Home | History | Annotate | Download | only in runner

Lines Matching refs:Certificate

165 // Certificate types (for certificateRequestMsg)
167 CertTypeRSASign = 1 // A certificate containing an RSA key
168 CertTypeDSSSign = 2 // A certificate containing a DSA key
169 CertTypeRSAFixedDH = 3 // A certificate containing a static DH key
170 CertTypeDSSFixedDH = 4 // A certificate containing a static DH key
173 CertTypeECDSASign = 64 // A certificate containing an ECDSA-capable public key, signed with ECDSA.
174 CertTypeRSAFixedECDH = 65 // A certificate containing an ECDH-capable public key, signed with RSA.
175 CertTypeECDSAFixedECDH = 66 // A certificate containing an ECDH-capable public key, signed with ECDSA.
249 PeerCertificates []*x509.Certificate // certificate chain presented by remote peer
250 VerifiedChains [][]*x509.Certificate // verified chains built from PeerCertificates
254 SCTList []byte // signed certificate timestamp list
280 serverCertificates []*x509.Certificate // Certificate chain presented by the server
332 // Certificates contains one or more certificate chains
334 // Server configurations must include at least one certificate.
335 Certificates []Certificate
337 // NameToCertificate maps from a certificate name to an element of
338 // Certificates. Note that a certificate name can be of the form
343 NameToCertificate map[string]*Certificate
345 // RootCAs defines the set of root certificate authorities
362 // ClientCAs defines the set of root certificate authorities
363 // that servers use if required to verify a client certificate
367 // ClientCertificateTypes defines the set of allowed client certificate
372 // server's certificate chain and host name.
373 // If InsecureSkipVerify is true, TLS accepts any certificate
374 // presented by the server and any host name in that certificate.
537 // Certificate message is sent and no signature is added to
558 // SkipClientCertificate causes the client to skip the Certificate
938 // certificate list in the Certificate message.
1076 // supplied bytes in the extensions on the Certificate message.
1080 // supplied OCSP on intermediate certificates in the Certificate message.
1084 // supplied SCT on intermediate certificates in the Certificate message.
1088 // copy of the OCSP/SCT extensions in the Certificate message.
1355 // request signed certificate timestamps.
1379 // RenegotiationCertificate, if not nil, is the certificate to use on
1381 RenegotiationCertificate *Certificate
1534 // getCertificateForName returns the best certificate for the given name,
1537 func (c *Config) getCertificateForName(name string) *Certificate {
1563 // If nothing matches, return the first certificate.
1585 c.NameToCertificate = make(map[string]*Certificate)
1588 x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
1601 // A Certificate is a chain of one or more certificates, leaf first.
1602 type Certificate struct {
1603 Certificate [][]byte
1612 // Leaf is the parsed form of the leaf certificate, which may be
1615 // leaf certificate will be parsed as needed.
1616 Leaf *x509.Certificate