type crypto/x509.CertificateInvalidError
17 uses
crypto/x509 (current package)
verify.go#L68: type CertificateInvalidError struct {
verify.go#L74: func (e CertificateInvalidError) Error() string {
verify.go#L552: return CertificateInvalidError{c, TooManyConstraints, ""}
verify.go#L559: return CertificateInvalidError{c, CANotAuthorizedForThisName, err.Error()}
verify.go#L563: return CertificateInvalidError{c, CANotAuthorizedForThisName, fmt.Sprintf("%s %q is excluded by constraint %q", nameType, name, constraint)}
verify.go#L571: return CertificateInvalidError{c, TooManyConstraints, ""}
verify.go#L580: return CertificateInvalidError{c, CANotAuthorizedForThisName, err.Error()}
verify.go#L589: return CertificateInvalidError{c, CANotAuthorizedForThisName, fmt.Sprintf("%s %q is not permitted by any constraint", nameType, name)}
verify.go#L605: return CertificateInvalidError{c, NameMismatch, ""}
verify.go#L614: return CertificateInvalidError{
verify.go#L620: return CertificateInvalidError{
verify.go#L735: return CertificateInvalidError{c, NotAuthorizedToSign, ""}
verify.go#L741: return CertificateInvalidError{c, TooManyIntermediates, ""}
verify.go#L856: return nil, CertificateInvalidError{c, NoValidChains, "all candidate chains have invalid policies"}
verify.go#L887: return nil, CertificateInvalidError{c, IncompatibleUsage, ""}
verify.go#L894: err = CertificateInvalidError{c, NoValidChains, strings.Join(details, ", ")}
crypto/tls
handshake_server.go#L939: var errCertificateInvalid x509.CertificateInvalidError