Home | History | Annotate | Download | only in tls

Lines Matching refs:Certificate

34 	cert            *Certificate
360 certMsg.certificates = hs.cert.Certificate
384 // Request a client certificate
396 // the client that it may send any certificate in response
399 // an appropriate certificate to give to us.
419 // If we requested a client certificate, then the client must send a
420 // certificate message, even if it's empty.
429 // The client didn't actually send a certificate
433 return errors.New("tls: client didn't provide a certificate")
463 // If we received a client cert in response to our certificate request message,
467 // to the client's certificate. This allows us to verify that the client is in
468 // possession of the private key of the certificate.
485 return errors.New("tls: unsupported hash function for client certificate")
502 err = errors.New("bad signature type for client's ECDSA certificate")
522 err = errors.New("bad signature type for client's RSA certificate")
658 // the public key of the leaf certificate.
663 certs := make([]*x509.Certificate, len(certificates))
668 return nil, errors.New("tls: failed to parse client certificate: " + err.Error())
687 return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
700 return nil, fmt.Errorf("tls: client's certificate contains an unsupported public key of type %T", certs[0].PublicKey)