type crypto/x509.Certificate
84 uses
crypto/x509 (current package)
cert_pool.go#L55: getCert func() (*Certificate, error)
cert_pool.go#L76: func (s *CertPool) cert(n int) (*Certificate, error) {
cert_pool.go#L120: func (s *CertPool) findPotentialParents(cert *Certificate) []*Certificate {
cert_pool.go#L131: var matchingKeyID, oneKeyID, mismatchKeyID []*Certificate
cert_pool.go#L153: candidates := make([]*Certificate, 0, found)
cert_pool.go#L160: func (s *CertPool) contains(cert *Certificate) bool {
cert_pool.go#L168: func (s *CertPool) AddCert(cert *Certificate) {
cert_pool.go#L172: s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
cert_pool.go#L182: func (s *CertPool) addCertFunc(rawSum224 sum224, rawSubject string, getCert func() (*Certificate, error)) {
cert_pool.go#L224: v *Certificate
cert_pool.go#L226: s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
parser.go#L496: func parseNameConstraintsExtension(out *Certificate, e pkix.Extension) (unhandled bool, err error) {
parser.go#L656: func processExtensions(out *Certificate) error {
parser.go#L813: func parseCertificate(der []byte) (*Certificate, error) {
parser.go#L814: cert := &Certificate{}
parser.go#L989: func ParseCertificate(der []byte) (*Certificate, error) {
parser.go#L1002: func ParseCertificates(der []byte) ([]*Certificate, error) {
parser.go#L1003: var certs []*Certificate
root_unix.go#L28: func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
verify.go#L62: Cert *Certificate
verify.go#L94: Certificate *Certificate
verify.go#L129: Cert *Certificate
verify.go#L135: hintCert *Certificate
verify.go#L499: func (c *Certificate) checkNameConstraints(count *int,
verify.go#L556: func (c *Certificate) isValid(certType int, currentChain []*Certificate, opts *VerifyOptions) error {
verify.go#L592: var leaf *Certificate
verify.go#L731: func (c *Certificate) Verify(opts VerifyOptions) (chains [][]*Certificate, err error) {
verify.go#L782: var candidateChains [][]*Certificate
verify.go#L784: candidateChains = append(candidateChains, []*Certificate{c})
verify.go#L786: if candidateChains, err = c.buildChains(nil, []*Certificate{c}, nil, &opts); err != nil {
verify.go#L816: func appendToFreshChain(chain []*Certificate, cert *Certificate) []*Certificate {
verify.go#L817: n := make([]*Certificate, len(chain)+1)
verify.go#L829: func (c *Certificate) buildChains(cache map[*Certificate][][]*Certificate, currentChain []*Certificate, sigChecks *int, opts *VerifyOptions) (chains [][]*Certificate, err error) {
verify.go#L832: hintCert *Certificate
verify.go#L835: considerCandidate := func(certType int, candidate *Certificate) {
verify.go#L869: cache = make(map[*Certificate][][]*Certificate)
verify.go#L1022: func (c *Certificate) VerifyHostname(h string) error {
verify.go#L1062: func checkChainForKeyUsage(chain []*Certificate, keyUsages []ExtKeyUsage) bool {
x509.go#L628: type Certificate struct {
x509.go#L761: func (c *Certificate) Equal(other *Certificate) bool {
x509.go#L768: func (c *Certificate) hasSANExtension() bool {
x509.go#L774: func (c *Certificate) CheckSignatureFrom(parent *Certificate) error {
x509.go#L800: func (c *Certificate) CheckSignature(algo SignatureAlgorithm, signed, signature []byte) error {
x509.go#L804: func (c *Certificate) hasNameConstraints() bool {
x509.go#L808: func (c *Certificate) getSANExtension() []byte {
x509.go#L886: func (c *Certificate) CheckCRLSignature(crl *pkix.CertificateList) error {
x509.go#L1035: func buildCertExtensions(template *Certificate, subjectIsEmpty bool, authorityKeyId []byte, subjectKeyId []byte) (ret []pkix.Extension, err error) {
x509.go#L1349: func subjectBytes(cert *Certificate) ([]byte, error) {
x509.go#L1486: func CreateCertificate(rand io.Reader, template, parent *Certificate, pub, priv any) ([]byte, error) {
x509.go#L1651: func (c *Certificate) CreateCRL(rand io.Reader, priv any, revokedCerts []pkix.RevokedCertificate, now, expiry time.Time) (crlBytes []byte, err error) {
x509.go#L2129: func CreateRevocationList(rand io.Reader, template *RevocationList, issuer *Certificate, priv crypto.Signer) ([]byte, error) {
crypto/tls
common.go#L250: PeerCertificates []*x509.Certificate
common.go#L259: VerifiedChains [][]*x509.Certificate
common.go#L336: serverCertificates []*x509.Certificate // Certificate chain presented by the server
common.go#L337: verifiedChains [][]*x509.Certificate // Certificate chains we built for verification
common.go#L601: VerifyPeerCertificate func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
common.go#L1369: Leaf *x509.Certificate
common.go#L1374: func (c *Certificate) leaf() (*x509.Certificate, error) {
conn.go#L51: peerCertificates []*x509.Certificate
conn.go#L54: verifiedChains [][]*x509.Certificate
handshake_client.go#L847: certs := make([]*x509.Certificate, len(certificates))
handshake_server.go#L799: certs := make([]*x509.Certificate, len(certificates))
key_agreement.go#L33: processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
key_agreement.go#L34: generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
key_agreement.go#L76: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L80: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
key_agreement.go#L270: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L351: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
google.golang.org/grpc/internal/credentials
spiffe.go#L45: func SPIFFEIDFromCert(cert *x509.Certificate) *url.URL {
net/http/httptest
server.go#L45: certificate *x509.Certificate
server.go#L293: func (s *Server) Certificate() *x509.Certificate {