type crypto/x509.Certificate
92 uses
crypto/x509 (current package)
cert_pool.go#L50: constraint func([]*Certificate) error
cert_pool.go#L60: getCert func() (*Certificate, error)
cert_pool.go#L81: func (s *CertPool) cert(n int) (*Certificate, func([]*Certificate) error, error) {
cert_pool.go#L126: cert *Certificate
cert_pool.go#L127: constraint func([]*Certificate) error
cert_pool.go#L132: func (s *CertPool) findPotentialParents(cert *Certificate) []potentialParent {
cert_pool.go#L172: func (s *CertPool) contains(cert *Certificate) bool {
cert_pool.go#L180: func (s *CertPool) AddCert(cert *Certificate) {
cert_pool.go#L184: s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
cert_pool.go#L194: func (s *CertPool) addCertFunc(rawSum224 sum224, rawSubject string, getCert func() (*Certificate, error), constraint func([]*Certificate) error) {
cert_pool.go#L237: v *Certificate
cert_pool.go#L239: s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
cert_pool.go#L287: func (s *CertPool) AddCertWithConstraint(cert *Certificate, constraint func([]*Certificate) error) {
cert_pool.go#L291: s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
notboring.go#L9: func boringAllowCert(c *Certificate) bool { return true }
parser.go#L504: func parseNameConstraintsExtension(out *Certificate, e pkix.Extension) (unhandled bool, err error) {
parser.go#L664: func processExtensions(out *Certificate) error {
parser.go#L829: func parseCertificate(der []byte) (*Certificate, error) {
parser.go#L830: cert := &Certificate{}
parser.go#L1019: func ParseCertificate(der []byte) (*Certificate, error) {
parser.go#L1032: func ParseCertificates(der []byte) ([]*Certificate, error) {
parser.go#L1033: var certs []*Certificate
root_unix.go#L28: func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
verify.go#L65: Cert *Certificate
verify.go#L97: Certificate *Certificate
verify.go#L132: Cert *Certificate
verify.go#L138: hintCert *Certificate
verify.go#L509: func (c *Certificate) checkNameConstraints(count *int,
verify.go#L566: func (c *Certificate) isValid(certType int, currentChain []*Certificate, opts *VerifyOptions) error {
verify.go#L610: toCheck := []*Certificate{}
verify.go#L756: func (c *Certificate) Verify(opts VerifyOptions) (chains [][]*Certificate, err error) {
verify.go#L810: var candidateChains [][]*Certificate
verify.go#L812: candidateChains = [][]*Certificate{{c}}
verify.go#L814: candidateChains, err = c.buildChains([]*Certificate{c}, nil, &opts)
verify.go#L832: chains = make([][]*Certificate, 0, len(candidateChains))
verify.go#L846: func appendToFreshChain(chain []*Certificate, cert *Certificate) []*Certificate {
verify.go#L847: n := make([]*Certificate, len(chain)+1)
verify.go#L858: func alreadyInChain(candidate *Certificate, chain []*Certificate) bool {
verify.go#L903: func (c *Certificate) buildChains(currentChain []*Certificate, sigChecks *int, opts *VerifyOptions) (chains [][]*Certificate, err error) {
verify.go#L906: hintCert *Certificate
verify.go#L954: var childChains [][]*Certificate
verify.go#L1107: func (c *Certificate) VerifyHostname(h string) error {
verify.go#L1147: func checkChainForKeyUsage(chain []*Certificate, keyUsages []ExtKeyUsage) bool {
x509.go#L686: type Certificate struct {
x509.go#L825: func (c *Certificate) Equal(other *Certificate) bool {
x509.go#L832: func (c *Certificate) hasSANExtension() bool {
x509.go#L840: func (c *Certificate) CheckSignatureFrom(parent *Certificate) error {
x509.go#L869: func (c *Certificate) CheckSignature(algo SignatureAlgorithm, signed, signature []byte) error {
x509.go#L873: func (c *Certificate) hasNameConstraints() bool {
x509.go#L877: func (c *Certificate) getSANExtension() []byte {
x509.go#L964: func (c *Certificate) CheckCRLSignature(crl *pkix.CertificateList) error {
x509.go#L1116: func buildCertExtensions(template *Certificate, subjectIsEmpty bool, authorityKeyId []byte, subjectKeyId []byte) (ret []pkix.Extension, err error) {
x509.go#L1440: func subjectBytes(cert *Certificate) ([]byte, error) {
x509.go#L1599: func CreateCertificate(rand io.Reader, template, parent *Certificate, pub, priv any) ([]byte, error) {
x509.go#L1746: func (c *Certificate) CreateCRL(rand io.Reader, priv any, revokedCerts []pkix.RevokedCertificate, now, expiry time.Time) (crlBytes []byte, err error) {
x509.go#L2307: func CreateRevocationList(rand io.Reader, template *RevocationList, issuer *Certificate, priv crypto.Signer) ([]byte, error) {
x509.go#L2457: func (rl *RevocationList) CheckSignatureFrom(parent *Certificate) error {
crypto/tls
cache.go#L16: cert *x509.Certificate
cache.go#L48: cert *x509.Certificate
common.go#L266: PeerCertificates []*x509.Certificate
common.go#L277: VerifiedChains [][]*x509.Certificate
common.go#L626: VerifyPeerCertificate func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
common.go#L1501: Leaf *x509.Certificate
common.go#L1506: func (c *Certificate) leaf() (*x509.Certificate, error) {
common.go#L1634: UnverifiedCertificates []*x509.Certificate
conn.go#L56: peerCertificates []*x509.Certificate
conn.go#L62: verifiedChains [][]*x509.Certificate
handshake_client.go#L1073: certs := make([]*x509.Certificate, len(certificates))
handshake_server.go#L876: certs := make([]*x509.Certificate, len(certificates))
key_agreement.go#L34: processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
key_agreement.go#L35: generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
key_agreement.go#L77: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L81: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
key_agreement.go#L275: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L360: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
ticket.go#L89: peerCertificates []*x509.Certificate
ticket.go#L93: verifiedChains [][]*x509.Certificate
ticket.go#L173: func certificatesToBytesSlice(certs []*x509.Certificate) [][]byte {
ticket.go#L243: var chain []*x509.Certificate
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |