Cert Go Reference Documentation

Cert

Current Version: 9.5.0.79

Digital certificate component / class

Object Creation

cert := chilkat.NewCert()
...
cert.DisposeCert()

Properties

AuthorityKeyId
func (cert *Cert) AuthorityKeyId() string
Introduced in version 9.5.0.40

The authority key identifier of the certificate in base64 string format. This is only present if the certificate contains the extension OID 2.5.29.35.

top
CertVersion
func (cert *Cert) CertVersion() int

The version of the certificate (1, 2, or 3). A value of 0 indicates an error -- the most likely cause being that the certificate object is empty (i.e. was never loaded with a certificate). Note: This is not the version of the software, it is the version of the X.509 certificate object. The version of the Chilkat certificate software is indicated by the Version property.

top
DebugLogFilePath
func (cert *Cert) DebugLogFilePath() string
func (cert *Cert) SetDebugLogFilePath(s string)

If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.

This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:

  1. a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
  2. the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
  3. there is an internal problem (bug) in the Chilkat code that causes the hang.

top
Expired
func (cert *Cert) Expired() bool

Has a value of true if the certificate or any certificate in the chain of authority has expired. (This information is not available when running on Windows 95/98 computers.)

top
ForClientAuthentication
func (cert *Cert) ForClientAuthentication() bool

true if this certificate can be used for client authentication, otherwise false.

top
ForCodeSigning
func (cert *Cert) ForCodeSigning() bool

true if this certificate can be used for code signing, otherwise false.

top
ForSecureEmail
func (cert *Cert) ForSecureEmail() bool

true if this certificate can be used for sending secure email, otherwise false.

top
ForServerAuthentication
func (cert *Cert) ForServerAuthentication() bool

true if this certificate can be used for server authentication, otherwise false.

top
ForTimeStamping
func (cert *Cert) ForTimeStamping() bool

true if this certificate can be used for time stamping, otherwise false.

top
IntendedKeyUsage
func (cert *Cert) IntendedKeyUsage() uint

Bitflags indicating the intended usages of the certificate. The flags are:
Digital Signature: 0x80
Non-Repudiation: 0x40
Key Encipherment: 0x20
Data Encipherment: 0x10
Key Agreement: 0x08
Certificate Signing: 0x04
CRL Signing: 0x02
Encipher-Only: 0x01

top
IsRoot
func (cert *Cert) IsRoot() bool

true if this is the root certificate, otherwise false.

top
IssuerC
func (cert *Cert) IssuerC() string

The certificate issuer's country.

top
IssuerCN
func (cert *Cert) IssuerCN() string

The certificate issuer's common name.

top
IssuerDN
func (cert *Cert) IssuerDN() string

The issuer's full distinguished name.

top
IssuerE
func (cert *Cert) IssuerE() string

The certificate issuer's email address.

top
IssuerL
func (cert *Cert) IssuerL() string

The certificate issuer's locality, which could be a city, count, township, or other geographic region.

top
IssuerO
func (cert *Cert) IssuerO() string

The certificate issuer's organization, which is typically the company name.

top
IssuerOU
func (cert *Cert) IssuerOU() string

The certificate issuer's organizational unit, which is the unit within the organization.

top
IssuerS
func (cert *Cert) IssuerS() string

The certificate issuer's state or province.

top
LastErrorHtml
func (cert *Cert) LastErrorHtml() string

Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorText
func (cert *Cert) LastErrorText() string

Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorXml
func (cert *Cert) LastErrorXml() string

Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastMethodSuccess
func (cert *Cert) LastMethodSuccess() bool
func (cert *Cert) SetLastMethodSuccess(b bool)
Introduced in version 9.5.0.52

Indicate whether the last method call succeeded or failed. A value of true indicates success, a value of false indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:

  • Any method that returns a string.
  • Any method returning a Chilkat object, binary bytes, or a date/time.
  • Any method returning a standard boolean status value where success = true and failure = false.
  • Any method returning an integer where failure is defined by a return value less than zero.

Note: Methods that do not fit the above requirements will always set this property equal to true. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.

top
OcspUrl
func (cert *Cert) OcspUrl() string

If present in the certificate's extensions, returns the OCSP URL of the certificate. (The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.)

More Information and Examples
top
Revoked
func (cert *Cert) Revoked() bool

true if the certificate or any certificate in the chain of authority has been revoked. This information is not available when running on Windows 95/98 computers. Note: If this property is false, it could mean that it was not able to check the revocation status. Because of this uncertainty, a CheckRevoked method has been added. It returns an integer indicating one of three possible states: 1 (revoked) , 0 (not revoked), -1 (unable to check revocation status).

top
Rfc822Name
func (cert *Cert) Rfc822Name() string

The RFC-822 name of the certificate. (Also known as the Subject Alternative Name.)

If the certificate contains a list of Subject Alternative Names, such as a list of host names to be protected by a single SSL certificate, then this property will contain the comma separated list of names.

top
SelfSigned
func (cert *Cert) SelfSigned() bool

true if this is a self-signed certificate, otherwise false.

top
SerialDecimal
func (cert *Cert) SerialDecimal() string
Introduced in version 9.5.0.75

The certificate's serial number as a decimal string.

top
SerialNumber
func (cert *Cert) SerialNumber() string

The certificate's serial number as a hexidecimal string.

top
Sha1Thumbprint
func (cert *Cert) Sha1Thumbprint() string

Hexidecimal string of the SHA-1 thumbprint for the certificate. (This is the SHA1 hash of the binary DER representation of the entire X.509 certificate.)

top
SignatureVerified
func (cert *Cert) SignatureVerified() bool

Returns true if the certificate and all certificates in the chain of authority have valid signatures, otherwise returns false.

top
SubjectC
func (cert *Cert) SubjectC() string

The certificate subject's country.

top
SubjectCN
func (cert *Cert) SubjectCN() string

The certificate subject's common name.

top
SubjectDN
func (cert *Cert) SubjectDN() string

The certificate subject's full distinguished name.

top
SubjectE
func (cert *Cert) SubjectE() string

The certificate subject's email address.

top
SubjectKeyId
func (cert *Cert) SubjectKeyId() string
Introduced in version 9.5.0.40

The subject key identifier of the certificate in base64 string format. This is only present if the certificate contains the extension OID 2.5.29.14.

top
SubjectL
func (cert *Cert) SubjectL() string

The certificate subject's locality, which could be a city, count, township, or other geographic region.

top
SubjectO
func (cert *Cert) SubjectO() string

The certificate subject's organization, which is typically the company name.

top
SubjectOU
func (cert *Cert) SubjectOU() string

The certificate subject's organizational unit, which is the unit within the organization.

top
SubjectS
func (cert *Cert) SubjectS() string

The certificate subject's state or province.

top
TrustedRoot
func (cert *Cert) TrustedRoot() bool

Returns true if the certificate has a trusted root authority, otherwise returns false.

Note: As of version 9.5.0.41, the notion of what your application deems as trusted becomes more specific. The TrustedRoots class/object was added in v9.5.0.0. Prior to this, a certificate was considered to be anchored by a trusted root if the certificate chain could be established to a root (self-signed) certificate, AND if the root certificate was located somewhere in the Windows registry-based certificate stores. There are two problems with this: (1) it's a Windows-only solution. This property would always return false on non-Windows systems, and (2) it might be considered not a strong enough set of conditions for trusting a root certificate.

As of version 9.5.0.41, this property pays attention to the new TrustedRoots class/object, which allows for an application to specificallly indicate which root certificates are to be trusted. Certificates may be added to the TrustedRoots object via the LoadCaCertsPem or AddCert methods, and then activated by calling the TrustedRoots.Activate method. The activated trusted roots are deemed to be trusted in any Chilkat API method/property that needs to make this determination. In addition, the TrustedRoots object has a property named TrustSystemCaRoots, which defaults to true, which allows for backward compatibility. It will trust CA certificates stored in the Windows registry-based certificate stores, or if on Linux, will trust certificates found in /etc/ssl/certs/ca-certificates.crt.

top
ValidFromStr
func (cert *Cert) ValidFromStr() string

The date (in RFC822 string format) that this certificate becomes (or became) valid. It is a GMT/UTC date that is returned.

top
ValidToStr
func (cert *Cert) ValidToStr() string

The date (in RFC822 string format) that this certificate becomes (or became) invalid. It is a GMT/UTC date that is returned.

top
VerboseLogging
func (cert *Cert) VerboseLogging() bool
func (cert *Cert) SetVerboseLogging(b bool)

If set to true, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is false. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
Version
func (cert *Cert) Version() string

Version of the component/library, such as "9.5.0.63"

top

Methods

CheckRevoked
func (cert *Cert) CheckRevoked() int

Returns 1 if the certificate has been revoked, 0 if not revoked, and -1 if unable to check the revocation status.

Note: This method is only implemented on Windows systems. It uses the underlying Microsoft CertVerifyRevocation Platform SDK function to check the revocation status of a certificate. (Search "CertVerifyRevocation" to get information about it.)

Non-Windows (and Windows) applications can send an OCSP request as shown in the example below.

More Information and Examples
top
CheckSmartCardPin
func (cert *Cert) CheckSmartCardPin() int
Introduced in version 9.5.0.77

Verifies that the SmartCardPin property setting is correct. Returns 1 if correct, 0 if incorrect, and -1 if unable to check because the underlying CSP does not support the functionality.

More Information and Examples
top
ExportCertDer
func (cert *Cert) ExportCertDer() []byte

Exports the digital certificate to ASN.1 DER format.

Returns nil on failure

top
ExportCertDerBd
func (cert *Cert) ExportCertDerBd(cerData *BinData) bool
Introduced in version 9.5.0.70

Exports the digital certificate in ASN.1 DER format to a BinData object.

Returns true for success, false for failure.

top
ExportCertDerFile
func (cert *Cert) ExportCertDerFile(path string) bool

Exports the digital certificate to ASN.1 DER format binary file.

Returns true for success, false for failure.

top
ExportCertPem
func (cert *Cert) ExportCertPem() *string

Exports the digital certificate to an unencrypted PEM formatted string.

Returns nil on failure

More Information and Examples
top
ExportCertPemFile
func (cert *Cert) ExportCertPemFile(path string) bool

Exports the digital certificate to an unencrypted PEM formatted file.

Returns true for success, false for failure.

More Information and Examples
top
ExportCertXml
func (cert *Cert) ExportCertXml() *string

Exports a certificate to an XML format where the XML tags are the names of the ASN.1 objects that compose the X.509 certificate. Binary data is either hex or base64 encoded. (The binary data for a "bits" ASN.1 tag is hex encoded, whereas for all other ASN.1 tags, such as "octets", it is base64.)

Returns nil on failure

top
ExportPrivateKey
func (cert *Cert) ExportPrivateKey() *PrivateKey

Exports the certificate's private key.

Returns nil on failure

top
ExportPublicKey
func (cert *Cert) ExportPublicKey() *PublicKey

Exports the certificate's public key.

Returns nil on failure

More Information and Examples
top
ExportToPfxBd
func (cert *Cert) ExportToPfxBd(password string, includeCertChain bool, pfxData *BinData) bool
Introduced in version 9.5.0.70

Exports the certificate and private key (if available) to pfxData. The password is what will be required to access the PFX contents at a later time. If includeCertChain is true, then the certificates in the chain of authority are also included in the PFX.

Returns true for success, false for failure.

top
ExportToPfxData
func (cert *Cert) ExportToPfxData(password string, includeCertChain bool) []byte
Introduced in version 9.5.0.31

Exports the certificate and private key (if available) to an in-memory PFX image. The password is what will be required to access the PFX contents at a later time. If includeCertChain is true, then the certificates in the chain of authority are also included in the PFX.

Returns nil on failure

top
ExportToPfxFile
func (cert *Cert) ExportToPfxFile(pfxFilename string, pfxPassword string, bIncludeCertChain bool) bool

Exports the certificate and private key (if available) to a PFX (.pfx or .p12) file. The output PFX is secured using the pfxPassword. If bIncludeCertChain is true, then the certificates in the chain of authority are also included in the PFX output file.

Returns true for success, false for failure.

More Information and Examples
top
FindIssuer
func (cert *Cert) FindIssuer() *Cert

Finds and returns the issuer certificate. If the certificate is a root or self-issued, then the certificate returned is a copy of the caller certificate. (The IsRoot property can be check to see if the certificate is a root (or self-issued) certificate.)

Returns nil on failure

More Information and Examples
top
GetCertChain
func (cert *Cert) GetCertChain() *CertChain
Introduced in version 9.5.0.40

Returns a certficate chain object containing all the certificates (including this one), in the chain of authentication to the trusted root (if possible). If this certificate object was loaded from a PFX, then the certiicates contained in the PFX are automatically available for building the certificate chain. The UseCertVault method can be called to provide additional certificates that might be required to build the cert chain. Finally, the TrustedRoots object can be used to provide a way of making trusted root certificates available.

Note: Prior to v9.5.0.50, this method would fail if the certificate chain could not be completed to the root. Starting in v9.5.0.50, the incomplete certificate chain will be returned. The certificate chain's ReachesRoot property can be examined to see if the chain was completed to the root.

On Windows systems, the registry-based certificate stores are automatically consulted if needed to locate intermediate or root certificates in the chain. Chilkat searches certificate stores in the following order. See System Store Locations for more information.

  1. Current-User "CA" Certificate Store
  2. Local-Machine "CA" Certificate Store
  3. Current-User "Root" Certificate Store
  4. Local-Machine "Root" Certificate Store
  5. Current-User "MY" Certificate Store
  6. Local-Machine "MY" Certificate Store
  7. Current-User "ADDRESSBOOK" Certificate Store (if it exists)
  8. Local-Machine "ADDRESSBOOK" Certificate Store (if it exists)

Returns nil on failure

top
GetEncoded
func (cert *Cert) GetEncoded() *string

Returns a base64 encoded string representation of the certificate's binary DER format, which can be passed to SetFromEncoded to recreate the certificate object.

Returns nil on failure

top
GetExtensionAsXml
func (cert *Cert) GetExtensionAsXml(oid string) *string
Introduced in version 9.5.0.49

Returns the certificate extension data in XML format (converted from ASN.1). The oid is an OID, such as the ones listed here: http://www.alvestrand.no/objectid/2.5.29.html

Note: In many cases, the data within the XML is returned base64 encoded. An application may need to take one further step to base64 decode the information contained within the XML.

Returns nil on failure

More Information and Examples
top
GetPrivateKeyPem
func (cert *Cert) GetPrivateKeyPem() *string

Exports the certificate's private key to a PEM string (if the private key is available).

Returns nil on failure

top
GetSpkiFingerprint
func (cert *Cert) GetSpkiFingerprint(hashAlg string, encoding string) *string
Introduced in version 9.5.0.55

Returns the SPKI Fingerprint suitable for use in pinning. (See RFC 7469.) An SPKI Fingerprint is defined as the output of a known cryptographic hash algorithm whose input is the DER-encoded ASN.1 representation of the Subject Public Key Info (SPKI) of an X.509 certificate. The hashAlg specifies the hash algorithm and may be "sha256", "sha384", "sha512", "sha1", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The encoding specifies the encoding, and may be "base64", "hex", or any of the encoding modes specified in the article at the link below.

Returns nil on failure

More Information and Examples
top
GetValidFromDt
func (cert *Cert) GetValidFromDt() *CkDateTime

Returns the date/time this certificate becomes (or became) valid.

Returns nil on failure

More Information and Examples
top
GetValidToDt
func (cert *Cert) GetValidToDt() *CkDateTime

Returns the date/time this certificate becomes (or became) invalid.

Returns nil on failure

More Information and Examples
top
HashOf
func (cert *Cert) HashOf(part string, hashAlg string, encoding string) *string
Introduced in version 9.5.0.75

Returns an encoded hash of a particular part of the certificate. The part may be one of the following:

  • IssuerDN
  • IssuerPublicKey
  • SubjectDN
  • SubjectPublicKey

The hashAlg is the name of the hash algorithm, such as "sha1", "sha256", "sha384", "sha512", "md5", etc. The encoding is the format to return, such as "hex", "base64", etc.

Returns nil on failure

top
HasPrivateKey
func (cert *Cert) HasPrivateKey() bool

Returns true if the private key is installed on the local system for the certificate.

top
LoadByCommonName
func (cert *Cert) LoadByCommonName(cn string) bool

(Relevant only when running on a Microsoft Windows operating system.) Searches the Windows Local Machine and Current User registry-based certificate stores for a certificate having the common name specified. If found, the certificate is loaded and ready for use.

Returns true for success, false for failure.

top
LoadByEmailAddress
func (cert *Cert) LoadByEmailAddress(emailAddress string) bool

(Relevant only when running on a Microsoft Windows operating system.) Searches the Windows Local Machine and Current User registry-based certificate stores for a certificate containing the email address specified. If found, the certificate is loaded and ready for use.

Returns true for success, false for failure.

More Information and Examples
top
LoadByIssuerAndSerialNumber
func (cert *Cert) LoadByIssuerAndSerialNumber(issuerCN string, serialNumber string) bool

(Relevant only when running on a Microsoft Windows operating system.) Searches the Windows Local Machine and Current User registry-based certificate stores for a certificate matching the issuerCN and having an issuer matching the serialNumber. If found, the certificate is loaded and ready for use.

Returns true for success, false for failure.

top
LoadFromBase64
func (cert *Cert) LoadFromBase64(encodedCert string) bool

Loads an ASN.1 or DER encoded certificate represented in a Base64 string.

Returns true for success, false for failure.

top
LoadFromBd
func (cert *Cert) LoadFromBd(certBytes *BinData) bool
Introduced in version 9.5.0.70

Loads an X.509 certificate from the ASN.1 DER encoded bytes contained in certBytes.

Returns true for success, false for failure.

More Information and Examples
top
LoadFromBinary
func (cert *Cert) LoadFromBinary(data []byte) bool

Loads an X.509 certificate from ASN.1 DER encoded bytes.

Returns true for success, false for failure.

top
LoadFromFile
func (cert *Cert) LoadFromFile(path string) bool

Loads a certificate from a .cer, .crt, .p7b, or .pem file. This method accepts certificates from files in any of the following formats:
1. DER encoded binary X.509 (.CER)
2. Base-64 encoded X.509 (.CER)
3. Cryptographic Message Syntax Standard - PKCS #7 Certificates (.P7B)
4. PEM format
This method decodes the certificate based on the contents if finds within the file, and not based on the file extension. If your certificate is in a file having a different extension, try loading it using this method before assuming it won't work. This method does not load .p12 or .pfx (PKCS #12) files.

Returns true for success, false for failure.

top
LoadFromSmartcard
func (cert *Cert) LoadFromSmartcard(csp string) bool
Introduced in version 9.5.0.77

Loads the X.509 certificate from the smartcard currently in the reader, or from a USB token.

The csp can be set to the name of the CSP (Cryptographic Service Provider) that should be used. If csp is an empty string, then the 1st CSP found matching one of the following names will be used:

  • Microsoft Base Smart Card Crypto Provider
  • Bit4id Universal Middleware Provider
  • eToken Base Cryptographic Provider
  • FTSafe ePass1000 RSA Cryptographic Service Provider
  • SecureStoreCSP
  • EnterSafe ePass2003 CSP v2.0
  • Gemalto Classic Card CSP
  • PROXKey CSP India V1.0
  • PROXKey CSP India V2.0
  • TRUST KEY CSP V1.0
  • Watchdata Brazil CSP V1.0
  • Luna Cryptographic Services for Microsoft Windows
  • Luna SChannel Cryptographic Services for Microsoft Windows
  • Safenet RSA Full Cryptographic Provider
  • nCipher Enhanced Cryptographic Provider
  • SafeSign Standard Cryptographic Service Provider
  • SafeSign Standard RSA and AES Cryptographic Service Provider
  • MySmartLogon NFC CSP
  • NFC Connector Enterprise
  • ActivClient Cryptographic Service Provider
  • EnterSafe ePass2003 CSP v1.0
  • Oberthur Card Systems Cryptographic Provider
  • Athena ASECard Crypto CSP"

Returns true for success, false for failure.

top
LoadPem
func (cert *Cert) LoadPem(strPem string) bool
Introduced in version 9.5.0.49

Loads the certificate from a PEM string.

Returns true for success, false for failure.

top
LoadPfxBd
func (cert *Cert) LoadPfxBd(pfxData *BinData, password string) bool
Introduced in version 9.5.0.70

Loads the certificate from the PFX contained in pfxData. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns true for success, false for failure.

top
LoadPfxData
func (cert *Cert) LoadPfxData(pfxData []byte, password string) bool

Loads a PFX from an in-memory image of a PFX file. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns true for success, false for failure.

top
LoadPfxFile
func (cert *Cert) LoadPfxFile(pfxPath string, password string) bool

Loads a PFX file. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns true for success, false for failure.

top
LoadTaskResult
func (cert *Cert) LoadTaskResult(task *Task) bool
Introduced in version 9.5.0.52

Loads the certificate from a completed asynchronous task.

Returns true for success, false for failure.

top
PemFileToDerFile
func (cert *Cert) PemFileToDerFile(fromPath string, toPath string) bool

Converts a PEM file to a DER file.

Returns true for success, false for failure.

top
SaveLastError
func (cert *Cert) SaveLastError(path string) bool

Saves the last-error information (the contents of LastErrorXml) to an XML formatted file.

Returns true for success, false for failure.

top
SaveToFile
func (cert *Cert) SaveToFile(path string) bool

Saves a certificate object to a .cer file.

Returns true for success, false for failure.

top
SetFromEncoded
func (cert *Cert) SetFromEncoded(encodedCert string) bool

Initializes the certificate object from a base64 encoded string representation of the certificate's binary DER format.

Returns true for success, false for failure.

top
SetPrivateKey
func (cert *Cert) SetPrivateKey(privKey *PrivateKey) bool

Used to associate a private key with the certificate for subsequent (PKCS7) signature creation or decryption.

Returns true for success, false for failure.

top
SetPrivateKeyPem
func (cert *Cert) SetPrivateKeyPem(privKeyPem string) bool

Same as SetPrivateKey, but the key is provided in unencrypted PEM format. (Note: The privKeyPem is not a file path, it is the actual PEM text.)

Returns true for success, false for failure.

top
UseCertVault
func (cert *Cert) UseCertVault(vault *XmlCertVault) bool
Introduced in version 9.5.0.40

Adds an XML certificate vault to the object's internal list of sources to be searched for certificates for help in building certificate chains and verifying the certificate signature to the trusted root.

Returns true for success, false for failure.

top
VerifySignature
func (cert *Cert) VerifySignature() bool
Introduced in version 9.5.0.40

Verifies the certificate signature, as well as the signatures of all certificates in the chain of authentication to the trusted root. Returns true if all signatures are verified to the trusted root. Otherwise returns false.

top
X509PKIPathv1
func (cert *Cert) X509PKIPathv1() *string
Introduced in version 9.5.0.77

Returns the base64 representation of an X509PKIPathv1 containing just the calling certificate. This is typically used in an X.509 Binary Security Token. It is a PKIPath that contains an ordered list of X.509 public certificates packaged in a PKIPath. The X509PKIPathv1 token type may be used to represent a certificate path. (This is sometimes used in XAdES signatures.)

Returns nil on failure

top