Home | History | Annotate | Download | only in x509

Lines Matching refs:asn1

23 	"encoding/asn1"
37 cryptobyte_asn1 "golang_org/x/crypto/cryptobyte/asn1"
44 BitString asn1.BitString
57 if rest, err := asn1.Unmarshal(derBytes, &pki); err != nil {
72 publicKeyBytes, err = asn1.Marshal(pkcs1PublicKey{
82 publicKeyAlgorithm.Parameters = asn1.NullRawValue
91 paramBytes, err = asn1.Marshal(oid)
115 BitString: asn1.BitString{
121 ret, _ := asn1.Marshal(pkix)
128 Raw asn1.RawContent
131 SignatureValue asn1.BitString
135 Raw asn1.RawContent
136 Version int `asn1:"optional,explicit,default:0,tag:0"`
139 Issuer asn1.RawValue
141 Subject asn1.RawValue
143 UniqueId asn1.BitString `asn1:"optional,tag:1"`
144 SubjectUniqueId asn1.BitString `asn1:"optional,tag:2"`
145 Extensions []pkix.Extension `asn1:"optional,explicit,tag:3"`
163 Raw asn1.RawContent
165 PublicKey asn1.BitString
170 Id []byte `asn1:"optional,tag:0"`
285 oidSignatureMD2WithRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 2}
286 oidSignatureMD5WithRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 4}
287 oidSignatureSHA1WithRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 5}
288 oidSignatureSHA256WithRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 11}
289 oidSignatureSHA384WithRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 12}
290 oidSignatureSHA512WithRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 13}
291 oidSignatureRSAPSS = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 10}
292 oidSignatureDSAWithSHA1 = asn1.ObjectIdentifier{1, 2, 840, 10040, 4, 3}
293 oidSignatureDSAWithSHA256 = asn1.ObjectIdentifier{2, 16, 840, 1, 101, 3, 4, 3, 2}
294 oidSignatureECDSAWithSHA1 = asn1.ObjectIdentifier{1, 2, 840, 10045, 4, 1}
295 oidSignatureECDSAWithSHA256 = asn1.ObjectIdentifier{1, 2, 840, 10045, 4, 3, 2}
296 oidSignatureECDSAWithSHA384 = asn1.ObjectIdentifier{1, 2, 840, 10045, 4, 3, 3}
297 oidSignatureECDSAWithSHA512 = asn1.ObjectIdentifier{1, 2, 840, 10045, 4, 3, 4}
299 oidSHA256 = asn1.ObjectIdentifier{2, 16, 840, 1, 101, 3, 4, 2, 1}
300 oidSHA384 = asn1.ObjectIdentifier{2, 16, 840, 1, 101, 3, 4, 2, 2}
301 oidSHA512 = asn1.ObjectIdentifier{2, 16, 840, 1, 101, 3, 4, 2, 3}
303 oidMGF1 = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 8}
308 oidISOSignatureSHA1WithRSA = asn1.ObjectIdentifier{1, 3, 14, 3, 2, 29}
314 oid asn1.ObjectIdentifier
342 Hash pkix.AlgorithmIdentifier `asn1:"explicit,tag:0"`
343 MGF pkix.AlgorithmIdentifier `asn1:"explicit,tag:1"`
344 SaltLength int `asn1:"explicit,tag:2"`
345 TrailerField int `asn1:"optional,explicit,tag:3,default:1"`
348 // rsaPSSParameters returns an asn1.RawValue suitable for use as the Parameters
350 func rsaPSSParameters(hashFunc crypto.Hash) asn1.RawValue {
351 var hashOID asn1.ObjectIdentifier
365 Parameters: asn1.NullRawValue,
376 Parameters: asn1.NullRawValue,
380 params.MGF.Parameters.FullBytes, err = asn1.Marshal(mgf1Params)
385 serialized, err := asn1.Marshal(params)
390 return asn1.RawValue{FullBytes: serialized}
407 if _, err := asn1.Unmarshal(ai.Parameters.FullBytes, &params); err != nil {
412 if _, err := asn1.Unmarshal(params.MGF.Parameters.FullBytes, &mgf1HashFunc); err != nil {
423 if !bytes.Equal(params.Hash.Parameters.FullBytes, asn1.NullBytes) ||
426 !bytes.Equal(mgf1HashFunc.Parameters.FullBytes, asn1.NullBytes) ||
458 oidPublicKeyRSA = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 1, 1}
459 oidPublicKeyDSA = asn1.ObjectIdentifier{1, 2, 840, 10040, 4, 1}
460 oidPublicKeyECDSA = asn1.ObjectIdentifier{1, 2, 840, 10045, 2, 1}
463 func getPublicKeyAlgorithmFromOID(oid asn1.ObjectIdentifier) PublicKeyAlgorithm {
492 oidNamedCurveP224 = asn1.ObjectIdentifier{1, 3, 132, 0, 33}
493 oidNamedCurveP256 = asn1.ObjectIdentifier{1, 2, 840, 10045, 3, 1, 7}
494 oidNamedCurveP384 = asn1.ObjectIdentifier{1, 3, 132, 0, 34}
495 oidNamedCurveP521 = asn1.ObjectIdentifier{1, 3, 132, 0, 35}
498 func namedCurveFromOID(oid asn1.ObjectIdentifier) elliptic.Curve {
512 func oidFromNamedCurve(curve elliptic.Curve) (asn1.ObjectIdentifier, bool) {
556 oidExtKeyUsageAny = asn1.ObjectIdentifier{2, 5, 29, 37, 0}
557 oidExtKeyUsageServerAuth = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 1}
558 oidExtKeyUsageClientAuth = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 2}
559 oidExtKeyUsageCodeSigning = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 3}
560 oidExtKeyUsageEmailProtection = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 4}
561 oidExtKeyUsageIPSECEndSystem = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 5}
562 oidExtKeyUsageIPSECTunnel = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 6}
563 oidExtKeyUsageIPSECUser = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 7}
564 oidExtKeyUsageTimeStamping = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 8}
565 oidExtKeyUsageOCSPSigning = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 3, 9}
566 oidExtKeyUsageMicrosoftServerGatedCrypto = asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 311, 10, 3, 3}
567 oidExtKeyUsageNetscapeServerGatedCrypto = asn1.ObjectIdentifier{2, 16, 840, 1, 113730, 4, 1}
568 oidExtKeyUsageMicrosoftCommercialCodeSigning = asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 311, 2, 1, 22}
569 oidExtKeyUsageMicrosoftKernelCodeSigning = asn1.ObjectIdentifier{1, 3, 6, 1, 4, 1, 311, 61, 1, 1}
596 oid asn1.ObjectIdentifier
614 func extKeyUsageFromOID(oid asn1.ObjectIdentifier) (eku ExtKeyUsage, ok bool) {
623 func oidFromExtKeyUsage(eku ExtKeyUsage) (oid asn1.ObjectIdentifier, ok bool) {
673 UnhandledCriticalExtensions []asn1.ObjectIdentifier
676 UnknownExtKeyUsage []asn1.ObjectIdentifier // Encountered extended key usages unknown to this package.
729 PolicyIdentifiers []asn1.ObjectIdentifier
910 if rest, err := asn1.Unmarshal(signature, dsaSig); err != nil {
927 if rest, err := asn1.Unmarshal(signature, ecdsaSig); err != nil {
956 IsCA bool `asn1:"optional"`
957 MaxPathLen int `asn1:"optional,default:-1"`
962 Policy asn1.ObjectIdentifier
975 Method asn1.ObjectIdentifier
976 Location asn1.RawValue
981 DistributionPoint distributionPointName `asn1:"optional,tag:0"`
982 Reason asn1.BitString `asn1:"optional,tag:1"`
983 CRLIssuer asn1.RawValue `asn1:"optional,tag:2"`
987 FullName []asn1.RawValue `asn1:"optional,tag:0"`
988 RelativeName pkix.RDNSequence `asn1:"optional,tag:1"`
997 if !bytes.Equal(keyData.Algorithm.Parameters.FullBytes, asn1.NullBytes) {
1002 rest, err := asn1.Unmarshal(asn1Data, p)
1024 rest, err := asn1.Unmarshal(asn1Data, &p)
1033 rest, err = asn1.Unmarshal(paramsData, params)
1054 namedCurveOID := new(asn1.ObjectIdentifier)
1055 rest, err := asn1.Unmarshal(paramsData, namedCurveOID)
1098 var seq asn1.RawValue
1099 rest, err := asn1.Unmarshal(extension, &seq)
1106 return asn1.StructuralError{Msg: "bad SAN sequence"}
1111 var v asn1.RawValue
1112 rest, err = asn1.Unmarshal(rest, &v)
1375 if rest, err := asn1.Unmarshal(in.TBSCertificate.Subject.FullBytes, &subject); err != nil {
1380 if rest, err := asn1.Unmarshal(in.TBSCertificate.Issuer.FullBytes, &issuer); err != nil {
1400 var usageBits asn1.BitString
1401 if rest, err := asn1.Unmarshal(e.Value, &usageBits); err != nil {
1418 if rest, err := asn1.Unmarshal(e.Value, &constraints); err != nil {
1461 if rest, err := asn1.Unmarshal(e.Value, &cdp); err != nil {
1483 if rest, err := asn1.Unmarshal(e.Value, &a); err != nil {
1499 var keyUsage []asn1.ObjectIdentifier
1500 if rest, err := asn1.Unmarshal(e.Value, &keyUsage); err != nil {
1517 if rest, err := asn1.Unmarshal(e.Value, &keyid); err != nil {
1527 if rest, err := asn1.Unmarshal(e.Value, &policies); err != nil {
1532 out.PolicyIdentifiers = make([]asn1.ObjectIdentifier, len(policies))
1544 if rest, err := asn1.Unmarshal(e.Value, &aia); err != nil {
1577 rest, err := asn1.Unmarshal(asn1Data, &cert)
1582 return nil, asn1.SyntaxError{Msg: "trailing data"}
1596 asn1Data, err = asn1.Unmarshal(asn1Data, cert)
1656 oidAuthorityInfoAccessOcsp = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 48, 1}
1657 oidAuthorityInfoAccessIssuers = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 48, 2}
1662 func oidInExtensions(oid asn1.ObjectIdentifier, extensions []pkix.Extension) bool {
1674 var rawValues []asn1.RawValue
1676 rawValues = append(rawValues, asn1.RawValue{Tag: nameTypeDNS, Class: 2, Bytes: []byte(name)})
1679 rawValues = append(rawValues, asn1.RawValue{Tag: nameTypeEmail, Class: 2, Bytes: []byte(email)})
1687 rawValues = append(rawValues, asn1.RawValue{Tag: nameTypeIP, Class: 2, Bytes: ip})
1690 rawValues = append(rawValues, asn1.RawValue{Tag: nameTypeURI, Class: 2, Bytes: []byte(uri.String())})
1692 return asn1.Marshal(rawValues)
1724 ret[n].Value, err = asn1.Marshal(asn1.BitString{Bytes: bitString, BitLength: asn1BitLength(bitString)})
1735 var oids []asn1.ObjectIdentifier
1746 ret[n].Value, err = asn1.Marshal(oids)
1756 // -1 causes encoding/asn1 to omit the value as desired.
1762 ret[n].Value, err = asn1.Marshal(basicConstraints{template.IsCA, maxPathLen})
1772 ret[n].Value, err = asn1.Marshal(template.SubjectKeyId)
1781 ret[n].Value, err = asn1.Marshal(authKeyId{authorityKeyId})
1795 Location: asn1.RawValue{Tag: 6, Class: 2, Bytes: []byte(name)},
1801 Location: asn1.RawValue{Tag: 6, Class: 2, Bytes: []byte(name)},
1804 ret[n].Value, err = asn1.Marshal(aiaValues)
1832 ret[n].Value, err = asn1.Marshal(policies)
1945 FullName: []asn1.RawValue{
1946 asn1.RawValue{Tag: 6, Class: 2, Bytes: []byte(name)},
1953 ret[n].Value, err = asn1.Marshal(crlDp)
1971 return asn1.Marshal(cert.Subject.ToRDNSequence())
1985 sigAlgo.Parameters = asn1.NullRawValue
2106 encodedPublicKey := asn1.BitString{BitLength: len(publicKeyBytes) * 8, Bytes: publicKeyBytes}
2111 Issuer: asn1.RawValue{FullBytes: asn1Issuer},
2113 Subject: asn1.RawValue{FullBytes: asn1Subject},
2118 tbsCertContents, err := asn1.Marshal(c)
2144 return asn1.Marshal(certificate{
2148 asn1.BitString{Bytes: signature, BitLength: len(signature) * 8},
2176 if rest, err := asn1.Unmarshal(derBytes, certList); err != nil {
2217 aki.Value, err = asn1.Marshal(authKeyId{Id: c.SubjectKeyId})
2224 tbsCertListContents, err := asn1.Marshal(tbsCertList)
2239 return asn1.Marshal(pkix.CertificateList{
2242 SignatureValue: asn1.BitString{Bytes: signature, BitLength: len(signature) * 8},
2290 Raw asn1.RawContent
2292 Subject asn1.RawValue
2294 RawAttributes []asn1.RawValue `asn1:"tag:0"`
2298 Raw asn1.RawContent
2301 SignatureValue asn1.BitString
2306 var oidExtensionRequest = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 9, 14}
2310 func newRawAttributes(attributes []pkix.AttributeTypeAndValueSET) ([]asn1.RawValue, error) {
2311 var rawAttributes []asn1.RawValue
2312 b, err := asn1.Marshal(attributes)
2316 rest, err := asn1.Unmarshal(b, &rawAttributes)
2327 func parseRawAttributes(rawAttributes []asn1.RawValue) []pkix.AttributeTypeAndValueSET {
2331 rest, err := asn1.Unmarshal(rawAttr.FullBytes, &attr)
2343 func parseCSRExtensions(rawAttributes []asn1.RawValue) ([]pkix.Extension, error) {
2347 Id asn1.ObjectIdentifier
2348 Values []asn1.RawValue `asn1:"set"`
2354 if rest, err := asn1.Unmarshal(rawAttr.FullBytes, &attr); err != nil || len(rest) != 0 || len(attr.Values) == 0 {
2364 if _, err := asn1.Unmarshal(attr.Values[0].FullBytes, &extensions); err != nil {
2479 asn1Subject, err = asn1.Marshal(template.Subject.ToRDNSequence())
2492 Subject: asn1.RawValue{FullBytes: asn1Subject},
2495 PublicKey: asn1.BitString{
2503 tbsCSRContents, err := asn1.Marshal(tbsCSR)
2519 return asn1.Marshal(certificateRequest{
2522 SignatureValue: asn1.BitString{
2534 rest, err := asn1.Unmarshal(asn1Data, &csr)
2538 return nil, asn1.SyntaxError{Msg: "trailing data"}
2567 if rest, err := asn1.Unmarshal(in.TBSCSR.Subject.FullBytes, &subject); err != nil {