crypto/x509.Certificate.DNSNames (field)

11 uses

	crypto/x509 (current package)
		parser.go#L700: 				out.DNSNames, out.EmailAddresses, out.IPAddresses, out.URIs, err = parseSANExtension(e.Value)
		parser.go#L705: 				if len(out.DNSNames) == 0 && len(out.EmailAddresses) == 0 && len(out.IPAddresses) == 0 && len(out.URIs) == 0 {
		verify.go#L135: 		if len(c.DNSNames) >= maxNamesIncluded {
		verify.go#L136: 			return fmt.Sprintf("x509: certificate is valid for %d names, but none matched %s", len(c.DNSNames), h.Host)
		verify.go#L138: 		valid.WriteString(strings.Join(c.DNSNames, ", "))
		verify.go#L1226: 	for _, match := range c.DNSNames {
		x509.go#L766: 	DNSNames       []string
		x509.go#L1253: 	if (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&
		x509.go#L1260: 		ret[n].Value, err = marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)

	crypto/tls
		common.go#L1523: 		if x509Cert.Subject.CommonName != "" && len(x509Cert.DNSNames) == 0 {
		common.go#L1526: 		for _, san := range x509Cert.DNSNames {