crypto/x509.Certificate.DNSNames (field)
11 uses
crypto/x509 (current package)
parser.go#L700: out.DNSNames, out.EmailAddresses, out.IPAddresses, out.URIs, err = parseSANExtension(e.Value)
parser.go#L705: if len(out.DNSNames) == 0 && len(out.EmailAddresses) == 0 && len(out.IPAddresses) == 0 && len(out.URIs) == 0 {
verify.go#L135: if len(c.DNSNames) >= maxNamesIncluded {
verify.go#L136: return fmt.Sprintf("x509: certificate is valid for %d names, but none matched %s", len(c.DNSNames), h.Host)
verify.go#L138: valid.WriteString(strings.Join(c.DNSNames, ", "))
verify.go#L1226: for _, match := range c.DNSNames {
x509.go#L766: DNSNames []string
x509.go#L1253: if (len(template.DNSNames) > 0 || len(template.EmailAddresses) > 0 || len(template.IPAddresses) > 0 || len(template.URIs) > 0) &&
x509.go#L1260: ret[n].Value, err = marshalSANs(template.DNSNames, template.EmailAddresses, template.IPAddresses, template.URIs)
crypto/tls
common.go#L1523: if x509Cert.Subject.CommonName != "" && len(x509Cert.DNSNames) == 0 {
common.go#L1526: for _, san := range x509Cert.DNSNames {