type crypto/x509.Certificate

88 uses

	crypto/x509 (current package)
		cert_pool.go#L51: 	getCert func() (*Certificate, error)
		cert_pool.go#L72: func (s *CertPool) cert(n int) (*Certificate, error) {
		cert_pool.go#L120: func (s *CertPool) findPotentialParents(cert *Certificate) []*Certificate {
		cert_pool.go#L131: 	var matchingKeyID, oneKeyID, mismatchKeyID []*Certificate
		cert_pool.go#L153: 	candidates := make([]*Certificate, 0, found)
		cert_pool.go#L160: func (s *CertPool) contains(cert *Certificate) bool {
		cert_pool.go#L168: func (s *CertPool) AddCert(cert *Certificate) {
		cert_pool.go#L172: 	s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
		cert_pool.go#L182: func (s *CertPool) addCertFunc(rawSum224 sum224, rawSubject string, getCert func() (*Certificate, error)) {
		cert_pool.go#L224: 			v *Certificate
		cert_pool.go#L226: 		s.addCertFunc(sha256.Sum224(cert.Raw), string(cert.RawSubject), func() (*Certificate, error) {
		root_darwin.go#L19: func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate, err error) {
		root_darwin.go#L24: 	var trustedRoots []*Certificate
		root_darwin.go#L116: func exportCertificate(cert macOS.CFRef) (*Certificate, error) {
		root_darwin.go#L128: func isRootCertificate(cert *Certificate) bool {
		verify.go#L73: 	Cert   *Certificate
		verify.go#L105: 	Certificate *Certificate
		verify.go#L152: 	Cert *Certificate
		verify.go#L158: 	hintCert *Certificate
		verify.go#L522: func (c *Certificate) checkNameConstraints(count *int,
		verify.go#L579: func (c *Certificate) isValid(certType int, currentChain []*Certificate, opts *VerifyOptions) error {
		verify.go#L615: 	var leaf *Certificate
		verify.go#L758: func (c *Certificate) Verify(opts VerifyOptions) (chains [][]*Certificate, err error) {
		verify.go#L798: 	var candidateChains [][]*Certificate
		verify.go#L800: 		candidateChains = append(candidateChains, []*Certificate{c})
		verify.go#L802: 		if candidateChains, err = c.buildChains(nil, []*Certificate{c}, nil, &opts); err != nil {
		verify.go#L832: func appendToFreshChain(chain []*Certificate, cert *Certificate) []*Certificate {
		verify.go#L833: 	n := make([]*Certificate, len(chain)+1)
		verify.go#L845: func (c *Certificate) buildChains(cache map[*Certificate][][]*Certificate, currentChain []*Certificate, sigChecks *int, opts *VerifyOptions) (chains [][]*Certificate, err error) {
		verify.go#L848: 		hintCert *Certificate
		verify.go#L851: 	considerCandidate := func(certType int, candidate *Certificate) {
		verify.go#L885: 				cache = make(map[*Certificate][][]*Certificate)
		verify.go#L971: func (c *Certificate) commonNameAsHostname() bool {
		verify.go#L1053: func (c *Certificate) VerifyHostname(h string) error {
		verify.go#L1098: func checkChainForKeyUsage(chain []*Certificate, keyUsages []ExtKeyUsage) bool {
		x509.go#L629: type Certificate struct {
		x509.go#L750: func (c *Certificate) Equal(other *Certificate) bool {
		x509.go#L757: func (c *Certificate) hasSANExtension() bool {
		x509.go#L763: func (c *Certificate) CheckSignatureFrom(parent *Certificate) error {
		x509.go#L789: func (c *Certificate) CheckSignature(algo SignatureAlgorithm, signed, signature []byte) error {
		x509.go#L793: func (c *Certificate) hasNameConstraints() bool {
		x509.go#L797: func (c *Certificate) getSANExtension() []byte {
		x509.go#L870: func (c *Certificate) CheckCRLSignature(crl *pkix.CertificateList) error {
		x509.go#L1133: func parseNameConstraintsExtension(out *Certificate, e pkix.Extension) (unhandled bool, err error) {
		x509.go#L1293: func parseCertificate(in *certificate) (*Certificate, error) {
		x509.go#L1294: 	out := new(Certificate)
		x509.go#L1547: func ParseCertificate(asn1Data []byte) (*Certificate, error) {
		x509.go#L1562: func ParseCertificates(asn1Data []byte) ([]*Certificate, error) {
		x509.go#L1575: 	ret := make([]*Certificate, len(v))
		x509.go#L1689: func buildCertExtensions(template *Certificate, subjectIsEmpty bool, authorityKeyId []byte, subjectKeyId []byte) (ret []pkix.Extension, err error) {
		x509.go#L2003: func subjectBytes(cert *Certificate) ([]byte, error) {
		x509.go#L2140: func CreateCertificate(rand io.Reader, template, parent *Certificate, pub, priv interface{}) (cert []byte, err error) {
		x509.go#L2292: func (c *Certificate) CreateCRL(rand io.Reader, priv interface{}, revokedCerts []pkix.RevokedCertificate, now, expiry time.Time) (crlBytes []byte, err error) {
		x509.go#L2770: func CreateRevocationList(rand io.Reader, template *RevocationList, issuer *Certificate, priv crypto.Signer) ([]byte, error) {

	crypto/tls
		cipher_suites.go#L126: 	processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
		cipher_suites.go#L127: 	generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
		common.go#L251: 	PeerCertificates []*x509.Certificate
		common.go#L260: 	VerifiedChains [][]*x509.Certificate
		common.go#L337: 	serverCertificates []*x509.Certificate   // Certificate chain presented by the server
		common.go#L338: 	verifiedChains     [][]*x509.Certificate // Certificate chains we built for verification
		common.go#L582: 	VerifyPeerCertificate func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
		common.go#L1322: 	Leaf *x509.Certificate
		common.go#L1327: func (c *Certificate) leaf() (*x509.Certificate, error) {
		conn.go#L50: 	peerCertificates []*x509.Certificate
		conn.go#L53: 	verifiedChains [][]*x509.Certificate
		handshake_client.go#L826: 	certs := make([]*x509.Certificate, len(certificates))
		handshake_server.go#L773: 	certs := make([]*x509.Certificate, len(certificates))
		key_agreement.go#L57: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L61: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		key_agreement.go#L247: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L328: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {

	github.com/jackc/pgconn
		config.go#L585: 		tlsConfig.VerifyPeerCertificate = func(certificates [][]byte, _ [][]*x509.Certificate) error {
		config.go#L586: 			certs := make([]*x509.Certificate, len(certificates))

	net/http/httptest
		server.go#L45: 	certificate *x509.Certificate
		server.go#L293: func (s *Server) Certificate() *x509.Certificate {