crypto/x509.Certificate.Subject (field)

20 uses

	crypto/x509 (current package)
		root_darwin.go#L63: 						fmt.Fprintf(os.Stderr, "crypto/x509: trust settings for %v: %v\n", cert.Subject, err)
		root_darwin.go#L68: 					fmt.Fprintf(os.Stderr, "crypto/x509: trust settings for %v: %d\n", cert.Subject, result)
		root_darwin.go#L100: 					fmt.Fprintf(os.Stderr, "crypto/x509: unknown trust setting for %v: %d\n", cert.Subject, result)
		verify.go#L112: 	if !c.hasSANExtension() && matchHostnames(c.Subject.CommonName, h.Host) {
		verify.go#L113: 		if !ignoreCN && !validHostnamePattern(c.Subject.CommonName) {
		verify.go#L115: 			return "x509: Common Name is not a valid hostname: " + c.Subject.CommonName
		verify.go#L117: 		if ignoreCN && validHostnamePattern(c.Subject.CommonName) {
		verify.go#L138: 			valid = c.Subject.CommonName
		verify.go#L164: 		certName := e.hintCert.Subject.CommonName
		verify.go#L166: 			if len(e.hintCert.Subject.Organization) > 0 {
		verify.go#L167: 				certName = e.hintCert.Subject.Organization[0]
		verify.go#L972: 	return !ignoreCN && !c.hasSANExtension() && validHostnamePattern(c.Subject.CommonName)
		verify.go#L1072: 		names = []string{c.Subject.CommonName}
		x509.go#L645: 	Subject             pkix.Name
		x509.go#L1329: 	out.Subject.FillFromRDNSequence(&subject)
		x509.go#L2008: 	return asn1.Marshal(cert.Subject.ToRDNSequence())
		x509.go#L2313: 		Issuer:              c.Subject.ToRDNSequence(),
		x509.go#L2814: 		Issuer:     issuer.Subject.ToRDNSequence(),

	crypto/tls
		common.go#L1267: 		if x509Cert.Subject.CommonName != "" && len(x509Cert.DNSNames) == 0 {
		common.go#L1268: 			c.NameToCertificate[x509Cert.Subject.CommonName] = cert