Home
last modified time | relevance | path

Searched refs:BadDer (Results 1 – 8 of 8) sorted by relevance

/external/rust/crates/webpki/src/
Dder.rs26 ring::io::der::expect_tag_and_get_value(input, tag).map_err(|_| Error::BadDer) in expect_tag_and_get_value()
42 return Err(Error::BadDer); in expect_tag()
52 ring::io::der::read_tag_and_get_value(input).map_err(|_| Error::BadDer) in read_tag_and_get_value()
81 nested(input, Tag::BitString, Error::BadDer, |value| { in bit_string_with_no_unused_bits()
82 let unused_bits_at_end = value.read_byte().map_err(|_| Error::BadDer)?; in bit_string_with_no_unused_bits()
84 return Err(Error::BadDer); in bit_string_with_no_unused_bits()
96 nested(input, Tag::Boolean, Error::BadDer, |input| { in optional_boolean()
100 _ => Err(Error::BadDer), in optional_boolean()
106 ring::io::der::positive_integer(input).map_err(|_| Error::BadDer) in positive_integer()
110 ring::io::der::small_nonnegative_integer(input).map_err(|_| Error::BadDer) in small_nonnegative_integer()
[all …]
Dcert.rs52 let (tbs, signed_data) = cert_der.read_all(Error::BadDer, |cert_der| { in parse_cert_internal()
56 Error::BadDer, in parse_cert_internal()
61 tbs.read_all(Error::BadDer, |tbs| { in parse_cert_internal()
113 Error::BadDer, in parse_cert_internal()
157 return Err(Error::BadDer); in certificate_serial_number()
218 let sequence_value = value.read_all(Error::BadDer, |value| { in remember_extension()
Dtrust_anchor.rs60 Err(Error::UnsupportedCertVersion) => parse_cert_v1(cert_der).or(Err(Error::BadDer)), in try_from_cert_der()
89 cert_der.read_all(Error::BadDer, |cert_der| { in parse_cert_v1()
90 der::nested(cert_der, der::Tag::Sequence, Error::BadDer, |cert_der| { in parse_cert_v1()
91 let anchor = der::nested(cert_der, der::Tag::Sequence, Error::BadDer, |tbs| { in parse_cert_v1()
Dsigned_data.rs178 input.read_all(Error::BadDer, |input| { in parse_spki_value()
405 .read_all(Error::BadDer, |input| { in test_verify_signed_data()
418 .read_all(Error::BadDer, |input| { in test_verify_signed_data()
425 .read_all(Error::BadDer, |input| { in test_verify_signed_data()
464 signature.read_all(Error::BadDer, |input| { in test_verify_signed_data_signature_outer()
485 spki.read_all(Error::BadDer, |input| { in test_parse_spki_bad_outer()
521 Error::BadDer
574 Error::BadDer
579 Error::BadDer
613 Error::BadDer
Dverify_cert.rs64 untrusted::read_all_optional(name_constraints, Error::BadDer, |value| { in build_chain()
110 untrusted::read_all_optional(potential_issuer.name_constraints, Error::BadDer, |value| { in build_chain()
173 .read_all(Error::BadDer, |value| check_validity(value, time))?; in check_issuer_independent_properties()
174 untrusted::read_all_optional(cert.basic_constraints, Error::BadDer, |value| { in check_issuer_independent_properties()
177 untrusted::read_all_optional(cert.eku, Error::BadDer, |value| { in check_issuer_independent_properties()
Derror.rs21 BadDer, enumerator
/external/rust/crates/webpki/src/name/
Dip_address.rs31 return Err(Error::BadDer); in presented_id_matches_constraint()
34 return Err(Error::BadDer); in presented_id_matches_constraint()
42 let (constraint_address, constraint_mask) = constraint.read_all(Error::BadDer, |value| { in presented_id_matches_constraint()
Dverify.rs43 return NameIteration::Stop(Err(Error::BadDer)); in verify_cert_dns_name()
73 let subtrees = der::nested(inner, subtrees_tag, Error::BadDer, |tagged| { in check_name_constraints()
155 general_subtree.read_all(Error::BadDer, |subtree| general_name(subtree)) in check_presented_id_conforms_to_constraints_in_subtree()
167 dns_name::presented_id_matches_constraint(name, base).ok_or(Error::BadDer) in check_presented_id_conforms_to_constraints_in_subtree()
325 _ => return Err(Error::BadDer), in general_name()