type crypto/x509.CertificateInvalidError

16 uses

	crypto/x509 (current package)
		verify.go#L63: type CertificateInvalidError struct {
		verify.go#L69: func (e CertificateInvalidError) Error() string {
		verify.go#L513: 		return CertificateInvalidError{c, TooManyConstraints, ""}
		verify.go#L520: 			return CertificateInvalidError{c, CANotAuthorizedForThisName, err.Error()}
		verify.go#L524: 			return CertificateInvalidError{c, CANotAuthorizedForThisName, fmt.Sprintf("%s %q is excluded by constraint %q", nameType, name, constraint)}
		verify.go#L532: 		return CertificateInvalidError{c, TooManyConstraints, ""}
		verify.go#L541: 			return CertificateInvalidError{c, CANotAuthorizedForThisName, err.Error()}
		verify.go#L550: 		return CertificateInvalidError{c, CANotAuthorizedForThisName, fmt.Sprintf("%s %q is not permitted by any constraint", nameType, name)}
		verify.go#L566: 			return CertificateInvalidError{c, NameMismatch, ""}
		verify.go#L575: 		return CertificateInvalidError{
		verify.go#L581: 		return CertificateInvalidError{
		verify.go#L696: 		return CertificateInvalidError{c, NotAuthorizedToSign, ""}
		verify.go#L702: 			return CertificateInvalidError{c, TooManyIntermediates, ""}
		verify.go#L710: 		return CertificateInvalidError{c, IncompatibleUsage, ""}
		verify.go#L832: 		return nil, CertificateInvalidError{c, IncompatibleUsage, ""}

	crypto/tls
		handshake_server.go#L899: 			var errCertificateInvalid x509.CertificateInvalidError