pubkey_cert
verify_data(DER::binary()) -> {md5 | sha, binary(), binary()}
init_validation_state(OTPCertificate::#'OTPCertificate'{}, DefaultPathLen::integer(), Options::list()) -> #path_validation_state{}
prepare_for_next_cert(OTPCertificate::#'OTPCertificate'{}, Path_validation_state::#path_validation_state{}) -> #path_validation_state{}
validate_time(OTPCertificate::#'OTPCertificate'{}, UserState::term(), VerifyFun::function()) -> term()
validate_issuer(OTPCertificate::#'OTPCertificate'{}, Issuer::term(), UserState::term(), VerifyFun::function()) -> term()
validate_signature(OTPCertificate::#'OTPCertificate'{}, DER::binary(), Key::term(), KeyParams::term(), UserState::term(), VerifyFun::function()) -> term()
validate_names(OTPCertificate::#'OTPCertificate'{}, Permit::no_constraints | list(), Exclude::list(), Last::term(), UserState::term(), VerifyFun::function()) -> term()
validate_extensions(OTPCertificate::#'OTPCertificate'{}, Path_validation_state::#path_validation_state{}, UserState::term(), VerifyFun::function()) -> {#path_validation_state{}, UserState::term()}
normalize_general_name(X1::{rdnSequence, term()}) -> {rdnSequence, term()}
is_self_signed(OTPCertificate::#'OTPCertificate'{}) -> boolean()
is_issuer(Issuer::{rdnSequence, term()}, Candidate::{rdnSequence, term()}) -> boolean()
issuer_id(OTPCertificate::#'OTPCertificate'{}, X2::self | other) -> {ok, {integer(), term()}} | {error, issuer_not_found}
is_fixed_dh_cert(OTPCertificate::#'OTPCertificate'{}) -> boolean()
verify_fun(OTPCertificate::#'OTPCertificate'{}, Result::{bad_cert, atom()} | {extension, #'Extension'{}} | valid | valid_peer, UserState0::term(), VerifyFun::function()) -> term()
select_extension(Oid::tuple(), Extension::[#'Extension'{}]) -> #'Extension'{} | undefined
match_name(X1, Name, Rest) -> term()
extensions_list(Extensions) -> term()
time_str_2_gregorian_sec(X1) -> term()
cert_auth_key_id(AuthorityKeyIdentifier) -> term()