crypto/x509.Certificate.Subject (field)
20 uses
crypto/x509 (current package)
root_darwin.go#L63: fmt.Fprintf(os.Stderr, "crypto/x509: trust settings for %v: %v\n", cert.Subject, err)
root_darwin.go#L68: fmt.Fprintf(os.Stderr, "crypto/x509: trust settings for %v: %d\n", cert.Subject, result)
root_darwin.go#L100: fmt.Fprintf(os.Stderr, "crypto/x509: unknown trust setting for %v: %d\n", cert.Subject, result)
verify.go#L112: if !c.hasSANExtension() && matchHostnames(c.Subject.CommonName, h.Host) {
verify.go#L113: if !ignoreCN && !validHostnamePattern(c.Subject.CommonName) {
verify.go#L115: return "x509: Common Name is not a valid hostname: " + c.Subject.CommonName
verify.go#L117: if ignoreCN && validHostnamePattern(c.Subject.CommonName) {
verify.go#L138: valid = c.Subject.CommonName
verify.go#L164: certName := e.hintCert.Subject.CommonName
verify.go#L166: if len(e.hintCert.Subject.Organization) > 0 {
verify.go#L167: certName = e.hintCert.Subject.Organization[0]
verify.go#L972: return !ignoreCN && !c.hasSANExtension() && validHostnamePattern(c.Subject.CommonName)
verify.go#L1072: names = []string{c.Subject.CommonName}
x509.go#L645: Subject pkix.Name
x509.go#L1329: out.Subject.FillFromRDNSequence(&subject)
x509.go#L2008: return asn1.Marshal(cert.Subject.ToRDNSequence())
x509.go#L2313: Issuer: c.Subject.ToRDNSequence(),
x509.go#L2814: Issuer: issuer.Subject.ToRDNSequence(),
crypto/tls
common.go#L1267: if x509Cert.Subject.CommonName != "" && len(x509Cert.DNSNames) == 0 {
common.go#L1268: c.NameToCertificate[x509Cert.Subject.CommonName] = cert
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |