("Unable to save OCSP response: ", err) return err } } return nil }
go
func ocsprefreshMain(args []string, c cli.Config) error { if c.DBConfigFile == "" { return errors.New("need DB config file (provide with -db-config)") } if c.ResponderFile == "" { return errors.New("need responder certificate (provide with -responder)") } if c.ResponderKeyFile == "" { return errors.New("need responder key (provide with -responder-key)") } if c.CAFile == "" { return errors.New("need CA certificate (provide with -ca)") } s, err := SignerFromConfig(c) if err != nil { log.Critical("Unable to create OCSP signer: ", err) return err } db, err := dbconf.DBFromConfig(c.DBConfigFile) if err != nil { return err } dbAccessor := sql.NewAccessor(db) certs, err := dbAccessor.GetUnexpiredCertificates() if err != nil { return err } // Set an expiry timestamp for all certificates refreshed in this batch ocspExpiry := time.Now().Add(c.Interval) for _, certRecord := range certs { cert, err := helpers.ParseCertificatePEM([]byte(certRecord.PEM)) if err != nil { log.Critical("Unable to parse certificate: ", err) return err } req := ocsp.SignRequest{ Certificate: cert, Status: certRecord.Status, } if certRecord.Status == "revoked" { req.Reason = int(certRecord.Reason) req.RevokedAt = certRecord.RevokedAt } resp, err := s.Sign(req) if err != nil { log.Critical("Unable to sign OCSP response: ", err) return err } err = dbAccessor.UpsertOCSP(cert.SerialNumber.String(), hex.EncodeToString(cert.AuthorityKeyId), string(resp), ocspExpiry) if err != nil { log.Critical("Unable to save OCSP response: ", err) return err } } return nil }
[ "func", "ocsprefreshMain", "(", "args", "[", "]", "string", ",", "c", "cli", ".", "Config", ")", "error", "{", "if", "c", ".", "DBConfigFile", "==", "\"", "\"", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "c", ".", "ResponderFile", "==", "\"", "\"", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "c", ".", "ResponderKeyFile", "==", "\"", "\"", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "c", ".", "CAFile", "==", "\"", "\"", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "s", ",", "err", ":=", "SignerFromConfig", "(", "c", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Critical", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n\n", "db", ",", "err", ":=", "dbconf", ".", "DBFromConfig", "(", "c", ".", "DBConfigFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "dbAccessor", ":=", "sql", ".", "NewAccessor", "(", "db", ")", "\n", "certs", ",", "err", ":=", "dbAccessor", ".", "GetUnexpiredCertificates", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// Set an expiry timestamp for all certificates refreshed in this batch", "ocspExpiry", ":=", "time", ".", "Now", "(", ")", ".", "Add", "(", "c", ".", "Interval", ")", "\n", "for", "_", ",", "certRecord", ":=", "range", "certs", "{", "cert", ",", "err", ":=", "helpers", ".", "ParseCertificatePEM", "(", "[", "]", "byte", "(", "certRecord", ".", "PEM", ")", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Critical", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n\n", "req", ":=", "ocsp", ".", "SignRequest", "{", "Certificate", ":", "cert", ",", "Status", ":", "certRecord", ".", "Status", ",", "}", "\n\n", "if", "certRecord", ".", "Status", "==", "\"", "\"", "{", "req", ".", "Reason", "=", "int", "(", "certRecord", ".", "Reason", ")", "\n", "req", ".", "RevokedAt", "=", "certRecord", ".", "RevokedAt", "\n", "}", "\n\n", "resp", ",", "err", ":=", "s", ".", "Sign", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Critical", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n\n", "err", "=", "dbAccessor", ".", "UpsertOCSP", "(", "cert", ".", "SerialNumber", ".", "String", "(", ")", ",", "hex", ".", "EncodeToString", "(", "cert", ".", "AuthorityKeyId", ")", ",", "string", "(", "resp", ")", ",", "ocspExpiry", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Critical", "(", "\"", "\"", ",", "err", ")", "\n", "return", "err", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// ocsprefreshMain is the main CLI of OCSP refresh functionality.
[ "ocsprefreshMain", "is", "the", "main", "CLI", "of", "OCSP", "refresh", "functionality", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/ocsprefresh/ocsprefresh.go#L31-L98
train
cloudflare/cfssl
ubiquity/filter.go
Filter
func Filter(chains [][]*x509.Certificate, f RankingFunc) [][]*x509.Certificate { // If there are no chain or only 1 chain, we are done. if len(chains) <= 1 { return chains } bestChain := chains[0] var candidateChains [][]*x509.Certificate for _, chain := range chains { r := f(bestChain, chain) if r < 0 { bestChain = chain candidateChains = [][]*x509.Certificate{chain} } else if r == 0 { candidateChains = append(candidateChains, chain) } } return candidateChains }
go
func Filter(chains [][]*x509.Certificate, f RankingFunc) [][]*x509.Certificate { // If there are no chain or only 1 chain, we are done. if len(chains) <= 1 { return chains } bestChain := chains[0] var candidateChains [][]*x509.Certificate for _, chain := range chains { r := f(bestChain, chain) if r < 0 { bestChain = chain candidateChains = [][]*x509.Certificate{chain} } else if r == 0 { candidateChains = append(candidateChains, chain) } } return candidateChains }
[ "func", "Filter", "(", "chains", "[", "]", "[", "]", "*", "x509", ".", "Certificate", ",", "f", "RankingFunc", ")", "[", "]", "[", "]", "*", "x509", ".", "Certificate", "{", "// If there are no chain or only 1 chain, we are done.", "if", "len", "(", "chains", ")", "<=", "1", "{", "return", "chains", "\n", "}", "\n\n", "bestChain", ":=", "chains", "[", "0", "]", "\n", "var", "candidateChains", "[", "]", "[", "]", "*", "x509", ".", "Certificate", "\n", "for", "_", ",", "chain", ":=", "range", "chains", "{", "r", ":=", "f", "(", "bestChain", ",", "chain", ")", "\n", "if", "r", "<", "0", "{", "bestChain", "=", "chain", "\n", "candidateChains", "=", "[", "]", "[", "]", "*", "x509", ".", "Certificate", "{", "chain", "}", "\n", "}", "else", "if", "r", "==", "0", "{", "candidateChains", "=", "append", "(", "candidateChains", ",", "chain", ")", "\n", "}", "\n", "}", "\n", "return", "candidateChains", "\n", "}" ]
// Filter filters out the chains with highest rank according to the ranking function f.
[ "Filter", "filters", "out", "the", "chains", "with", "highest", "rank", "according", "to", "the", "ranking", "function", "f", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/filter.go#L18-L36
train
cloudflare/cfssl
scan/crypto/crypto.go
Size
func (h Hash) Size() int { if h > 0 && h < maxHash { return int(digestSizes[h]) } panic("crypto: Size of unknown hash function") }
go
func (h Hash) Size() int { if h > 0 && h < maxHash { return int(digestSizes[h]) } panic("crypto: Size of unknown hash function") }
[ "func", "(", "h", "Hash", ")", "Size", "(", ")", "int", "{", "if", "h", ">", "0", "&&", "h", "<", "maxHash", "{", "return", "int", "(", "digestSizes", "[", "h", "]", ")", "\n", "}", "\n", "panic", "(", "\"", "\"", ")", "\n", "}" ]
// Size returns the length, in bytes, of a digest resulting from the given hash // function. It doesn't require that the hash function in question be linked // into the program.
[ "Size", "returns", "the", "length", "in", "bytes", "of", "a", "digest", "resulting", "from", "the", "given", "hash", "function", ".", "It", "doesn", "t", "require", "that", "the", "hash", "function", "in", "question", "be", "linked", "into", "the", "program", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/crypto.go#L63-L68
train
cloudflare/cfssl
selfsign/selfsign.go
parseCertificateRequest
func parseCertificateRequest(priv crypto.Signer, csrBytes []byte) (template *x509.Certificate, err error) { csr, err := x509.ParseCertificateRequest(csrBytes) if err != nil { err = cferr.Wrap(cferr.CSRError, cferr.ParseFailed, err) return } csr.CheckSignature() if err != nil { err = cferr.Wrap(cferr.CSRError, cferr.KeyMismatch, err) return } template = &x509.Certificate{ Subject: csr.Subject, PublicKeyAlgorithm: csr.PublicKeyAlgorithm, PublicKey: csr.PublicKey, SignatureAlgorithm: signer.DefaultSigAlgo(priv), } return }
go
func parseCertificateRequest(priv crypto.Signer, csrBytes []byte) (template *x509.Certificate, err error) { csr, err := x509.ParseCertificateRequest(csrBytes) if err != nil { err = cferr.Wrap(cferr.CSRError, cferr.ParseFailed, err) return } csr.CheckSignature() if err != nil { err = cferr.Wrap(cferr.CSRError, cferr.KeyMismatch, err) return } template = &x509.Certificate{ Subject: csr.Subject, PublicKeyAlgorithm: csr.PublicKeyAlgorithm, PublicKey: csr.PublicKey, SignatureAlgorithm: signer.DefaultSigAlgo(priv), } return }
[ "func", "parseCertificateRequest", "(", "priv", "crypto", ".", "Signer", ",", "csrBytes", "[", "]", "byte", ")", "(", "template", "*", "x509", ".", "Certificate", ",", "err", "error", ")", "{", "csr", ",", "err", ":=", "x509", ".", "ParseCertificateRequest", "(", "csrBytes", ")", "\n", "if", "err", "!=", "nil", "{", "err", "=", "cferr", ".", "Wrap", "(", "cferr", ".", "CSRError", ",", "cferr", ".", "ParseFailed", ",", "err", ")", "\n", "return", "\n", "}", "\n\n", "csr", ".", "CheckSignature", "(", ")", "\n", "if", "err", "!=", "nil", "{", "err", "=", "cferr", ".", "Wrap", "(", "cferr", ".", "CSRError", ",", "cferr", ".", "KeyMismatch", ",", "err", ")", "\n", "return", "\n", "}", "\n\n", "template", "=", "&", "x509", ".", "Certificate", "{", "Subject", ":", "csr", ".", "Subject", ",", "PublicKeyAlgorithm", ":", "csr", ".", "PublicKeyAlgorithm", ",", "PublicKey", ":", "csr", ".", "PublicKey", ",", "SignatureAlgorithm", ":", "signer", ".", "DefaultSigAlgo", "(", "priv", ")", ",", "}", "\n\n", "return", "\n", "}" ]
// parseCertificateRequest takes an incoming certificate request and // builds a certificate template from it.
[ "parseCertificateRequest", "takes", "an", "incoming", "certificate", "request", "and", "builds", "a", "certificate", "template", "from", "it", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/selfsign/selfsign.go#L27-L49
train
cloudflare/cfssl
cli/serve/serve.go
Open
func (hb *httpBox) Open(name string) (http.File, error) { if strings.HasPrefix(name, V1APIPrefix) { return nil, os.ErrNotExist } if location, ok := hb.redirects[name]; ok { return hb.Box.Open(location) } return hb.Box.Open(name) }
go
func (hb *httpBox) Open(name string) (http.File, error) { if strings.HasPrefix(name, V1APIPrefix) { return nil, os.ErrNotExist } if location, ok := hb.redirects[name]; ok { return hb.Box.Open(location) } return hb.Box.Open(name) }
[ "func", "(", "hb", "*", "httpBox", ")", "Open", "(", "name", "string", ")", "(", "http", ".", "File", ",", "error", ")", "{", "if", "strings", ".", "HasPrefix", "(", "name", ",", "V1APIPrefix", ")", "{", "return", "nil", ",", "os", ".", "ErrNotExist", "\n", "}", "\n\n", "if", "location", ",", "ok", ":=", "hb", ".", "redirects", "[", "name", "]", ";", "ok", "{", "return", "hb", ".", "Box", ".", "Open", "(", "location", ")", "\n", "}", "\n\n", "return", "hb", ".", "Box", ".", "Open", "(", "name", ")", "\n", "}" ]
// Open returns a File for non-API enpoints using the http.File interface.
[ "Open", "returns", "a", "File", "for", "non", "-", "API", "enpoints", "using", "the", "http", ".", "File", "interface", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/serve/serve.go#L96-L106
train
cloudflare/cfssl
cli/serve/serve.go
registerHandlers
func registerHandlers() { disabled := make(map[string]bool) if conf.Disable != "" { for _, endpoint := range strings.Split(conf.Disable, ",") { disabled[endpoint] = true } } for path, getHandler := range endpoints { log.Debugf("getHandler for %s", path) if _, ok := disabled[path]; ok { log.Infof("endpoint '%s' is explicitly disabled", path) } else if handler, err := getHandler(); err != nil { log.Warningf("endpoint '%s' is disabled: %v", path, err) } else { if path, handler, err = wrapHandler(path, handler, err); err != nil { log.Warningf("endpoint '%s' is disabled by wrapper: %v", path, err) } else { log.Infof("endpoint '%s' is enabled", path) http.Handle(path, handler) } } } log.Info("Handler set up complete.") }
go
func registerHandlers() { disabled := make(map[string]bool) if conf.Disable != "" { for _, endpoint := range strings.Split(conf.Disable, ",") { disabled[endpoint] = true } } for path, getHandler := range endpoints { log.Debugf("getHandler for %s", path) if _, ok := disabled[path]; ok { log.Infof("endpoint '%s' is explicitly disabled", path) } else if handler, err := getHandler(); err != nil { log.Warningf("endpoint '%s' is disabled: %v", path, err) } else { if path, handler, err = wrapHandler(path, handler, err); err != nil { log.Warningf("endpoint '%s' is disabled by wrapper: %v", path, err) } else { log.Infof("endpoint '%s' is enabled", path) http.Handle(path, handler) } } } log.Info("Handler set up complete.") }
[ "func", "registerHandlers", "(", ")", "{", "disabled", ":=", "make", "(", "map", "[", "string", "]", "bool", ")", "\n", "if", "conf", ".", "Disable", "!=", "\"", "\"", "{", "for", "_", ",", "endpoint", ":=", "range", "strings", ".", "Split", "(", "conf", ".", "Disable", ",", "\"", "\"", ")", "{", "disabled", "[", "endpoint", "]", "=", "true", "\n", "}", "\n", "}", "\n\n", "for", "path", ",", "getHandler", ":=", "range", "endpoints", "{", "log", ".", "Debugf", "(", "\"", "\"", ",", "path", ")", "\n\n", "if", "_", ",", "ok", ":=", "disabled", "[", "path", "]", ";", "ok", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "path", ")", "\n", "}", "else", "if", "handler", ",", "err", ":=", "getHandler", "(", ")", ";", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "path", ",", "err", ")", "\n", "}", "else", "{", "if", "path", ",", "handler", ",", "err", "=", "wrapHandler", "(", "path", ",", "handler", ",", "err", ")", ";", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "path", ",", "err", ")", "\n", "}", "else", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "path", ")", "\n", "http", ".", "Handle", "(", "path", ",", "handler", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "}" ]
// registerHandlers instantiates various handlers and associate them to corresponding endpoints.
[ "registerHandlers", "instantiates", "various", "handlers", "and", "associate", "them", "to", "corresponding", "endpoints", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/serve/serve.go#L256-L281
train
cloudflare/cfssl
cli/serve/serve.go
defaultWrapHandler
func defaultWrapHandler(path string, handler http.Handler, err error) (string, http.Handler, error) { return v1APIPath(path), handler, err }
go
func defaultWrapHandler(path string, handler http.Handler, err error) (string, http.Handler, error) { return v1APIPath(path), handler, err }
[ "func", "defaultWrapHandler", "(", "path", "string", ",", "handler", "http", ".", "Handler", ",", "err", "error", ")", "(", "string", ",", "http", ".", "Handler", ",", "error", ")", "{", "return", "v1APIPath", "(", "path", ")", ",", "handler", ",", "err", "\n", "}" ]
// The default wrapper simply returns the normal handler and prefixes the path appropriately
[ "The", "default", "wrapper", "simply", "returns", "the", "normal", "handler", "and", "prefixes", "the", "path", "appropriately" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/serve/serve.go#L379-L381
train
cloudflare/cfssl
cli/serve/serve.go
SetWrapHandler
func SetWrapHandler(wh func(path string, handler http.Handler, err error) (string, http.Handler, error)) { wrapHandler = wh }
go
func SetWrapHandler(wh func(path string, handler http.Handler, err error) (string, http.Handler, error)) { wrapHandler = wh }
[ "func", "SetWrapHandler", "(", "wh", "func", "(", "path", "string", ",", "handler", "http", ".", "Handler", ",", "err", "error", ")", "(", "string", ",", "http", ".", "Handler", ",", "error", ")", ")", "{", "wrapHandler", "=", "wh", "\n", "}" ]
// SetWrapHandler sets the wrap handler which is called for all endpoints // A custom wrap handler may be provided in order to add arbitrary server-side pre or post processing // of server-side HTTP handling of requests.
[ "SetWrapHandler", "sets", "the", "wrap", "handler", "which", "is", "called", "for", "all", "endpoints", "A", "custom", "wrap", "handler", "may", "be", "provided", "in", "order", "to", "add", "arbitrary", "server", "-", "side", "pre", "or", "post", "processing", "of", "server", "-", "side", "HTTP", "handling", "of", "requests", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/cli/serve/serve.go#L386-L388
train
cloudflare/cfssl
transport/example/maserver/server.go
main
func main() { var addr, conf string flag.StringVar(&addr, "a", "127.0.0.1:9876", "`address` of server") flag.StringVar(&conf, "f", "server.json", "config `file` to use") flag.Parse() var id = new(core.Identity) data, err := ioutil.ReadFile(conf) if err != nil { exlib.Err(1, err, "reading config file") } err = json.Unmarshal(data, id) if err != nil { exlib.Err(1, err, "parsing config file") } tr, err := transport.New(exlib.Before, id) if err != nil { exlib.Err(1, err, "creating transport") } l, err := transport.Listen(addr, tr) if err != nil { exlib.Err(1, err, "setting up listener") } var errChan = make(chan error, 0) go func(ec <-chan error) { for { err, ok := <-ec if !ok { log.Warning("error channel closed, future errors will not be reported") break } log.Errorf("auto update error: %v", err) } }(errChan) log.Info("setting up auto-update") go l.AutoUpdate(nil, errChan) log.Info("listening on ", addr) exlib.Warn(serve(l), "serving listener") }
go
func main() { var addr, conf string flag.StringVar(&addr, "a", "127.0.0.1:9876", "`address` of server") flag.StringVar(&conf, "f", "server.json", "config `file` to use") flag.Parse() var id = new(core.Identity) data, err := ioutil.ReadFile(conf) if err != nil { exlib.Err(1, err, "reading config file") } err = json.Unmarshal(data, id) if err != nil { exlib.Err(1, err, "parsing config file") } tr, err := transport.New(exlib.Before, id) if err != nil { exlib.Err(1, err, "creating transport") } l, err := transport.Listen(addr, tr) if err != nil { exlib.Err(1, err, "setting up listener") } var errChan = make(chan error, 0) go func(ec <-chan error) { for { err, ok := <-ec if !ok { log.Warning("error channel closed, future errors will not be reported") break } log.Errorf("auto update error: %v", err) } }(errChan) log.Info("setting up auto-update") go l.AutoUpdate(nil, errChan) log.Info("listening on ", addr) exlib.Warn(serve(l), "serving listener") }
[ "func", "main", "(", ")", "{", "var", "addr", ",", "conf", "string", "\n", "flag", ".", "StringVar", "(", "&", "addr", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "flag", ".", "StringVar", "(", "&", "conf", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "flag", ".", "Parse", "(", ")", "\n\n", "var", "id", "=", "new", "(", "core", ".", "Identity", ")", "\n", "data", ",", "err", ":=", "ioutil", ".", "ReadFile", "(", "conf", ")", "\n", "if", "err", "!=", "nil", "{", "exlib", ".", "Err", "(", "1", ",", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "err", "=", "json", ".", "Unmarshal", "(", "data", ",", "id", ")", "\n", "if", "err", "!=", "nil", "{", "exlib", ".", "Err", "(", "1", ",", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "tr", ",", "err", ":=", "transport", ".", "New", "(", "exlib", ".", "Before", ",", "id", ")", "\n", "if", "err", "!=", "nil", "{", "exlib", ".", "Err", "(", "1", ",", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "l", ",", "err", ":=", "transport", ".", "Listen", "(", "addr", ",", "tr", ")", "\n", "if", "err", "!=", "nil", "{", "exlib", ".", "Err", "(", "1", ",", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "var", "errChan", "=", "make", "(", "chan", "error", ",", "0", ")", "\n", "go", "func", "(", "ec", "<-", "chan", "error", ")", "{", "for", "{", "err", ",", "ok", ":=", "<-", "ec", "\n", "if", "!", "ok", "{", "log", ".", "Warning", "(", "\"", "\"", ")", "\n", "break", "\n", "}", "\n", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "(", "errChan", ")", "\n\n", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "go", "l", ".", "AutoUpdate", "(", "nil", ",", "errChan", ")", "\n\n", "log", ".", "Info", "(", "\"", "\"", ",", "addr", ")", "\n", "exlib", ".", "Warn", "(", "serve", "(", "l", ")", ",", "\"", "\"", ")", "\n", "}" ]
// maclient is a mutual-authentication server, meant to demonstrate // using the client-side mutual authentication side of the transport // package.
[ "maclient", "is", "a", "mutual", "-", "authentication", "server", "meant", "to", "demonstrate", "using", "the", "client", "-", "side", "mutual", "authentication", "side", "of", "the", "transport", "package", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/transport/example/maserver/server.go#L19-L63
train
cloudflare/cfssl
scan/crypto/sha256/sha256.go
New224
func New224() hash.Hash { d := new(digest) d.is224 = true d.Reset() return d }
go
func New224() hash.Hash { d := new(digest) d.is224 = true d.Reset() return d }
[ "func", "New224", "(", ")", "hash", ".", "Hash", "{", "d", ":=", "new", "(", "digest", ")", "\n", "d", ".", "is224", "=", "true", "\n", "d", ".", "Reset", "(", ")", "\n", "return", "d", "\n", "}" ]
// New224 returns a new hash.Hash computing the SHA224 checksum.
[ "New224", "returns", "a", "new", "hash", ".", "Hash", "computing", "the", "SHA224", "checksum", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/sha256/sha256.go#L89-L94
train
cloudflare/cfssl
scan/crypto/sha256/sha256.go
Sum224
func Sum224(data []byte) (sum224 [Size224]byte) { var d digest d.is224 = true d.Reset() d.Write(data) sum := d.checkSum() copy(sum224[:], sum[:Size224]) return }
go
func Sum224(data []byte) (sum224 [Size224]byte) { var d digest d.is224 = true d.Reset() d.Write(data) sum := d.checkSum() copy(sum224[:], sum[:Size224]) return }
[ "func", "Sum224", "(", "data", "[", "]", "byte", ")", "(", "sum224", "[", "Size224", "]", "byte", ")", "{", "var", "d", "digest", "\n", "d", ".", "is224", "=", "true", "\n", "d", ".", "Reset", "(", ")", "\n", "d", ".", "Write", "(", "data", ")", "\n", "sum", ":=", "d", ".", "checkSum", "(", ")", "\n", "copy", "(", "sum224", "[", ":", "]", ",", "sum", "[", ":", "Size224", "]", ")", "\n", "return", "\n", "}" ]
// Sum224 returns the SHA224 checksum of the data.
[ "Sum224", "returns", "the", "SHA224", "checksum", "of", "the", "data", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/scan/crypto/sha256/sha256.go#L185-L193
train
cloudflare/cfssl
ubiquity/sha1.go
Flag
func (p SHA1DeprecationPolicy) Flag(chain []*x509.Certificate) bool { leaf := chain[0] if time.Now().After(p.EffectiveDate) { // Reject newly issued leaf certificate with SHA-1 after the specified deadline. if !p.NeverIssueAfter.IsZero() && leaf.NotBefore.After(p.NeverIssueAfter) { // Check hash algorithm of non-root leaf cert. if len(chain) > 1 && helpers.HashAlgoString(leaf.SignatureAlgorithm) == "SHA1" { return true } } // Reject certificate chain with SHA-1 that are still valid after expiry deadline. if !p.ExpiryDeadline.IsZero() && leaf.NotAfter.After(p.ExpiryDeadline) { // Check hash algorithm of non-root certs. for i, cert := range chain { if i < len(chain)-1 { if helpers.HashAlgoString(cert.SignatureAlgorithm) == "SHA1" { return true } } } } } return false }
go
func (p SHA1DeprecationPolicy) Flag(chain []*x509.Certificate) bool { leaf := chain[0] if time.Now().After(p.EffectiveDate) { // Reject newly issued leaf certificate with SHA-1 after the specified deadline. if !p.NeverIssueAfter.IsZero() && leaf.NotBefore.After(p.NeverIssueAfter) { // Check hash algorithm of non-root leaf cert. if len(chain) > 1 && helpers.HashAlgoString(leaf.SignatureAlgorithm) == "SHA1" { return true } } // Reject certificate chain with SHA-1 that are still valid after expiry deadline. if !p.ExpiryDeadline.IsZero() && leaf.NotAfter.After(p.ExpiryDeadline) { // Check hash algorithm of non-root certs. for i, cert := range chain { if i < len(chain)-1 { if helpers.HashAlgoString(cert.SignatureAlgorithm) == "SHA1" { return true } } } } } return false }
[ "func", "(", "p", "SHA1DeprecationPolicy", ")", "Flag", "(", "chain", "[", "]", "*", "x509", ".", "Certificate", ")", "bool", "{", "leaf", ":=", "chain", "[", "0", "]", "\n", "if", "time", ".", "Now", "(", ")", ".", "After", "(", "p", ".", "EffectiveDate", ")", "{", "// Reject newly issued leaf certificate with SHA-1 after the specified deadline.", "if", "!", "p", ".", "NeverIssueAfter", ".", "IsZero", "(", ")", "&&", "leaf", ".", "NotBefore", ".", "After", "(", "p", ".", "NeverIssueAfter", ")", "{", "// Check hash algorithm of non-root leaf cert.", "if", "len", "(", "chain", ")", ">", "1", "&&", "helpers", ".", "HashAlgoString", "(", "leaf", ".", "SignatureAlgorithm", ")", "==", "\"", "\"", "{", "return", "true", "\n", "}", "\n", "}", "\n\n", "// Reject certificate chain with SHA-1 that are still valid after expiry deadline.", "if", "!", "p", ".", "ExpiryDeadline", ".", "IsZero", "(", ")", "&&", "leaf", ".", "NotAfter", ".", "After", "(", "p", ".", "ExpiryDeadline", ")", "{", "// Check hash algorithm of non-root certs.", "for", "i", ",", "cert", ":=", "range", "chain", "{", "if", "i", "<", "len", "(", "chain", ")", "-", "1", "{", "if", "helpers", ".", "HashAlgoString", "(", "cert", ".", "SignatureAlgorithm", ")", "==", "\"", "\"", "{", "return", "true", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// Flag returns whether the policy flags the cert chain as deprecated for matching its deprecation criteria
[ "Flag", "returns", "whether", "the", "policy", "flags", "the", "cert", "chain", "as", "deprecated", "for", "matching", "its", "deprecation", "criteria" ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/sha1.go#L104-L130
train
cloudflare/cfssl
ubiquity/sha1.go
SHA1DeprecationMessages
func SHA1DeprecationMessages(chain []*x509.Certificate) []string { // record the most severe deprecation policy by each platform selectedPolicies := map[string]SHA1DeprecationPolicy{} for _, policy := range SHA1DeprecationPolicys { if policy.Flag(chain) { // only keep the policy with highest severity if selectedPolicies[policy.Platform].Severity < policy.Severity { selectedPolicies[policy.Platform] = policy } } } // build the message list list := []string{} for _, policy := range selectedPolicies { if policy.Severity > None { list = append(list, fmt.Sprintf("%s %s due to SHA-1 deprecation", policy.Platform, policy.Description)) } } return list }
go
func SHA1DeprecationMessages(chain []*x509.Certificate) []string { // record the most severe deprecation policy by each platform selectedPolicies := map[string]SHA1DeprecationPolicy{} for _, policy := range SHA1DeprecationPolicys { if policy.Flag(chain) { // only keep the policy with highest severity if selectedPolicies[policy.Platform].Severity < policy.Severity { selectedPolicies[policy.Platform] = policy } } } // build the message list list := []string{} for _, policy := range selectedPolicies { if policy.Severity > None { list = append(list, fmt.Sprintf("%s %s due to SHA-1 deprecation", policy.Platform, policy.Description)) } } return list }
[ "func", "SHA1DeprecationMessages", "(", "chain", "[", "]", "*", "x509", ".", "Certificate", ")", "[", "]", "string", "{", "// record the most severe deprecation policy by each platform", "selectedPolicies", ":=", "map", "[", "string", "]", "SHA1DeprecationPolicy", "{", "}", "\n", "for", "_", ",", "policy", ":=", "range", "SHA1DeprecationPolicys", "{", "if", "policy", ".", "Flag", "(", "chain", ")", "{", "// only keep the policy with highest severity", "if", "selectedPolicies", "[", "policy", ".", "Platform", "]", ".", "Severity", "<", "policy", ".", "Severity", "{", "selectedPolicies", "[", "policy", ".", "Platform", "]", "=", "policy", "\n", "}", "\n", "}", "\n", "}", "\n", "// build the message list", "list", ":=", "[", "]", "string", "{", "}", "\n", "for", "_", ",", "policy", ":=", "range", "selectedPolicies", "{", "if", "policy", ".", "Severity", ">", "None", "{", "list", "=", "append", "(", "list", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "policy", ".", "Platform", ",", "policy", ".", "Description", ")", ")", "\n", "}", "\n", "}", "\n", "return", "list", "\n", "}" ]
// SHA1DeprecationMessages returns a list of human-readable messages. Each message describes // how one platform rejects the chain based on SHA1 deprecation policies.
[ "SHA1DeprecationMessages", "returns", "a", "list", "of", "human", "-", "readable", "messages", ".", "Each", "message", "describes", "how", "one", "platform", "rejects", "the", "chain", "based", "on", "SHA1", "deprecation", "policies", "." ]
768cd563887febaad559b511aaa5964823ccb4ab
https://github.com/cloudflare/cfssl/blob/768cd563887febaad559b511aaa5964823ccb4ab/ubiquity/sha1.go#L134-L153
train
moby/buildkit
examples/gobuild/main.go
copy
func copy(src llb.State, srcPath string, dest llb.State, destPath string) llb.State { cpImage := llb.Image("docker.io/library/alpine@sha256:1072e499f3f655a032e88542330cf75b02e7bdf673278f701d7ba61629ee3ebe") cp := cpImage.Run(llb.Shlexf("cp -a /src%s /dest%s", srcPath, destPath)) cp.AddMount("/src", src, llb.Readonly) return cp.AddMount("/dest", dest) }
go
func copy(src llb.State, srcPath string, dest llb.State, destPath string) llb.State { cpImage := llb.Image("docker.io/library/alpine@sha256:1072e499f3f655a032e88542330cf75b02e7bdf673278f701d7ba61629ee3ebe") cp := cpImage.Run(llb.Shlexf("cp -a /src%s /dest%s", srcPath, destPath)) cp.AddMount("/src", src, llb.Readonly) return cp.AddMount("/dest", dest) }
[ "func", "copy", "(", "src", "llb", ".", "State", ",", "srcPath", "string", ",", "dest", "llb", ".", "State", ",", "destPath", "string", ")", "llb", ".", "State", "{", "cpImage", ":=", "llb", ".", "Image", "(", "\"", "\"", ")", "\n", "cp", ":=", "cpImage", ".", "Run", "(", "llb", ".", "Shlexf", "(", "\"", "\"", ",", "srcPath", ",", "destPath", ")", ")", "\n", "cp", ".", "AddMount", "(", "\"", "\"", ",", "src", ",", "llb", ".", "Readonly", ")", "\n", "return", "cp", ".", "AddMount", "(", "\"", "\"", ",", "dest", ")", "\n", "}" ]
// copy copies files between 2 states using cp until there is no copyOp
[ "copy", "copies", "files", "between", "2", "states", "using", "cp", "until", "there", "is", "no", "copyOp" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/examples/gobuild/main.go#L91-L96
train
moby/buildkit
frontend/dockerfile/instructions/bflag.go
NewBFlags
func NewBFlags() *BFlags { return &BFlags{ flags: make(map[string]*Flag), used: make(map[string]*Flag), } }
go
func NewBFlags() *BFlags { return &BFlags{ flags: make(map[string]*Flag), used: make(map[string]*Flag), } }
[ "func", "NewBFlags", "(", ")", "*", "BFlags", "{", "return", "&", "BFlags", "{", "flags", ":", "make", "(", "map", "[", "string", "]", "*", "Flag", ")", ",", "used", ":", "make", "(", "map", "[", "string", "]", "*", "Flag", ")", ",", "}", "\n", "}" ]
// NewBFlags returns the new BFlags struct
[ "NewBFlags", "returns", "the", "new", "BFlags", "struct" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/instructions/bflag.go#L35-L40
train
moby/buildkit
frontend/dockerfile/instructions/bflag.go
NewBFlagsWithArgs
func NewBFlagsWithArgs(args []string) *BFlags { flags := NewBFlags() flags.Args = args return flags }
go
func NewBFlagsWithArgs(args []string) *BFlags { flags := NewBFlags() flags.Args = args return flags }
[ "func", "NewBFlagsWithArgs", "(", "args", "[", "]", "string", ")", "*", "BFlags", "{", "flags", ":=", "NewBFlags", "(", ")", "\n", "flags", ".", "Args", "=", "args", "\n", "return", "flags", "\n", "}" ]
// NewBFlagsWithArgs returns the new BFlags struct with Args set to args
[ "NewBFlagsWithArgs", "returns", "the", "new", "BFlags", "struct", "with", "Args", "set", "to", "args" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/instructions/bflag.go#L43-L47
train
moby/buildkit
frontend/dockerfile/instructions/bflag.go
AddStrings
func (bf *BFlags) AddStrings(name string) *Flag { flag := bf.addFlag(name, stringsType) if flag == nil { return nil } return flag }
go
func (bf *BFlags) AddStrings(name string) *Flag { flag := bf.addFlag(name, stringsType) if flag == nil { return nil } return flag }
[ "func", "(", "bf", "*", "BFlags", ")", "AddStrings", "(", "name", "string", ")", "*", "Flag", "{", "flag", ":=", "bf", ".", "addFlag", "(", "name", ",", "stringsType", ")", "\n", "if", "flag", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "return", "flag", "\n", "}" ]
// AddStrings adds a string flag to BFlags that can match multiple values
[ "AddStrings", "adds", "a", "string", "flag", "to", "BFlags", "that", "can", "match", "multiple", "values" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/instructions/bflag.go#L76-L82
train
moby/buildkit
frontend/dockerfile/instructions/bflag.go
IsUsed
func (fl *Flag) IsUsed() bool { if _, ok := fl.bf.used[fl.name]; ok { return true } return false }
go
func (fl *Flag) IsUsed() bool { if _, ok := fl.bf.used[fl.name]; ok { return true } return false }
[ "func", "(", "fl", "*", "Flag", ")", "IsUsed", "(", ")", "bool", "{", "if", "_", ",", "ok", ":=", "fl", ".", "bf", ".", "used", "[", "fl", ".", "name", "]", ";", "ok", "{", "return", "true", "\n", "}", "\n", "return", "false", "\n", "}" ]
// IsUsed checks if the flag is used
[ "IsUsed", "checks", "if", "the", "flag", "is", "used" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/instructions/bflag.go#L104-L109
train
moby/buildkit
frontend/dockerfile/instructions/bflag.go
IsTrue
func (fl *Flag) IsTrue() bool { if fl.flagType != boolType { // Should never get here panic(fmt.Errorf("Trying to use IsTrue on a non-boolean: %s", fl.name)) } return fl.Value == "true" }
go
func (fl *Flag) IsTrue() bool { if fl.flagType != boolType { // Should never get here panic(fmt.Errorf("Trying to use IsTrue on a non-boolean: %s", fl.name)) } return fl.Value == "true" }
[ "func", "(", "fl", "*", "Flag", ")", "IsTrue", "(", ")", "bool", "{", "if", "fl", ".", "flagType", "!=", "boolType", "{", "// Should never get here", "panic", "(", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "fl", ".", "name", ")", ")", "\n", "}", "\n", "return", "fl", ".", "Value", "==", "\"", "\"", "\n", "}" ]
// IsTrue checks if a bool flag is true
[ "IsTrue", "checks", "if", "a", "bool", "flag", "is", "true" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/instructions/bflag.go#L112-L118
train
moby/buildkit
session/content/caller.go
NewCallerStore
func NewCallerStore(c session.Caller, storeID string) content.Store { client := api.NewContentClient(c.Conn()) return &callerContentStore{ store: proxy.NewContentStore(client), storeID: storeID, } }
go
func NewCallerStore(c session.Caller, storeID string) content.Store { client := api.NewContentClient(c.Conn()) return &callerContentStore{ store: proxy.NewContentStore(client), storeID: storeID, } }
[ "func", "NewCallerStore", "(", "c", "session", ".", "Caller", ",", "storeID", "string", ")", "content", ".", "Store", "{", "client", ":=", "api", ".", "NewContentClient", "(", "c", ".", "Conn", "(", ")", ")", "\n", "return", "&", "callerContentStore", "{", "store", ":", "proxy", ".", "NewContentStore", "(", "client", ")", ",", "storeID", ":", "storeID", ",", "}", "\n", "}" ]
// NewCallerStore creates content.Store from session.Caller with specified storeID
[ "NewCallerStore", "creates", "content", ".", "Store", "from", "session", ".", "Caller", "with", "specified", "storeID" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/session/content/caller.go#L78-L84
train
moby/buildkit
util/contentutil/pusher.go
Writer
func (i *pushingIngester) Writer(ctx context.Context, opts ...content.WriterOpt) (content.Writer, error) { var wOpts content.WriterOpts for _, opt := range opts { if err := opt(&wOpts); err != nil { return nil, err } } if wOpts.Ref == "" { return nil, errors.Wrap(errdefs.ErrInvalidArgument, "ref must not be empty") } // pusher requires desc.MediaType to determine the PUT URL, especially for manifest blobs. contentWriter, err := i.p.Push(ctx, wOpts.Desc) if err != nil { return nil, err } return &writer{ Writer: contentWriter, contentWriterRef: wOpts.Ref, }, nil }
go
func (i *pushingIngester) Writer(ctx context.Context, opts ...content.WriterOpt) (content.Writer, error) { var wOpts content.WriterOpts for _, opt := range opts { if err := opt(&wOpts); err != nil { return nil, err } } if wOpts.Ref == "" { return nil, errors.Wrap(errdefs.ErrInvalidArgument, "ref must not be empty") } // pusher requires desc.MediaType to determine the PUT URL, especially for manifest blobs. contentWriter, err := i.p.Push(ctx, wOpts.Desc) if err != nil { return nil, err } return &writer{ Writer: contentWriter, contentWriterRef: wOpts.Ref, }, nil }
[ "func", "(", "i", "*", "pushingIngester", ")", "Writer", "(", "ctx", "context", ".", "Context", ",", "opts", "...", "content", ".", "WriterOpt", ")", "(", "content", ".", "Writer", ",", "error", ")", "{", "var", "wOpts", "content", ".", "WriterOpts", "\n", "for", "_", ",", "opt", ":=", "range", "opts", "{", "if", "err", ":=", "opt", "(", "&", "wOpts", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n", "if", "wOpts", ".", "Ref", "==", "\"", "\"", "{", "return", "nil", ",", "errors", ".", "Wrap", "(", "errdefs", ".", "ErrInvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n", "// pusher requires desc.MediaType to determine the PUT URL, especially for manifest blobs.", "contentWriter", ",", "err", ":=", "i", ".", "p", ".", "Push", "(", "ctx", ",", "wOpts", ".", "Desc", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "writer", "{", "Writer", ":", "contentWriter", ",", "contentWriterRef", ":", "wOpts", ".", "Ref", ",", "}", ",", "nil", "\n", "}" ]
// Writer implements content.Ingester. desc.MediaType must be set for manifest blobs.
[ "Writer", "implements", "content", ".", "Ingester", ".", "desc", ".", "MediaType", "must", "be", "set", "for", "manifest", "blobs", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/util/contentutil/pusher.go#L23-L42
train
moby/buildkit
client/connhelper/kubepod/kubepod.go
Helper
func Helper(u *url.URL) (*connhelper.ConnectionHelper, error) { sp, err := SpecFromURL(u) if err != nil { return nil, err } return &connhelper.ConnectionHelper{ ContextDialer: func(ctx context.Context, addr string) (net.Conn, error) { return commandconn.New(ctx, "kubectl", "--context="+sp.Context, "--namespace="+sp.Namespace, "exec", "--container="+sp.Container, "-i", sp.Pod, "--", "buildctl", "dial-stdio") }, }, nil }
go
func Helper(u *url.URL) (*connhelper.ConnectionHelper, error) { sp, err := SpecFromURL(u) if err != nil { return nil, err } return &connhelper.ConnectionHelper{ ContextDialer: func(ctx context.Context, addr string) (net.Conn, error) { return commandconn.New(ctx, "kubectl", "--context="+sp.Context, "--namespace="+sp.Namespace, "exec", "--container="+sp.Container, "-i", sp.Pod, "--", "buildctl", "dial-stdio") }, }, nil }
[ "func", "Helper", "(", "u", "*", "url", ".", "URL", ")", "(", "*", "connhelper", ".", "ConnectionHelper", ",", "error", ")", "{", "sp", ",", "err", ":=", "SpecFromURL", "(", "u", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "connhelper", ".", "ConnectionHelper", "{", "ContextDialer", ":", "func", "(", "ctx", "context", ".", "Context", ",", "addr", "string", ")", "(", "net", ".", "Conn", ",", "error", ")", "{", "return", "commandconn", ".", "New", "(", "ctx", ",", "\"", "\"", ",", "\"", "\"", "+", "sp", ".", "Context", ",", "\"", "\"", "+", "sp", ".", "Namespace", ",", "\"", "\"", ",", "\"", "\"", "+", "sp", ".", "Container", ",", "\"", "\"", ",", "sp", ".", "Pod", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "}", ",", "}", ",", "nil", "\n", "}" ]
// Helper returns helper for connecting to a Kubernetes pod. // Requires BuildKit v0.5.0 or later in the pod.
[ "Helper", "returns", "helper", "for", "connecting", "to", "a", "Kubernetes", "pod", ".", "Requires", "BuildKit", "v0", ".", "5", ".", "0", "or", "later", "in", "the", "pod", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/client/connhelper/kubepod/kubepod.go#L21-L32
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseIgnore
func parseIgnore(rest string, d *Directive) (*Node, map[string]bool, error) { return &Node{}, nil, nil }
go
func parseIgnore(rest string, d *Directive) (*Node, map[string]bool, error) { return &Node{}, nil, nil }
[ "func", "parseIgnore", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "return", "&", "Node", "{", "}", ",", "nil", ",", "nil", "\n", "}" ]
// ignore the current argument. This will still leave a command parsed, but // will not incorporate the arguments into the ast.
[ "ignore", "the", "current", "argument", ".", "This", "will", "still", "leave", "a", "command", "parsed", "but", "will", "not", "incorporate", "the", "arguments", "into", "the", "ast", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L28-L30
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseStringsWhitespaceDelimited
func parseStringsWhitespaceDelimited(rest string, d *Directive) (*Node, map[string]bool, error) { if rest == "" { return nil, nil, nil } node := &Node{} rootnode := node prevnode := node for _, str := range tokenWhitespace.Split(rest, -1) { // use regexp prevnode = node node.Value = str node.Next = &Node{} node = node.Next } // XXX to get around regexp.Split *always* providing an empty string at the // end due to how our loop is constructed, nil out the last node in the // chain. prevnode.Next = nil return rootnode, nil, nil }
go
func parseStringsWhitespaceDelimited(rest string, d *Directive) (*Node, map[string]bool, error) { if rest == "" { return nil, nil, nil } node := &Node{} rootnode := node prevnode := node for _, str := range tokenWhitespace.Split(rest, -1) { // use regexp prevnode = node node.Value = str node.Next = &Node{} node = node.Next } // XXX to get around regexp.Split *always* providing an empty string at the // end due to how our loop is constructed, nil out the last node in the // chain. prevnode.Next = nil return rootnode, nil, nil }
[ "func", "parseStringsWhitespaceDelimited", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "if", "rest", "==", "\"", "\"", "{", "return", "nil", ",", "nil", ",", "nil", "\n", "}", "\n\n", "node", ":=", "&", "Node", "{", "}", "\n", "rootnode", ":=", "node", "\n", "prevnode", ":=", "node", "\n", "for", "_", ",", "str", ":=", "range", "tokenWhitespace", ".", "Split", "(", "rest", ",", "-", "1", ")", "{", "// use regexp", "prevnode", "=", "node", "\n", "node", ".", "Value", "=", "str", "\n", "node", ".", "Next", "=", "&", "Node", "{", "}", "\n", "node", "=", "node", ".", "Next", "\n", "}", "\n\n", "// XXX to get around regexp.Split *always* providing an empty string at the", "// end due to how our loop is constructed, nil out the last node in the", "// chain.", "prevnode", ".", "Next", "=", "nil", "\n\n", "return", "rootnode", ",", "nil", ",", "nil", "\n", "}" ]
// parses a whitespace-delimited set of arguments. The result is effectively a // linked list of string arguments.
[ "parses", "a", "whitespace", "-", "delimited", "set", "of", "arguments", ".", "The", "result", "is", "effectively", "a", "linked", "list", "of", "string", "arguments", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L239-L260
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseString
func parseString(rest string, d *Directive) (*Node, map[string]bool, error) { if rest == "" { return nil, nil, nil } n := &Node{} n.Value = rest return n, nil, nil }
go
func parseString(rest string, d *Directive) (*Node, map[string]bool, error) { if rest == "" { return nil, nil, nil } n := &Node{} n.Value = rest return n, nil, nil }
[ "func", "parseString", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "if", "rest", "==", "\"", "\"", "{", "return", "nil", ",", "nil", ",", "nil", "\n", "}", "\n", "n", ":=", "&", "Node", "{", "}", "\n", "n", ".", "Value", "=", "rest", "\n", "return", "n", ",", "nil", ",", "nil", "\n", "}" ]
// parseString just wraps the string in quotes and returns a working node.
[ "parseString", "just", "wraps", "the", "string", "in", "quotes", "and", "returns", "a", "working", "node", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L263-L270
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseJSON
func parseJSON(rest string, d *Directive) (*Node, map[string]bool, error) { rest = strings.TrimLeftFunc(rest, unicode.IsSpace) if !strings.HasPrefix(rest, "[") { return nil, nil, fmt.Errorf(`Error parsing "%s" as a JSON array`, rest) } var myJSON []interface{} if err := json.NewDecoder(strings.NewReader(rest)).Decode(&myJSON); err != nil { return nil, nil, err } var top, prev *Node for _, str := range myJSON { s, ok := str.(string) if !ok { return nil, nil, errDockerfileNotStringArray } node := &Node{Value: s} if prev == nil { top = node } else { prev.Next = node } prev = node } return top, map[string]bool{"json": true}, nil }
go
func parseJSON(rest string, d *Directive) (*Node, map[string]bool, error) { rest = strings.TrimLeftFunc(rest, unicode.IsSpace) if !strings.HasPrefix(rest, "[") { return nil, nil, fmt.Errorf(`Error parsing "%s" as a JSON array`, rest) } var myJSON []interface{} if err := json.NewDecoder(strings.NewReader(rest)).Decode(&myJSON); err != nil { return nil, nil, err } var top, prev *Node for _, str := range myJSON { s, ok := str.(string) if !ok { return nil, nil, errDockerfileNotStringArray } node := &Node{Value: s} if prev == nil { top = node } else { prev.Next = node } prev = node } return top, map[string]bool{"json": true}, nil }
[ "func", "parseJSON", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "rest", "=", "strings", ".", "TrimLeftFunc", "(", "rest", ",", "unicode", ".", "IsSpace", ")", "\n", "if", "!", "strings", ".", "HasPrefix", "(", "rest", ",", "\"", "\"", ")", "{", "return", "nil", ",", "nil", ",", "fmt", ".", "Errorf", "(", "`Error parsing \"%s\" as a JSON array`", ",", "rest", ")", "\n", "}", "\n\n", "var", "myJSON", "[", "]", "interface", "{", "}", "\n", "if", "err", ":=", "json", ".", "NewDecoder", "(", "strings", ".", "NewReader", "(", "rest", ")", ")", ".", "Decode", "(", "&", "myJSON", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "var", "top", ",", "prev", "*", "Node", "\n", "for", "_", ",", "str", ":=", "range", "myJSON", "{", "s", ",", "ok", ":=", "str", ".", "(", "string", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "nil", ",", "errDockerfileNotStringArray", "\n", "}", "\n\n", "node", ":=", "&", "Node", "{", "Value", ":", "s", "}", "\n", "if", "prev", "==", "nil", "{", "top", "=", "node", "\n", "}", "else", "{", "prev", ".", "Next", "=", "node", "\n", "}", "\n", "prev", "=", "node", "\n", "}", "\n\n", "return", "top", ",", "map", "[", "string", "]", "bool", "{", "\"", "\"", ":", "true", "}", ",", "nil", "\n", "}" ]
// parseJSON converts JSON arrays to an AST.
[ "parseJSON", "converts", "JSON", "arrays", "to", "an", "AST", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L273-L301
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseMaybeJSON
func parseMaybeJSON(rest string, d *Directive) (*Node, map[string]bool, error) { if rest == "" { return nil, nil, nil } node, attrs, err := parseJSON(rest, d) if err == nil { return node, attrs, nil } if err == errDockerfileNotStringArray { return nil, nil, err } node = &Node{} node.Value = rest return node, nil, nil }
go
func parseMaybeJSON(rest string, d *Directive) (*Node, map[string]bool, error) { if rest == "" { return nil, nil, nil } node, attrs, err := parseJSON(rest, d) if err == nil { return node, attrs, nil } if err == errDockerfileNotStringArray { return nil, nil, err } node = &Node{} node.Value = rest return node, nil, nil }
[ "func", "parseMaybeJSON", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "if", "rest", "==", "\"", "\"", "{", "return", "nil", ",", "nil", ",", "nil", "\n", "}", "\n\n", "node", ",", "attrs", ",", "err", ":=", "parseJSON", "(", "rest", ",", "d", ")", "\n\n", "if", "err", "==", "nil", "{", "return", "node", ",", "attrs", ",", "nil", "\n", "}", "\n", "if", "err", "==", "errDockerfileNotStringArray", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "node", "=", "&", "Node", "{", "}", "\n", "node", ".", "Value", "=", "rest", "\n", "return", "node", ",", "nil", ",", "nil", "\n", "}" ]
// parseMaybeJSON determines if the argument appears to be a JSON array. If // so, passes to parseJSON; if not, quotes the result and returns a single // node.
[ "parseMaybeJSON", "determines", "if", "the", "argument", "appears", "to", "be", "a", "JSON", "array", ".", "If", "so", "passes", "to", "parseJSON", ";", "if", "not", "quotes", "the", "result", "and", "returns", "a", "single", "node", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L306-L323
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseMaybeJSONToList
func parseMaybeJSONToList(rest string, d *Directive) (*Node, map[string]bool, error) { node, attrs, err := parseJSON(rest, d) if err == nil { return node, attrs, nil } if err == errDockerfileNotStringArray { return nil, nil, err } return parseStringsWhitespaceDelimited(rest, d) }
go
func parseMaybeJSONToList(rest string, d *Directive) (*Node, map[string]bool, error) { node, attrs, err := parseJSON(rest, d) if err == nil { return node, attrs, nil } if err == errDockerfileNotStringArray { return nil, nil, err } return parseStringsWhitespaceDelimited(rest, d) }
[ "func", "parseMaybeJSONToList", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "node", ",", "attrs", ",", "err", ":=", "parseJSON", "(", "rest", ",", "d", ")", "\n\n", "if", "err", "==", "nil", "{", "return", "node", ",", "attrs", ",", "nil", "\n", "}", "\n", "if", "err", "==", "errDockerfileNotStringArray", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "parseStringsWhitespaceDelimited", "(", "rest", ",", "d", ")", "\n", "}" ]
// parseMaybeJSONToList determines if the argument appears to be a JSON array. If // so, passes to parseJSON; if not, attempts to parse it as a whitespace // delimited string.
[ "parseMaybeJSONToList", "determines", "if", "the", "argument", "appears", "to", "be", "a", "JSON", "array", ".", "If", "so", "passes", "to", "parseJSON", ";", "if", "not", "attempts", "to", "parse", "it", "as", "a", "whitespace", "delimited", "string", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L328-L339
train
moby/buildkit
frontend/dockerfile/parser/line_parsers.go
parseHealthConfig
func parseHealthConfig(rest string, d *Directive) (*Node, map[string]bool, error) { // Find end of first argument var sep int for ; sep < len(rest); sep++ { if unicode.IsSpace(rune(rest[sep])) { break } } next := sep for ; next < len(rest); next++ { if !unicode.IsSpace(rune(rest[next])) { break } } if sep == 0 { return nil, nil, nil } typ := rest[:sep] cmd, attrs, err := parseMaybeJSON(rest[next:], d) if err != nil { return nil, nil, err } return &Node{Value: typ, Next: cmd}, attrs, err }
go
func parseHealthConfig(rest string, d *Directive) (*Node, map[string]bool, error) { // Find end of first argument var sep int for ; sep < len(rest); sep++ { if unicode.IsSpace(rune(rest[sep])) { break } } next := sep for ; next < len(rest); next++ { if !unicode.IsSpace(rune(rest[next])) { break } } if sep == 0 { return nil, nil, nil } typ := rest[:sep] cmd, attrs, err := parseMaybeJSON(rest[next:], d) if err != nil { return nil, nil, err } return &Node{Value: typ, Next: cmd}, attrs, err }
[ "func", "parseHealthConfig", "(", "rest", "string", ",", "d", "*", "Directive", ")", "(", "*", "Node", ",", "map", "[", "string", "]", "bool", ",", "error", ")", "{", "// Find end of first argument", "var", "sep", "int", "\n", "for", ";", "sep", "<", "len", "(", "rest", ")", ";", "sep", "++", "{", "if", "unicode", ".", "IsSpace", "(", "rune", "(", "rest", "[", "sep", "]", ")", ")", "{", "break", "\n", "}", "\n", "}", "\n", "next", ":=", "sep", "\n", "for", ";", "next", "<", "len", "(", "rest", ")", ";", "next", "++", "{", "if", "!", "unicode", ".", "IsSpace", "(", "rune", "(", "rest", "[", "next", "]", ")", ")", "{", "break", "\n", "}", "\n", "}", "\n\n", "if", "sep", "==", "0", "{", "return", "nil", ",", "nil", ",", "nil", "\n", "}", "\n\n", "typ", ":=", "rest", "[", ":", "sep", "]", "\n", "cmd", ",", "attrs", ",", "err", ":=", "parseMaybeJSON", "(", "rest", "[", "next", ":", "]", ",", "d", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "Node", "{", "Value", ":", "typ", ",", "Next", ":", "cmd", "}", ",", "attrs", ",", "err", "\n", "}" ]
// The HEALTHCHECK command is like parseMaybeJSON, but has an extra type argument.
[ "The", "HEALTHCHECK", "command", "is", "like", "parseMaybeJSON", "but", "has", "an", "extra", "type", "argument", "." ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/frontend/dockerfile/parser/line_parsers.go#L342-L368
train
moby/buildkit
session/manager.go
NewManager
func NewManager() (*Manager, error) { sm := &Manager{ sessions: make(map[string]*client), } sm.updateCondition = sync.NewCond(&sm.mu) return sm, nil }
go
func NewManager() (*Manager, error) { sm := &Manager{ sessions: make(map[string]*client), } sm.updateCondition = sync.NewCond(&sm.mu) return sm, nil }
[ "func", "NewManager", "(", ")", "(", "*", "Manager", ",", "error", ")", "{", "sm", ":=", "&", "Manager", "{", "sessions", ":", "make", "(", "map", "[", "string", "]", "*", "client", ")", ",", "}", "\n", "sm", ".", "updateCondition", "=", "sync", ".", "NewCond", "(", "&", "sm", ".", "mu", ")", "\n", "return", "sm", ",", "nil", "\n", "}" ]
// NewManager returns a new Manager
[ "NewManager", "returns", "a", "new", "Manager" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/session/manager.go#L37-L43
train
moby/buildkit
session/manager.go
HandleHTTPRequest
func (sm *Manager) HandleHTTPRequest(ctx context.Context, w http.ResponseWriter, r *http.Request) error { hijacker, ok := w.(http.Hijacker) if !ok { return errors.New("handler does not support hijack") } id := r.Header.Get(headerSessionID) proto := r.Header.Get("Upgrade") sm.mu.Lock() if _, ok := sm.sessions[id]; ok { sm.mu.Unlock() return errors.Errorf("session %s already exists", id) } if proto == "" { sm.mu.Unlock() return errors.New("no upgrade proto in request") } if proto != "h2c" { sm.mu.Unlock() return errors.Errorf("protocol %s not supported", proto) } conn, _, err := hijacker.Hijack() if err != nil { sm.mu.Unlock() return errors.Wrap(err, "failed to hijack connection") } resp := &http.Response{ StatusCode: http.StatusSwitchingProtocols, ProtoMajor: 1, ProtoMinor: 1, Header: http.Header{}, } resp.Header.Set("Connection", "Upgrade") resp.Header.Set("Upgrade", proto) // set raw mode conn.Write([]byte{}) resp.Write(conn) return sm.handleConn(ctx, conn, r.Header) }
go
func (sm *Manager) HandleHTTPRequest(ctx context.Context, w http.ResponseWriter, r *http.Request) error { hijacker, ok := w.(http.Hijacker) if !ok { return errors.New("handler does not support hijack") } id := r.Header.Get(headerSessionID) proto := r.Header.Get("Upgrade") sm.mu.Lock() if _, ok := sm.sessions[id]; ok { sm.mu.Unlock() return errors.Errorf("session %s already exists", id) } if proto == "" { sm.mu.Unlock() return errors.New("no upgrade proto in request") } if proto != "h2c" { sm.mu.Unlock() return errors.Errorf("protocol %s not supported", proto) } conn, _, err := hijacker.Hijack() if err != nil { sm.mu.Unlock() return errors.Wrap(err, "failed to hijack connection") } resp := &http.Response{ StatusCode: http.StatusSwitchingProtocols, ProtoMajor: 1, ProtoMinor: 1, Header: http.Header{}, } resp.Header.Set("Connection", "Upgrade") resp.Header.Set("Upgrade", proto) // set raw mode conn.Write([]byte{}) resp.Write(conn) return sm.handleConn(ctx, conn, r.Header) }
[ "func", "(", "sm", "*", "Manager", ")", "HandleHTTPRequest", "(", "ctx", "context", ".", "Context", ",", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "error", "{", "hijacker", ",", "ok", ":=", "w", ".", "(", "http", ".", "Hijacker", ")", "\n", "if", "!", "ok", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "id", ":=", "r", ".", "Header", ".", "Get", "(", "headerSessionID", ")", "\n\n", "proto", ":=", "r", ".", "Header", ".", "Get", "(", "\"", "\"", ")", "\n\n", "sm", ".", "mu", ".", "Lock", "(", ")", "\n", "if", "_", ",", "ok", ":=", "sm", ".", "sessions", "[", "id", "]", ";", "ok", "{", "sm", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "id", ")", "\n", "}", "\n\n", "if", "proto", "==", "\"", "\"", "{", "sm", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "proto", "!=", "\"", "\"", "{", "sm", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "proto", ")", "\n", "}", "\n\n", "conn", ",", "_", ",", "err", ":=", "hijacker", ".", "Hijack", "(", ")", "\n", "if", "err", "!=", "nil", "{", "sm", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "errors", ".", "Wrap", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "resp", ":=", "&", "http", ".", "Response", "{", "StatusCode", ":", "http", ".", "StatusSwitchingProtocols", ",", "ProtoMajor", ":", "1", ",", "ProtoMinor", ":", "1", ",", "Header", ":", "http", ".", "Header", "{", "}", ",", "}", "\n", "resp", ".", "Header", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "resp", ".", "Header", ".", "Set", "(", "\"", "\"", ",", "proto", ")", "\n\n", "// set raw mode", "conn", ".", "Write", "(", "[", "]", "byte", "{", "}", ")", "\n", "resp", ".", "Write", "(", "conn", ")", "\n\n", "return", "sm", ".", "handleConn", "(", "ctx", ",", "conn", ",", "r", ".", "Header", ")", "\n", "}" ]
// HandleHTTPRequest handles an incoming HTTP request
[ "HandleHTTPRequest", "handles", "an", "incoming", "HTTP", "request" ]
89851c6c69bca875dd64b5e9d5d6ec60ff437d74
https://github.com/moby/buildkit/blob/89851c6c69bca875dd64b5e9d5d6ec60ff437d74/session/manager.go#L46-L92
train