type crypto/x509.Certificate

99 uses

	crypto/x509 (current package)
		cert_pool.go#L50: 	constraint func([]*Certificate) error
		cert_pool.go#L60: 	getCert func() (*Certificate, error)
		cert_pool.go#L81: func (s *CertPool) cert(n int) (*Certificate, func([]*Certificate) error, error) {
		cert_pool.go#L126: 	cert       *Certificate
		cert_pool.go#L127: 	constraint func([]*Certificate) error
		cert_pool.go#L132: func (s *CertPool) findPotentialParents(cert *Certificate) []potentialParent {
		cert_pool.go#L172: func (s *CertPool) contains(cert *Certificate) bool {
		cert_pool.go#L180: func (s *CertPool) AddCert(cert *Certificate) {
		cert_pool.go#L184: 	s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
		cert_pool.go#L194: func (s *CertPool) addCertFunc(rawSum224 sum224, rawSubject string, getCert func() (*Certificate, error), constraint func([]*Certificate) error) {
		cert_pool.go#L237: 			v *Certificate
		cert_pool.go#L239: 		s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
		cert_pool.go#L287: func (s *CertPool) AddCertWithConstraint(cert *Certificate, constraint func([]*Certificate) error) {
		cert_pool.go#L291: 	s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
		parser.go#L541: func parseNameConstraintsExtension(out *Certificate, e pkix.Extension) (unhandled bool, err error) {
		parser.go#L680: func processExtensions(out *Certificate) error {
		parser.go#L894: func parseCertificate(der []byte) (*Certificate, error) {
		parser.go#L895: 	cert := &Certificate{}
		parser.go#L1084: func ParseCertificate(der []byte) (*Certificate, error) {
		parser.go#L1097: func ParseCertificates(der []byte) ([]*Certificate, error) {
		parser.go#L1098: 	var certs []*Certificate
		root_unix.go#L28: func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
		verify.go#L69: 	Cert   *Certificate
		verify.go#L107: 	Certificate *Certificate
		verify.go#L149: 	Cert *Certificate
		verify.go#L155: 	hintCert *Certificate
		verify.go#L568: func (c *Certificate) checkNameConstraints(count *int,
		verify.go#L625: func (c *Certificate) isValid(certType int, currentChain []*Certificate, opts *VerifyOptions) error {
		verify.go#L682: 		toCheck := []*Certificate{}
		verify.go#L821: func (c *Certificate) Verify(opts VerifyOptions) (chains [][]*Certificate, err error) {
		verify.go#L875: 	var candidateChains [][]*Certificate
		verify.go#L877: 		candidateChains = [][]*Certificate{{c}}
		verify.go#L879: 		candidateChains, err = c.buildChains([]*Certificate{c}, nil, &opts)
		verify.go#L885: 	chains = make([][]*Certificate, 0, len(candidateChains))
		verify.go#L942: func appendToFreshChain(chain []*Certificate, cert *Certificate) []*Certificate {
		verify.go#L943: 	n := make([]*Certificate, len(chain)+1)
		verify.go#L954: func alreadyInChain(candidate *Certificate, chain []*Certificate) bool {
		verify.go#L1002: func (c *Certificate) buildChains(currentChain []*Certificate, sigChecks *int, opts *VerifyOptions) (chains [][]*Certificate, err error) {
		verify.go#L1005: 		hintCert *Certificate
		verify.go#L1053: 			var childChains [][]*Certificate
		verify.go#L1206: func (c *Certificate) VerifyHostname(h string) error {
		verify.go#L1246: func checkChainForKeyUsage(chain []*Certificate, keyUsages []ExtKeyUsage) bool {
		verify.go#L1445: func policiesValid(chain []*Certificate, opts VerifyOptions) bool {
		x509.go#L687: type Certificate struct {
		x509.go#L896: func (c *Certificate) Equal(other *Certificate) bool {
		x509.go#L903: func (c *Certificate) hasSANExtension() bool {
		x509.go#L911: func (c *Certificate) CheckSignatureFrom(parent *Certificate) error {
		x509.go#L940: func (c *Certificate) CheckSignature(algo SignatureAlgorithm, signed, signature []byte) error {
		x509.go#L944: func (c *Certificate) hasNameConstraints() bool {
		x509.go#L948: func (c *Certificate) getSANExtension() []byte {
		x509.go#L1030: func (c *Certificate) CheckCRLSignature(crl *pkix.CertificateList) error {
		x509.go#L1182: func buildCertExtensions(template *Certificate, subjectIsEmpty bool, authorityKeyId []byte, subjectKeyId []byte) (ret []pkix.Extension, err error) {
		x509.go#L1506: func subjectBytes(cert *Certificate) ([]byte, error) {
		x509.go#L1662: func CreateCertificate(rand io.Reader, template, parent *Certificate, pub, priv any) ([]byte, error) {
		x509.go#L1838: func (c *Certificate) CreateCRL(rand io.Reader, priv any, revokedCerts []pkix.RevokedCertificate, now, expiry time.Time) (crlBytes []byte, err error) {
		x509.go#L2400: func CreateRevocationList(rand io.Reader, template *RevocationList, issuer *Certificate, priv crypto.Signer) ([]byte, error) {
		x509.go#L2550: func (rl *RevocationList) CheckSignatureFrom(parent *Certificate) error {

	crypto/tls
		cache.go#L19: func (wcc *weakCertCache) newCert(der []byte) (*x509.Certificate, error) {
		cache.go#L21: 		if v := entry.(weak.Pointer[x509.Certificate]).Value(); v != nil {
		cache.go#L34: 	} else if v := entry.(weak.Pointer[x509.Certificate]).Value(); v != nil {
		common.go#L276: 	PeerCertificates []*x509.Certificate
		common.go#L287: 	VerifiedChains [][]*x509.Certificate
		common.go#L643: 	VerifyPeerCertificate func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
		common.go#L1578: 	Leaf *x509.Certificate
		common.go#L1583: func (c *Certificate) leaf() (*x509.Certificate, error) {
		common.go#L1756: 	UnverifiedCertificates []*x509.Certificate
		common.go#L1774: func fipsAllowedChains(chains [][]*x509.Certificate) ([][]*x509.Certificate, error) {
		common.go#L1779: 	permittedChains := make([][]*x509.Certificate, 0, len(chains))
		common.go#L1793: func fipsAllowChain(chain []*x509.Certificate) bool {
		conn.go#L57: 	peerCertificates []*x509.Certificate
		conn.go#L60: 	verifiedChains [][]*x509.Certificate
		defaults_fips140.go#L65: func isCertificateAllowedFIPS(c *x509.Certificate) bool {
		handshake_client.go#L1113: 	certs := make([]*x509.Certificate, len(certificates))
		handshake_server.go#L929: 	certs := make([]*x509.Certificate, len(certificates))
		key_agreement.go#L35: 	processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
		key_agreement.go#L36: 	generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
		key_agreement.go#L78: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L82: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		key_agreement.go#L283: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L376: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		ticket.go#L90: 	peerCertificates []*x509.Certificate
		ticket.go#L93: 	verifiedChains   [][]*x509.Certificate
		ticket.go#L178: func certificatesToBytesSlice(certs []*x509.Certificate) [][]byte {
		ticket.go#L257: 		var chain []*x509.Certificate

	google.golang.org/grpc/internal/credentials
		spiffe.go#L45: func SPIFFEIDFromCert(cert *x509.Certificate) *url.URL {