Searched refs:BadDer (Results 1 – 8 of 8) sorted by relevance
/external/rust/crates/webpki/src/ |
D | der.rs | 26 ring::io::der::expect_tag_and_get_value(input, tag).map_err(|_| Error::BadDer) in expect_tag_and_get_value() 42 return Err(Error::BadDer); in expect_tag() 52 ring::io::der::read_tag_and_get_value(input).map_err(|_| Error::BadDer) in read_tag_and_get_value() 81 nested(input, Tag::BitString, Error::BadDer, |value| { in bit_string_with_no_unused_bits() 82 let unused_bits_at_end = value.read_byte().map_err(|_| Error::BadDer)?; in bit_string_with_no_unused_bits() 84 return Err(Error::BadDer); in bit_string_with_no_unused_bits() 96 nested(input, Tag::Boolean, Error::BadDer, |input| { in optional_boolean() 100 _ => Err(Error::BadDer), in optional_boolean() 106 ring::io::der::positive_integer(input).map_err(|_| Error::BadDer) in positive_integer() 110 ring::io::der::small_nonnegative_integer(input).map_err(|_| Error::BadDer) in small_nonnegative_integer() [all …]
|
D | cert.rs | 52 let (tbs, signed_data) = cert_der.read_all(Error::BadDer, |cert_der| { in parse_cert_internal() 56 Error::BadDer, in parse_cert_internal() 61 tbs.read_all(Error::BadDer, |tbs| { in parse_cert_internal() 113 Error::BadDer, in parse_cert_internal() 157 return Err(Error::BadDer); in certificate_serial_number() 218 let sequence_value = value.read_all(Error::BadDer, |value| { in remember_extension()
|
D | trust_anchor.rs | 60 Err(Error::UnsupportedCertVersion) => parse_cert_v1(cert_der).or(Err(Error::BadDer)), in try_from_cert_der() 89 cert_der.read_all(Error::BadDer, |cert_der| { in parse_cert_v1() 90 der::nested(cert_der, der::Tag::Sequence, Error::BadDer, |cert_der| { in parse_cert_v1() 91 let anchor = der::nested(cert_der, der::Tag::Sequence, Error::BadDer, |tbs| { in parse_cert_v1()
|
D | signed_data.rs | 178 input.read_all(Error::BadDer, |input| { in parse_spki_value() 405 .read_all(Error::BadDer, |input| { in test_verify_signed_data() 418 .read_all(Error::BadDer, |input| { in test_verify_signed_data() 425 .read_all(Error::BadDer, |input| { in test_verify_signed_data() 464 signature.read_all(Error::BadDer, |input| { in test_verify_signed_data_signature_outer() 485 spki.read_all(Error::BadDer, |input| { in test_parse_spki_bad_outer() 521 Error::BadDer 574 Error::BadDer 579 Error::BadDer 613 Error::BadDer
|
D | verify_cert.rs | 64 untrusted::read_all_optional(name_constraints, Error::BadDer, |value| { in build_chain() 110 untrusted::read_all_optional(potential_issuer.name_constraints, Error::BadDer, |value| { in build_chain() 173 .read_all(Error::BadDer, |value| check_validity(value, time))?; in check_issuer_independent_properties() 174 untrusted::read_all_optional(cert.basic_constraints, Error::BadDer, |value| { in check_issuer_independent_properties() 177 untrusted::read_all_optional(cert.eku, Error::BadDer, |value| { in check_issuer_independent_properties()
|
D | error.rs | 21 BadDer, enumerator
|
/external/rust/crates/webpki/src/name/ |
D | ip_address.rs | 31 return Err(Error::BadDer); in presented_id_matches_constraint() 34 return Err(Error::BadDer); in presented_id_matches_constraint() 42 let (constraint_address, constraint_mask) = constraint.read_all(Error::BadDer, |value| { in presented_id_matches_constraint()
|
D | verify.rs | 43 return NameIteration::Stop(Err(Error::BadDer)); in verify_cert_dns_name() 73 let subtrees = der::nested(inner, subtrees_tag, Error::BadDer, |tagged| { in check_name_constraints() 155 general_subtree.read_all(Error::BadDer, |subtree| general_name(subtree)) in check_presented_id_conforms_to_constraints_in_subtree() 167 dns_name::presented_id_matches_constraint(name, base).ok_or(Error::BadDer) in check_presented_id_conforms_to_constraints_in_subtree() 325 _ => return Err(Error::BadDer), in general_name()
|