Home | History | Annotate | Download | only in tls

Lines Matching refs:Certificate

34 	cert                  *Certificate
387 certMsg.certificates = hs.cert.Certificate
417 // Request a client certificate
429 // the client that it may send any certificate in response
432 // an appropriate certificate to give to us.
460 // If we requested a client certificate, then the client must send a
461 // certificate message, even if it's empty.
470 // The client didn't actually send a certificate
474 return errors.New("tls: client didn't provide a certificate")
508 // If we received a client cert in response to our certificate request message,
512 // to the client's certificate. This allows us to verify that the client is in
513 // possession of the private key of the certificate.
530 return errors.New("tls: unsupported hash function for client certificate")
547 err = errors.New("tls: bad signature type for client's ECDSA certificate")
567 err = errors.New("tls: bad signature type for client's RSA certificate")
709 // the public key of the leaf certificate.
714 certs := make([]*x509.Certificate, len(certificates))
719 return nil, errors.New("tls: failed to parse client certificate: " + err.Error())
738 return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
761 return nil, fmt.Errorf("tls: client's certificate contains an unsupported public key of type %T", certs[0].PublicKey)