Documentation ¶
Index ¶
- Constants
- Variables
- func GetFullChain(entry *ct.LogEntry) [][]byte
- func IsPrecert(entry *ct.LogEntry) bool
- func MatchesWildcard(dnsName string, pattern string) bool
- func ReadSTHFile(path string) (*ct.SignedTreeHead, error)
- func ValidatePrecert(precertBytes []byte, tbsBytes []byte) error
- func VerifyConsistencyProof(proof ct.ConsistencyProof, first *ct.SignedTreeHead, second *ct.SignedTreeHead) bool
- func WriteProofFile(path string, proof ct.ConsistencyProof) error
- func WriteSTHFile(path string, sth *ct.SignedTreeHead) error
- type AttributeTypeAndValue
- type CertInfo
- type CertValidity
- type Certificate
- type CollapsedMerkleTree
- func (tree *CollapsedMerkleTree) Add(hash ct.MerkleTreeNode)
- func (tree *CollapsedMerkleTree) CalculateRoot() ct.MerkleTreeNode
- func (tree *CollapsedMerkleTree) GetSize() uint64
- func (tree *CollapsedMerkleTree) MarshalJSON() ([]byte, error)
- func (tree *CollapsedMerkleTree) UnmarshalJSON(b []byte) error
- type EntryInfo
- type Extension
- type Identifiers
- type LogInfo
- type LogInfoFile
- type ProcessCallback
- type RDNSequence
- type RelativeDistinguishedNameSET
- type Scanner
- func (s *Scanner) CheckConsistency(first *ct.SignedTreeHead, second *ct.SignedTreeHead) (bool, error)
- func (s *Scanner) GetSTH() (*ct.SignedTreeHead, error)
- func (s Scanner) Log(msg string)
- func (s *Scanner) MakeCollapsedMerkleTree(sth *ct.SignedTreeHead) (*CollapsedMerkleTree, error)
- func (s *Scanner) Scan(startIndex int64, endIndex int64, processCert ProcessCallback, ...) error
- func (s Scanner) Warn(msg string)
- type ScannerOptions
- type SubjectAltName
- type TBSCertificate
- func (tbs *TBSCertificate) GetExtension(id asn1.ObjectIdentifier) []Extension
- func (tbs *TBSCertificate) GetRawIssuer() []byte
- func (tbs *TBSCertificate) GetRawPublicKey() []byte
- func (tbs *TBSCertificate) GetRawSubject() []byte
- func (tbs *TBSCertificate) ParseBasicConstraints() (*bool, error)
- func (tbs *TBSCertificate) ParseIssuer() (RDNSequence, error)
- func (tbs *TBSCertificate) ParseSerialNumber() (*big.Int, error)
- func (tbs *TBSCertificate) ParseSubject() (RDNSequence, error)
- func (tbs *TBSCertificate) ParseSubjectAltNames() ([]SubjectAltName, error)
- func (tbs *TBSCertificate) ParseSubjectCommonNames() ([]string, error)
- func (tbs *TBSCertificate) ParseValidity() (*CertValidity, error)
Constants ¶
View Source
const ( FETCH_RETRIES = 10 FETCH_RETRY_WAIT = 1 )
View Source
const UnparsableDNSLabelPlaceholder = "<unparsable>"
Variables ¶
View Source
var DefaultLogs = []LogInfo{
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEfahLEimAoz2t01p3uMziiLOl/fHTDM0YDOhBRuiBARsV4UvxG2LdNgoIGLrtCzWE0J5APC2em4JlvR8EEEFMoA=="),
Url: "ct.googleapis.com/pilot",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE1/TMabLkDpCjiupacAlP7xNi0I1JYP8bQFAHDG1xhtolSY1l4QgNRzRrvSe8liE+NPWHdjGxfx3JhTsN9x8/6Q=="),
Url: "ct.googleapis.com/aviator",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEAkbFvhu7gkAW6MHSrBlpE1n4+HCFRkC5OLAjgqhkTH+/uzSfSl8ois8ZxAD2NgaTZe1M9akhYlrYkes4JECs6A=="),
Url: "ct1.digicert-ct.com/log",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEIFsYyDzBi7MxCAC/oJBXK7dHjG+1aLCOkHjpoHPqTyghLpzA9BYbqvnV16mAw04vUjyYASVGJCUoI3ctBcJAeg=="),
Url: "ct.googleapis.com/rocketeer",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEluqsHEYMG1XcDfy1lCdGV0JwOmkY4r87xNuroPS2bMBTP01CEDPwWJePa75y9CrsHEKqAy8afig1dpkIPSEUhg=="),
Url: "ct.ws.symantec.com",
MMD: 86400,
},
{
Key: mustDecodeBase64("MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAolpIHxdSlTXLo1s6H1OCdpSj/4DyHDc8wLG9wVmLqy1lk9fz4ATVmm+/1iN2Nk8jmctUKK2MFUtlWXZBSpym97M7frGlSaQXUWyA3CqQUEuIJOmlEjKTBEiQAvpfDjCHjlV2Be4qTM6jamkJbiWtgnYPhJL6ONaGTiSPm7Byy57iaz/hbckldSOIoRhYBiMzeNoA0DiRZ9KmfSeXZ1rB8y8X5urSW+iBzf2SaOfzBvDpcoTuAaWx2DPazoOl28fP1hZ+kHUYvxbcMjttjauCFx+JII0dmuZNIwjfeG/GBb9frpSX219k1O4Wi6OEbHEr8at/XQ0y7gTikOxBn/s5wQIDAQAB"),
Url: "ctlog.api.venafi.com",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE6pWeAv/u8TNtS4e8zf0ZF2L/lNPQWQc/Ai0ckP7IRzA78d0NuBEMXR2G3avTK0Zm+25ltzv9WWis36b4ztIYTQ=="),
Url: "vega.ws.symantec.com",
MMD: 86400,
},
{
Key: mustDecodeBase64("MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv7UIYZopMgTTJWPp2IXhhuAf1l6a9zM7gBvntj5fLaFm9pVKhKYhVnno94XuXeN8EsDgiSIJIj66FpUGvai5samyetZhLocRuXhAiXXbDNyQ4KR51tVebtEq2zT0mT9liTtGwiksFQccyUsaVPhsHq9gJ2IKZdWauVA2Fm5x9h8B9xKn/L/2IaMpkIYtd967TNTP/dLPgixN1PLCLaypvurDGSVDsuWabA3FHKWL9z8wr7kBkbdpEhLlg2H+NAC+9nGKx+tQkuhZ/hWR65aX+CNUPy2OB9/u2rNPyDydb988LENXoUcMkQT0dU3aiYGkFAY0uZjD2vH97TM20xYtNQIDAQAB"),
Url: "ctserver.cnnic.cn",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAETtK8v7MICve56qTHHDhhBOuV4IlUaESxZryCfk9QbG9co/CqPvTsgPDbCpp6oFtyAHwlDhnvr7JijXRD9Cb2FA=="),
Url: "ct.googleapis.com/icarus",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEEmyGDvYXsRJsNyXSrYc9DjHsIa2xzb4UR7ZxVoV6mrc9iZB7xjI6+NrOiwH+P/xxkRmOFG6Jel20q37hTh58rA=="),
Url: "ct.googleapis.com/skydiver",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAESPNZ8/YFGNPbsu1Gfs/IEbVXsajWTOaft0oaFIZDqUiwy1o/PErK38SCFFWa+PeOQFXc9NKv6nV0+05/YIYuUQ=="),
Url: "ct.startssl.com",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzBGIey1my66PTTBmJxklIpMhRrQvAdPG+SvVyLpzmwai8IoCnNBrRhgwhbrpJIsO0VtwKAx+8TpFf1rzgkJgMQ=="),
Url: "ctlog.wosign.com",
MMD: 86400,
},
}
View Source
var OpenLogs = []LogInfo{
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEfahLEimAoz2t01p3uMziiLOl/fHTDM0YDOhBRuiBARsV4UvxG2LdNgoIGLrtCzWE0J5APC2em4JlvR8EEEFMoA=="),
Url: "ct.googleapis.com/pilot",
MMD: 86400,
},
{
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEIFsYyDzBi7MxCAC/oJBXK7dHjG+1aLCOkHjpoHPqTyghLpzA9BYbqvnV16mAw04vUjyYASVGJCUoI3ctBcJAeg=="),
Url: "ct.googleapis.com/rocketeer",
MMD: 86400,
},
}
Logs which accept submissions from anyone
View Source
var UnderwaterLogs = []LogInfo{
{
Description: "Google 'Submariner' log",
Key: mustDecodeBase64("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOfifIGLUV1Voou9JLfA5LZreRLSUMOCeeic8q3Dw0fpRkGMWV0Gtq20fgHQweQJeLVmEByQj9p81uIW4QkWkTw=="),
Url: "ct.googleapis.com/submariner",
MMD: 86400,
},
}
Logs which monitor certs from distrusted roots
Functions ¶
func GetFullChain ¶
func MatchesWildcard ¶
func ReadSTHFile ¶
func ReadSTHFile(path string) (*ct.SignedTreeHead, error)
func ValidatePrecert ¶
func VerifyConsistencyProof ¶
func VerifyConsistencyProof(proof ct.ConsistencyProof, first *ct.SignedTreeHead, second *ct.SignedTreeHead) bool
func WriteProofFile ¶
func WriteProofFile(path string, proof ct.ConsistencyProof) error
func WriteSTHFile ¶
func WriteSTHFile(path string, sth *ct.SignedTreeHead) error
Types ¶
type AttributeTypeAndValue ¶
type AttributeTypeAndValue struct { Type asn1.ObjectIdentifier Value asn1.RawValue }
type CertInfo ¶
type CertInfo struct { TBS *TBSCertificate Subject RDNSequence SubjectParseError error Issuer RDNSequence IssuerParseError error SANs []SubjectAltName SANsParseError error SerialNumber *big.Int SerialNumberParseError error Validity *CertValidity ValidityParseError error IsCA *bool IsCAParseError error }
func MakeCertInfoFromRawCert ¶
func MakeCertInfoFromRawTBS ¶
func MakeCertInfoFromTBS ¶
func MakeCertInfoFromTBS(tbs *TBSCertificate) *CertInfo
func (*CertInfo) ParseIdentifiers ¶
func (cert *CertInfo) ParseIdentifiers() (*Identifiers, error)
func (*CertInfo) PubkeyHash ¶
func (*CertInfo) PubkeyHashBytes ¶
type Certificate ¶
type Certificate struct { Raw asn1.RawContent TBSCertificate asn1.RawValue SignatureAlgorithm asn1.RawValue SignatureValue asn1.RawValue }
func ParseCertificate ¶
func ParseCertificate(certBytes []byte) (*Certificate, error)
func (*Certificate) GetRawTBSCertificate ¶
func (cert *Certificate) GetRawTBSCertificate() []byte
func (*Certificate) ParseTBSCertificate ¶
func (cert *Certificate) ParseTBSCertificate() (*TBSCertificate, error)
type CollapsedMerkleTree ¶
type CollapsedMerkleTree struct {
// contains filtered or unexported fields
}
func CloneCollapsedMerkleTree ¶
func CloneCollapsedMerkleTree(source *CollapsedMerkleTree) *CollapsedMerkleTree
func EmptyCollapsedMerkleTree ¶
func EmptyCollapsedMerkleTree() *CollapsedMerkleTree
func NewCollapsedMerkleTree ¶
func NewCollapsedMerkleTree(nodes []ct.MerkleTreeNode, size uint64) (*CollapsedMerkleTree, error)
func (*CollapsedMerkleTree) Add ¶
func (tree *CollapsedMerkleTree) Add(hash ct.MerkleTreeNode)
func (*CollapsedMerkleTree) CalculateRoot ¶
func (tree *CollapsedMerkleTree) CalculateRoot() ct.MerkleTreeNode
func (*CollapsedMerkleTree) GetSize ¶
func (tree *CollapsedMerkleTree) GetSize() uint64
func (*CollapsedMerkleTree) MarshalJSON ¶
func (tree *CollapsedMerkleTree) MarshalJSON() ([]byte, error)
func (*CollapsedMerkleTree) UnmarshalJSON ¶
func (tree *CollapsedMerkleTree) UnmarshalJSON(b []byte) error
type EntryInfo ¶
type EntryInfo struct { LogUri string Entry *ct.LogEntry IsPrecert bool FullChain [][]byte // first entry is logged X509 cert or pre-cert CertInfo *CertInfo ParseError error // set iff CertInfo is nil Identifiers *Identifiers IdentifiersParseError error Filename string }
func (*EntryInfo) Fingerprint ¶
func (*EntryInfo) FingerprintBytes ¶
func (*EntryInfo) HasParseErrors ¶
func (*EntryInfo) InvokeHookScript ¶
type Extension ¶
type Extension struct { Id asn1.ObjectIdentifier Critical bool `asn1:"optional"` Value []byte }
type Identifiers ¶
type Identifiers struct { DNSNames []string // stored as ASCII, with IDNs in Punycode IPAddrs []net.IP }
func NewIdentifiers ¶
func NewIdentifiers() *Identifiers
func (*Identifiers) AddCN ¶
func (ids *Identifiers) AddCN(value string)
func (*Identifiers) AddDnsSAN ¶
func (ids *Identifiers) AddDnsSAN(value []byte)
func (*Identifiers) AddIPAddress ¶
func (ids *Identifiers) AddIPAddress(value net.IP)
type LogInfo ¶
type LogInfoFile ¶
type LogInfoFile struct {
Logs []LogInfo `json:"logs"`
}
type ProcessCallback ¶
type RDNSequence ¶
type RDNSequence []RelativeDistinguishedNameSET
func ParseRDNSequence ¶
func ParseRDNSequence(rdnsBytes []byte) (RDNSequence, error)
func (RDNSequence) ParseCNs ¶
func (rdns RDNSequence) ParseCNs() ([]string, error)
func (RDNSequence) String ¶
func (rdns RDNSequence) String() string
type RelativeDistinguishedNameSET ¶
type RelativeDistinguishedNameSET []AttributeTypeAndValue
type Scanner ¶
type Scanner struct { // Base URI of CT log LogUri string LogId []byte // contains filtered or unexported fields }
Scanner is a tool to scan all the entries in a CT Log.
func NewScanner ¶
func NewScanner(logUri string, logId []byte, publicKey crypto.PublicKey, opts *ScannerOptions) *Scanner
Creates a new Scanner instance using |client| to talk to the log, and taking configuration options from |opts|.
func (*Scanner) CheckConsistency ¶
func (s *Scanner) CheckConsistency(first *ct.SignedTreeHead, second *ct.SignedTreeHead) (bool, error)
func (*Scanner) MakeCollapsedMerkleTree ¶
func (s *Scanner) MakeCollapsedMerkleTree(sth *ct.SignedTreeHead) (*CollapsedMerkleTree, error)
func (*Scanner) Scan ¶
func (s *Scanner) Scan(startIndex int64, endIndex int64, processCert ProcessCallback, tree *CollapsedMerkleTree) error
type ScannerOptions ¶
type ScannerOptions struct { // Number of entries to request in one batch from the Log BatchSize int // Number of concurrent proecssors to run NumWorkers int // Don't print any status messages to stdout Quiet bool }
ScannerOptions holds configuration options for the Scanner
func DefaultScannerOptions ¶
func DefaultScannerOptions() *ScannerOptions
Creates a new ScannerOptions struct with sensible defaults
type SubjectAltName ¶
func (SubjectAltName) String ¶
func (san SubjectAltName) String() string
type TBSCertificate ¶
type TBSCertificate struct { Raw asn1.RawContent Version int `asn1:"optional,explicit,default:1,tag:0"` SerialNumber asn1.RawValue SignatureAlgorithm asn1.RawValue Issuer asn1.RawValue Validity asn1.RawValue Subject asn1.RawValue PublicKey asn1.RawValue UniqueId asn1.BitString `asn1:"optional,tag:1"` SubjectUniqueId asn1.BitString `asn1:"optional,tag:2"` Extensions []Extension `asn1:"optional,explicit,tag:3"` }
func ParseTBSCertificate ¶
func ParseTBSCertificate(tbsBytes []byte) (*TBSCertificate, error)
func ReconstructPrecertTBS ¶
func ReconstructPrecertTBS(tbs *TBSCertificate) (*TBSCertificate, error)
func (*TBSCertificate) GetExtension ¶
func (tbs *TBSCertificate) GetExtension(id asn1.ObjectIdentifier) []Extension
func (*TBSCertificate) GetRawIssuer ¶
func (tbs *TBSCertificate) GetRawIssuer() []byte
func (*TBSCertificate) GetRawPublicKey ¶
func (tbs *TBSCertificate) GetRawPublicKey() []byte
func (*TBSCertificate) GetRawSubject ¶
func (tbs *TBSCertificate) GetRawSubject() []byte
func (*TBSCertificate) ParseBasicConstraints ¶
func (tbs *TBSCertificate) ParseBasicConstraints() (*bool, error)
func (*TBSCertificate) ParseIssuer ¶
func (tbs *TBSCertificate) ParseIssuer() (RDNSequence, error)
func (*TBSCertificate) ParseSerialNumber ¶
func (tbs *TBSCertificate) ParseSerialNumber() (*big.Int, error)
func (*TBSCertificate) ParseSubject ¶
func (tbs *TBSCertificate) ParseSubject() (RDNSequence, error)
func (*TBSCertificate) ParseSubjectAltNames ¶
func (tbs *TBSCertificate) ParseSubjectAltNames() ([]SubjectAltName, error)
func (*TBSCertificate) ParseSubjectCommonNames ¶
func (tbs *TBSCertificate) ParseSubjectCommonNames() ([]string, error)
func (*TBSCertificate) ParseValidity ¶
func (tbs *TBSCertificate) ParseValidity() (*CertValidity, error)
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
client
Package client is a CT log client implementation and contains types and code for interacting with RFC6962-compliant CT Log instances.
|
Package client is a CT log client implementation and contains types and code for interacting with RFC6962-compliant CT Log instances. |
Click to show internal directories.
Click to hide internal directories.