Home | History | Annotate | Download | only in tls

Lines Matching refs:Certificate

118 	// certificate, which would be skipped if session resumption occurred.
276 certs := make([]*x509.Certificate, len(certMsg.certificates))
281 return errors.New("tls: failed to parse certificate from server: " + err.Error())
319 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey)
325 // server's identity (i.e. leaf certificate) is unchanged and
375 var chainToSend *Certificate
400 // If the server requested a certificate then we have to send a
401 // Certificate message, even if it's empty because we don't have a
402 // certificate to send.
405 certMsg.certificates = chainToSend.Certificate
424 if chainToSend != nil && len(chainToSend.Certificate) > 0 {
432 return fmt.Errorf("tls: client certificate private key of type %T does not implement crypto.Signer", chainToSend.PrivateKey)
443 return fmt.Errorf("tls: failed to sign handshake with client certificate: unknown client certificate key type: %T", key)
669 // a TLS <= 1.1 connection, based on the supported certificate types.
681 func (hs *clientHandshakeState) getCertificate(certReq *certificateRequestMsg) (*Certificate, error) {
699 // included in the certificate request message. In this
701 // certificate types.
723 // distinguished names of acceptable certificate authorities.
729 // send any certificate of the appropriate
742 for j, cert := range chain.Certificate {
744 // parse the certificate if this isn't the leaf
750 return nil, errors.New("tls: failed to parse client certificate #" + strconv.Itoa(i) + ": " + err.Error())
775 // No acceptable certificate found. Don't send a certificate.
776 return new(Certificate), nil