Home | History | Annotate | Download | only in x509

Lines Matching full:certificate

224 	c := &Certificate{
237 c = &Certificate{
248 c = &Certificate{
363 template := Certificate{
427 t.Errorf("%s: failed to create certificate: %s", test.name, err)
433 t.Errorf("%s: failed to parse certificate: %s", test.name, err)
485 t.Errorf("%s: Issuing certificate URLs differ from template. Got %v, want %v", test.name, cert.IssuingCertificateURL, template.IssuingCertificateURL)
535 template := Certificate{
560 t.Fatalf("failed to create certificate: %s", err)
565 t.Fatalf("Certificate with unknown critical extension was not parsed: %s", err)
576 t.Fatal("Certificate with unknown critical extension was verified without error")
584 t.Errorf("Certificate failed to verify after unhandled critical extensions were cleared: %s", err)
589 // Self-signed certificate using ECDSA with SHA1 & secp256r1
591 -----BEGIN CERTIFICATE-----
604 -----END CERTIFICATE-----
607 // Self-signed certificate using ECDSA with SHA256 & secp256r1
609 -----BEGIN CERTIFICATE-----
622 -----END CERTIFICATE-----
625 // Self-signed certificate using ECDSA with SHA256 & secp384r1
627 -----BEGIN CERTIFICATE-----
641 -----END CERTIFICATE-----
644 // Self-signed certificate using ECDSA with SHA384 & secp521r1
646 -----BEGIN CERTIFICATE-----
661 -----END CERTIFICATE-----
679 t.Errorf("%d: failed to parse certificate: %s", i, err)
692 t.Errorf("%d: certificate verification failed: %s", i, err)
697 // Self-signed certificate using DSA with SHA1
698 var dsaCertPem = `-----BEGIN CERTIFICATE-----
721 -----END CERTIFICATE-----
736 t.Fatalf("Failed to parse certificate: %s", err)
757 t.Fatalf("Failed to parse certificate: %s", err)
768 t.Fatalf("Failed to parse certificate: %s", err)
772 t.Fatalf("DSA Certificate verification failed: %s", err)
776 var rsaPSSSelfSignedPEM = `-----BEGIN CERTIFICATE-----
810 -----END CERTIFICATE-----`
828 const pemCertificate = `-----BEGIN CERTIFICATE-----
846 -----END CERTIFICATE-----`
1012 t.Errorf("%s: failed to create certificate request: %s", test.name, err)
1018 t.Errorf("%s: failed to create certificate request: %s", test.name, err)
1024 t.Errorf("%s: failed to check certificate request signature: %s", test.name, err)
1199 // serialiseAndParse generates a self-signed certificate from template and
1201 func serialiseAndParse(t *testing.T, template *Certificate) *Certificate {
1204 t.Fatalf("failed to create certificate: %s", err)
1210 t.Fatalf("failed to parse certificate: %s", err)
1218 template := &Certificate{
1259 template := &Certificate{
1273 t.Fatalf("self-signed certificate contained default authority key id")
1278 t.Fatalf("self-signed certificate erased explicit authority key id")
1305 if _, err := new(Certificate).Verify(VerifyOptions{}); err != errNotParsed {
1306 t.Errorf("Verifying empty certificate resulted in unexpected error: %q (wanted %q)", err, errNotParsed)
1346 -----BEGIN CERTIFICATE-----
1358 -----END CERTIFICATE-----
1365 t.Fatalf("failed to parse certificate: %s", err)
1371 t.Fatalf("certificate verification succeeded incorrectly")
1374 t.Fatalf("certificate verification returned %v (%T), wanted InsecureAlgorithmError", err, err)
1381 -----BEGIN CERTIFICATE-----
1393 -----END CERTIFICATE-----`
1398 t.Error("unexpected success when parsing certificate with missing RSA NULL parameter")
1400 t.Errorf("unrecognised error when parsing certificate with missing RSA NULL parameter: %s", err)
1405 -----BEGIN CERTIFICATE-----
1417 -----END CERTIFICATE-----`
1422 t.Errorf("certificate with ISO OID failed to parse: %s", err)
1424 t.Errorf("ISO OID not recognised in certificate")
1429 // common name and serial number). This particular certificate was the first
1430 // such certificate in the ?Pilot? Certificate Transparency log.
1432 -----BEGIN CERTIFICATE-----
1462 -----END CERTIFICATE-----`
1468 t.Fatalf("certificate with two elements in an RDN failed to parse: %v", err)