type pkixPublicKey …
func ParsePKIXPublicKey(derBytes []byte) (pub any, err error) { … }
func marshalPublicKey(pub any) (publicKeyBytes []byte, publicKeyAlgorithm pkix.AlgorithmIdentifier, err error) { … }
func MarshalPKIXPublicKey(pub any) ([]byte, error) { … }
type certificate …
type tbsCertificate …
type dsaAlgorithmParameters …
type validity …
type publicKeyInfo …
type authKeyId …
type SignatureAlgorithm …
const UnknownSignatureAlgorithm …
const MD2WithRSA …
const MD5WithRSA …
const SHA1WithRSA …
const SHA256WithRSA …
const SHA384WithRSA …
const SHA512WithRSA …
const DSAWithSHA1 …
const DSAWithSHA256 …
const ECDSAWithSHA1 …
const ECDSAWithSHA256 …
const ECDSAWithSHA384 …
const ECDSAWithSHA512 …
const SHA256WithRSAPSS …
const SHA384WithRSAPSS …
const SHA512WithRSAPSS …
const PureEd25519 …
func (algo SignatureAlgorithm) isRSAPSS() bool { … }
func (algo SignatureAlgorithm) hashFunc() crypto.Hash { … }
func (algo SignatureAlgorithm) String() string { … }
type PublicKeyAlgorithm …
const UnknownPublicKeyAlgorithm …
const RSA …
const DSA …
const ECDSA …
const Ed25519 …
var publicKeyAlgoName …
func (algo PublicKeyAlgorithm) String() string { … }
var oidSignatureMD5WithRSA …
var oidSignatureSHA1WithRSA …
var oidSignatureSHA256WithRSA …
var oidSignatureSHA384WithRSA …
var oidSignatureSHA512WithRSA …
var oidSignatureRSAPSS …
var oidSignatureDSAWithSHA1 …
var oidSignatureDSAWithSHA256 …
var oidSignatureECDSAWithSHA1 …
var oidSignatureECDSAWithSHA256 …
var oidSignatureECDSAWithSHA384 …
var oidSignatureECDSAWithSHA512 …
var oidSignatureEd25519 …
var oidSHA256 …
var oidSHA384 …
var oidSHA512 …
var oidMGF1 …
var oidISOSignatureSHA1WithRSA …
var signatureAlgorithmDetails …
var emptyRawValue …
var pssParametersSHA256 …
var pssParametersSHA384 …
var pssParametersSHA512 …
type pssParameters …
func getSignatureAlgorithmFromAI(ai pkix.AlgorithmIdentifier) SignatureAlgorithm { … }
var oidPublicKeyRSA …
var oidPublicKeyDSA …
var oidPublicKeyECDSA …
var oidPublicKeyX25519 …
var oidPublicKeyEd25519 …
func getPublicKeyAlgorithmFromOID(oid asn1.ObjectIdentifier) PublicKeyAlgorithm { … }
var oidNamedCurveP224 …
var oidNamedCurveP256 …
var oidNamedCurveP384 …
var oidNamedCurveP521 …
func namedCurveFromOID(oid asn1.ObjectIdentifier) elliptic.Curve { … }
func oidFromNamedCurve(curve elliptic.Curve) (asn1.ObjectIdentifier, bool) { … }
func oidFromECDHCurve(curve ecdh.Curve) (asn1.ObjectIdentifier, bool) { … }
type KeyUsage …
const KeyUsageDigitalSignature …
const KeyUsageContentCommitment …
const KeyUsageKeyEncipherment …
const KeyUsageDataEncipherment …
const KeyUsageKeyAgreement …
const KeyUsageCertSign …
const KeyUsageCRLSign …
const KeyUsageEncipherOnly …
const KeyUsageDecipherOnly …
var oidExtKeyUsageAny …
var oidExtKeyUsageServerAuth …
var oidExtKeyUsageClientAuth …
var oidExtKeyUsageCodeSigning …
var oidExtKeyUsageEmailProtection …
var oidExtKeyUsageIPSECEndSystem …
var oidExtKeyUsageIPSECTunnel …
var oidExtKeyUsageIPSECUser …
var oidExtKeyUsageTimeStamping …
var oidExtKeyUsageOCSPSigning …
var oidExtKeyUsageMicrosoftServerGatedCrypto …
var oidExtKeyUsageNetscapeServerGatedCrypto …
var oidExtKeyUsageMicrosoftCommercialCodeSigning …
var oidExtKeyUsageMicrosoftKernelCodeSigning …
type ExtKeyUsage …
const ExtKeyUsageAny …
const ExtKeyUsageServerAuth …
const ExtKeyUsageClientAuth …
const ExtKeyUsageCodeSigning …
const ExtKeyUsageEmailProtection …
const ExtKeyUsageIPSECEndSystem …
const ExtKeyUsageIPSECTunnel …
const ExtKeyUsageIPSECUser …
const ExtKeyUsageTimeStamping …
const ExtKeyUsageOCSPSigning …
const ExtKeyUsageMicrosoftServerGatedCrypto …
const ExtKeyUsageNetscapeServerGatedCrypto …
const ExtKeyUsageMicrosoftCommercialCodeSigning …
const ExtKeyUsageMicrosoftKernelCodeSigning …
var extKeyUsageOIDs …
func extKeyUsageFromOID(oid asn1.ObjectIdentifier) (eku ExtKeyUsage, ok bool) { … }
func oidFromExtKeyUsage(eku ExtKeyUsage) (oid asn1.ObjectIdentifier, ok bool) { … }
type Certificate …
var ErrUnsupportedAlgorithm …
type InsecureAlgorithmError …
func (e InsecureAlgorithmError) Error() string { … }
type ConstraintViolationError …
func (ConstraintViolationError) Error() string { … }
func (c *Certificate) Equal(other *Certificate) bool { … }
func (c *Certificate) hasSANExtension() bool { … }
func (c *Certificate) CheckSignatureFrom(parent *Certificate) error { … }
func (c *Certificate) CheckSignature(algo SignatureAlgorithm, signed, signature []byte) error { … }
func (c *Certificate) hasNameConstraints() bool { … }
func (c *Certificate) getSANExtension() []byte { … }
func signaturePublicKeyAlgoMismatchError(expectedPubKeyAlgo PublicKeyAlgorithm, pubKey any) error { … }
var x509sha1 …
func checkSignature(algo SignatureAlgorithm, signed, signature []byte, publicKey crypto.PublicKey, allowSHA1 bool) (err error) { … }
func (c *Certificate) CheckCRLSignature(crl *pkix.CertificateList) error { … }
type UnhandledCriticalExtension …
func (h UnhandledCriticalExtension) Error() string { … }
type basicConstraints …
type policyInformation …
const nameTypeEmail …
const nameTypeDNS …
const nameTypeURI …
const nameTypeIP …
type authorityInfoAccess …
type distributionPoint …
type distributionPointName …
func reverseBitsInAByte(in byte) byte { … }
func asn1BitLength(bitString []byte) int { … }
var oidExtensionSubjectKeyId …
var oidExtensionKeyUsage …
var oidExtensionExtendedKeyUsage …
var oidExtensionAuthorityKeyId …
var oidExtensionBasicConstraints …
var oidExtensionSubjectAltName …
var oidExtensionCertificatePolicies …
var oidExtensionNameConstraints …
var oidExtensionCRLDistributionPoints …
var oidExtensionAuthorityInfoAccess …
var oidExtensionCRLNumber …
var oidExtensionReasonCode …
var oidAuthorityInfoAccessOcsp …
var oidAuthorityInfoAccessIssuers …
func oidInExtensions(oid asn1.ObjectIdentifier, extensions []pkix.Extension) bool { … }
func marshalSANs(dnsNames, emailAddresses []string, ipAddresses []net.IP, uris []*url.URL) (derBytes []byte, err error) { … }
func isIA5String(s string) error { … }
var x509usepolicies …
func buildCertExtensions(template *Certificate, subjectIsEmpty bool, authorityKeyId []byte, subjectKeyId []byte) (ret []pkix.Extension, err error) { … }
func marshalKeyUsage(ku KeyUsage) (pkix.Extension, error) { … }
func marshalExtKeyUsage(extUsages []ExtKeyUsage, unknownUsages []asn1.ObjectIdentifier) (pkix.Extension, error) { … }
func marshalBasicConstraints(isCA bool, maxPathLen int, maxPathLenZero bool) (pkix.Extension, error) { … }
func marshalCertificatePolicies(policies []OID, policyIdentifiers []asn1.ObjectIdentifier) (pkix.Extension, error) { … }
func buildCSRExtensions(template *CertificateRequest) ([]pkix.Extension, error) { … }
func subjectBytes(cert *Certificate) ([]byte, error) { … }
func signingParamsForKey(key crypto.Signer, sigAlgo SignatureAlgorithm) (SignatureAlgorithm, pkix.AlgorithmIdentifier, error) { … }
func signTBS(tbs []byte, key crypto.Signer, sigAlg SignatureAlgorithm, rand io.Reader) ([]byte, error) { … }
var emptyASN1Subject …
func CreateCertificate(rand io.Reader, template, parent *Certificate, pub, priv any) ([]byte, error) { … }
var pemCRLPrefix …
var pemType …
func ParseCRL(crlBytes []byte) (*pkix.CertificateList, error) { … }
func ParseDERCRL(derBytes []byte) (*pkix.CertificateList, error) { … }
func (c *Certificate) CreateCRL(rand io.Reader, priv any, revokedCerts []pkix.RevokedCertificate, now, expiry time.Time) (crlBytes []byte, err error) { … }
type CertificateRequest …
type tbsCertificateRequest …
type certificateRequest …
var oidExtensionRequest …
func newRawAttributes(attributes []pkix.AttributeTypeAndValueSET) ([]asn1.RawValue, error) { … }
func parseRawAttributes(rawAttributes []asn1.RawValue) []pkix.AttributeTypeAndValueSET { … }
func parseCSRExtensions(rawAttributes []asn1.RawValue) ([]pkix.Extension, error) { … }
func CreateCertificateRequest(rand io.Reader, template *CertificateRequest, priv any) (csr []byte, err error) { … }
func ParseCertificateRequest(asn1Data []byte) (*CertificateRequest, error) { … }
func parseCertificateRequest(in *certificateRequest) (*CertificateRequest, error) { … }
func (c *CertificateRequest) CheckSignature() error { … }
type RevocationListEntry …
type RevocationList …
type certificateList …
type tbsCertificateList …
func CreateRevocationList(rand io.Reader, template *RevocationList, issuer *Certificate, priv crypto.Signer) ([]byte, error) { … }
func (rl *RevocationList) CheckSignatureFrom(parent *Certificate) error { … }