go/src/crypto/x509/x509_test.go

func TestParsePKCS1PrivateKey(t *testing.T) {}

func TestPKCS1MismatchPublicKeyFormat(t *testing.T) {}

func TestMarshalInvalidPublicKey(t *testing.T) {}

func testParsePKIXPublicKey(t *testing.T, pemBytes string) (pub any) {}

func TestParsePKIXPublicKey(t *testing.T) {}

var pemPublicKey

var pemPrivateKey

var pemEd25519Key

var pemX25519Key

func TestPKIXMismatchPublicKeyFormat(t *testing.T) {}

var testPrivateKey

func init() {}

func bigFromString(s string) *big.Int {}

func fromBase10(base10 string) *big.Int {}

func bigFromHexString(s string) *big.Int {}

var rsaPrivateKey

func TestMarshalRSAPrivateKey(t *testing.T) {}

func TestMarshalRSAPublicKey(t *testing.T) {}

type matchHostnamesTest

var matchHostnamesTests

func TestMatchHostnames(t *testing.T) {}

func TestMatchIP(t *testing.T) {}

func TestCertificateParse(t *testing.T) {}

func TestCertificateEqualOnNil(t *testing.T) {}

func TestMismatchedSignatureAlgorithm(t *testing.T) {}

var certBytes

func parseCIDR(s string) *net.IPNet {}

func parseURI(s string) *url.URL {}

func TestCreateSelfSignedCertificate(t *testing.T) {}

var ecdsaSHA1CertPem

var ecdsaSHA256p256CertPem

var ecdsaSHA256p384CertPem

var ecdsaSHA384p521CertPem

var ecdsaTests

func TestECDSA(t *testing.T) {}

var dsaCertPem

func TestParseCertificateWithDsaPublicKey(t *testing.T) {}

func TestParseCertificateWithDSASignatureAlgorithm(t *testing.T) {}

func TestVerifyCertificateWithDSASignature(t *testing.T) {}

var rsaPSSSelfSignedPEM

var rsaPSSSelfSignedOpenSSL110PEM

func TestRSAPSSSelfSigned(t *testing.T) {}

const ed25519Certificate

func TestEd25519SelfSigned(t *testing.T) {}

const pemCertificate

const ed25519CRLCertificate

var ed25519CRLKey

func TestCRLCreation(t *testing.T) {}

func fromBase64(in string) []byte {}

func TestParseDERCRL(t *testing.T) {}

func TestCRLWithoutExpiry(t *testing.T) {}

func TestParsePEMCRL(t *testing.T) {}

func TestImports(t *testing.T) {}

const derCRLBase64

const pemCRLBase64

func TestCreateCertificateRequest(t *testing.T) {}

func marshalAndParseCSR(t *testing.T, template *CertificateRequest) *CertificateRequest {}

func TestCertificateRequestOverrides(t *testing.T) {}

func TestParseCertificateRequest(t *testing.T) {}

func TestCriticalFlagInCSRRequestedExtensions(t *testing.T) {}

// serialiseAndParse generates a self-signed certificate from template and
// returns a parsed version of it.
func serialiseAndParse(t *testing.T, template *Certificate) *Certificate {}

func TestMaxPathLenNotCA(t *testing.T) {}

func TestMaxPathLen(t *testing.T) {}

func TestNoAuthorityKeyIdInSelfSignedCert(t *testing.T) {}

func TestNoSubjectKeyIdInCert(t *testing.T) {}

func TestASN1BitLength(t *testing.T) {}

func TestVerifyEmptyCertificate(t *testing.T) {}

func TestInsecureAlgorithmErrorString(t *testing.T) {}

var csrBase64Array

var md5cert

func TestMD5(t *testing.T) {}

func TestSHA1(t *testing.T) {}

const certMissingRSANULL

func TestRSAMissingNULLParameters(t *testing.T) {}

const certISOOID

func TestISOOIDInCertificate(t *testing.T) {}

const certMultipleRDN

func TestMultipleRDN(t *testing.T) {}

func TestSystemCertPool(t *testing.T) {}

const emptyNameConstraintsPEM

func TestEmptyNameConstraints(t *testing.T) {}

func TestPKIXNameString(t *testing.T) {}

func TestRDNSequenceString(t *testing.T) {}

const criticalNameConstraintWithUnknownTypePEM

func TestCriticalNameConstraintWithUnknownType(t *testing.T) {}

const badIPMaskPEM

func TestBadIPMask(t *testing.T) {}

const additionalGeneralSubtreePEM

func TestAdditionFieldsInGeneralSubtree(t *testing.T) {}

func TestEmptySubject(t *testing.T) {}

const multipleURLsInCRLDPPEM

func TestMultipleURLsInCRLDP(t *testing.T) {}

const hexPKCS1TestPKCS8Key

const hexPKCS1TestECKey

var pkcs1MismatchKeyTests

func TestPKCS1MismatchKeyFormat(t *testing.T) {}

func TestCreateRevocationList(t *testing.T) {}

func TestRSAPSAParameters(t *testing.T) {}

func TestUnknownExtKey(t *testing.T) {}

func TestIA5SANEnforcement(t *testing.T) {}

func BenchmarkCreateCertificate(b *testing.B) {}

type brokenSigner

func (bs *brokenSigner) Public() crypto.PublicKey {}

func (bs *brokenSigner) Sign(_ io.Reader, _ []byte, _ crypto.SignerOpts) ([]byte, error) {}

func TestCreateCertificateBrokenSigner(t *testing.T) {}

func TestCreateCertificateLegacy(t *testing.T) {}

func (s *CertPool) mustCert(t *testing.T, n int) *Certificate {}

func allCerts(t *testing.T, p *CertPool) []*Certificate {}

// certPoolEqual reports whether a and b are equal, except for the
// function pointers.
func certPoolEqual(a, b *CertPool) bool {}

func TestCertificateRequestRoundtripFields(t *testing.T) {}

func BenchmarkParseCertificate(b *testing.B) {}

func TestParseCertificateRawEquals(t *testing.T) {}

const mismatchingSigAlgIDPEM

const mismatchingSigAlgParamPEM

func TestSigAlgMismatch(t *testing.T) {}

const optionalAuthKeyIDPEM

func TestAuthKeyIdOptional(t *testing.T) {}

const largeOIDPEM

func TestLargeOID(t *testing.T) {}

const uniqueIDPEM

func TestParseUniqueID(t *testing.T) {}

func TestDisableSHA1ForCertOnly(t *testing.T) {}

func TestParseRevocationList(t *testing.T) {}

func TestRevocationListCheckSignatureFrom(t *testing.T) {}

func TestOmitEmptyExtensions(t *testing.T) {}

var negativeSerialCert

func TestParseNegativeSerial(t *testing.T) {}

func TestCreateNegativeSerial(t *testing.T) {}

const dupExtCert

func TestDuplicateExtensionsCert(t *testing.T) {}

const dupExtCSR

func TestDuplicateExtensionsCSR(t *testing.T) {}

const dupAttCSR

func TestDuplicateAttributesCSR(t *testing.T) {}

func TestCertificateOIDPolicies(t *testing.T) {}

func TestCertificatePoliciesGODEBUG(t *testing.T) {}

func TestGob(t *testing.T) {}

func TestRejectCriticalAKI(t *testing.T) {}

func TestRejectCriticalAIA(t *testing.T) {}

func TestRejectCriticalSKI(t *testing.T) {}