type crypto/x509.CertificateInvalidError

17 uses

	crypto/x509 (current package)
		verify.go#L68: type CertificateInvalidError struct {
		verify.go#L74: func (e CertificateInvalidError) Error() string {
		verify.go#L580: 		return CertificateInvalidError{c, TooManyConstraints, ""}
		verify.go#L587: 			return CertificateInvalidError{c, CANotAuthorizedForThisName, err.Error()}
		verify.go#L591: 			return CertificateInvalidError{c, CANotAuthorizedForThisName, fmt.Sprintf("%s %q is excluded by constraint %q", nameType, name, constraint)}
		verify.go#L599: 		return CertificateInvalidError{c, TooManyConstraints, ""}
		verify.go#L608: 			return CertificateInvalidError{c, CANotAuthorizedForThisName, err.Error()}
		verify.go#L617: 		return CertificateInvalidError{c, CANotAuthorizedForThisName, fmt.Sprintf("%s %q is not permitted by any constraint", nameType, name)}
		verify.go#L633: 			return CertificateInvalidError{c, NameMismatch, ""}
		verify.go#L642: 		return CertificateInvalidError{
		verify.go#L648: 		return CertificateInvalidError{
		verify.go#L776: 		return CertificateInvalidError{c, NotAuthorizedToSign, ""}
		verify.go#L782: 			return CertificateInvalidError{c, TooManyIntermediates, ""}
		verify.go#L897: 		return nil, CertificateInvalidError{c, NoValidChains, "all candidate chains have invalid policies"}
		verify.go#L928: 				return nil, CertificateInvalidError{c, IncompatibleUsage, ""}
		verify.go#L935: 		err = CertificateInvalidError{c, NoValidChains, strings.Join(details, ", ")}

	crypto/tls
		handshake_server.go#L968: 			var errCertificateInvalid x509.CertificateInvalidError