[][src]Enum webpki::Error

pub enum Error {
    BadDER,
    BadDERTime,
    CAUsedAsEndEntity,
    CertExpired,
    CertNotValidForName,
    CertNotValidYet,
    EndEntityUsedAsCA,
    ExtensionValueInvalid,
    InvalidCertValidity,
    InvalidSignatureForPublicKey,
    NameConstraintViolation,
    PathLenConstraintViolated,
    SignatureAlgorithmMismatch,
    RequiredEKUNotFound,
    UnknownIssuer,
    UnsupportedCertVersion,
    UnsupportedCriticalExtension,
    UnsupportedSignatureAlgorithmForPublicKey,
    UnsupportedSignatureAlgorithm,
}

An error that occurs during certificate validation or name validation.

Variants

The encoding of some ASN.1 DER-encoded item is invalid.

The encoding of an ASN.1 DER-encoded time is invalid.

A CA certificate is veing used as an end-entity certificate.

The certificate is expired; i.e. the time it is being validated for is later than the certificate's notAfter time.

The certificate is not valid for the name it is being validated for.

The certificate is not valid yet; i.e. the time it is being validated for is earlier than the certificate's notBefore time.

An end-entity certificate is being used as a CA certificate.

An X.509 extension is invalid.

The certificate validity period (notBefore, notAfter) is invalid; e.g. the notAfter time is earlier than the notBefore time.

The signature is invalid for the given public key.

The certificate violates one or more name constraints.

The certificate violates one or more path length constraints.

The algorithm in the TBSCertificate "signature" field of a certificate does not match the algorithm in the signature of the certificate.

The certificate is not valid for the Extended Key Usage for which it is being validated.

A valid issuer for the certificate could not be found.

The certificate is not a v3 X.509 certificate.

The certificate contains an unsupported critical extension.

The signature's algorithm does not match the algorithm of the public key it is being validated for. This may be because the public key algorithm's OID isn't recognized (e.g. DSA), or the public key algorithm's parameters don't match the supported parameters for that algorithm (e.g. ECC keys for unsupported curves), or the public key algorithm and the signature algorithm simply don't match (e.g. verifying an RSA signature with an ECC public key).

The signature algorithm for a signature is not in the set of supported signature algorithms given.

Trait Implementations

impl Debug for Error
[src]

impl Display for Error
[src]

impl PartialEq<Error> for Error
[src]

This method tests for !=.

impl Copy for Error
[src]

impl Clone for Error
[src]

Performs copy-assignment from source. Read more

impl Error for Error
[src]

This method is soft-deprecated. Read more

Deprecating in 1.33.0

: replaced by Error::source, which can support downcasting

The lower-level cause of this error, if any. Read more

The lower-level source of this error, if any. Read more

Auto Trait Implementations

impl Send for Error

impl Sync for Error

Blanket Implementations

impl<T, U> TryFrom for T where
    T: From<U>, 
[src]

🔬 This is a nightly-only experimental API. (try_from)

The type returned in the event of a conversion error.

impl<T> From for T
[src]

impl<T, U> TryInto for T where
    U: TryFrom<T>, 
[src]

🔬 This is a nightly-only experimental API. (try_from)

The type returned in the event of a conversion error.

impl<T, U> Into for T where
    U: From<T>, 
[src]

impl<T> Borrow for T where
    T: ?Sized
[src]

impl<T> BorrowMut for T where
    T: ?Sized
[src]

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> ToString for T where
    T: Display + ?Sized
[src]

impl<T> ToOwned for T where
    T: Clone
[src]