#[non_exhaustive]
pub enum Error {
Show 38 variants BadDer, BadDerTime, CaUsedAsEndEntity, CertExpired, CertNotValidForName, CertNotValidYet, CertRevoked, EndEntityUsedAsCa, ExtensionValueInvalid, InvalidCertValidity, InvalidCrlNumber, InvalidNetworkMaskConstraint, InvalidSerialNumber, InvalidCrlSignatureForPublicKey, InvalidSignatureForPublicKey, IssuerNotCrlSigner, MalformedDnsIdentifier, MalformedExtensions, MalformedNameConstraint, MaximumNameConstraintComparisonsExceeded, MaximumPathBuildCallsExceeded, MaximumPathDepthExceeded, MaximumSignatureChecksExceeded, NameConstraintViolation, PathLenConstraintViolated, RequiredEkuNotFound, SignatureAlgorithmMismatch, UnknownIssuer, UnsupportedCertVersion, UnsupportedCriticalExtension, UnsupportedCrlVersion, UnsupportedDeltaCrl, UnsupportedIndirectCrl, UnsupportedRevocationReason, UnsupportedCrlSignatureAlgorithm, UnsupportedSignatureAlgorithm, UnsupportedCrlSignatureAlgorithmForPublicKey, UnsupportedSignatureAlgorithmForPublicKey,
}
Expand description

An error that occurs during certificate validation or name validation.

Variants (Non-exhaustive)§

This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.
§

BadDer

The encoding of some ASN.1 DER-encoded item is invalid.

§

BadDerTime

The encoding of an ASN.1 DER-encoded time is invalid.

§

CaUsedAsEndEntity

A CA certificate is being used as an end-entity certificate.

§

CertExpired

The certificate is expired; i.e. the time it is being validated for is later than the certificate’s notAfter time.

§

CertNotValidForName

The certificate is not valid for the name it is being validated for.

§

CertNotValidYet

The certificate is not valid yet; i.e. the time it is being validated for is earlier than the certificate’s notBefore time.

§

CertRevoked

The certificate, or one of its issuers, has been revoked.

§

EndEntityUsedAsCa

An end-entity certificate is being used as a CA certificate.

§

ExtensionValueInvalid

An X.509 extension is invalid.

§

InvalidCertValidity

The certificate validity period (notBefore, notAfter) is invalid; e.g. the notAfter time is earlier than the notBefore time.

§

InvalidCrlNumber

A CRL number extension was invalid:

  • it was mis-encoded
  • it was negative
  • it was too long
§

InvalidNetworkMaskConstraint

A iPAddress name constraint was invalid:

  • it had a sparse network mask (ie, cannot be written in CIDR form).
  • it was too long or short
§

InvalidSerialNumber

A serial number was invalid:

  • it was misencoded
  • it was negative
  • it was too long
§

InvalidCrlSignatureForPublicKey

The CRL signature is invalid for the issuer’s public key.

§

InvalidSignatureForPublicKey

The signature is invalid for the given public key.

§

IssuerNotCrlSigner

A CRL was signed by an issuer that has a KeyUsage bitstring that does not include the cRLSign key usage bit.

§

MalformedDnsIdentifier

A presented or reference DNS identifier was malformed, potentially containing invalid characters or invalid labels.

§

MalformedExtensions

The certificate extensions are malformed.

In particular, webpki requires the DNS name(s) be in the subjectAltName extension as required by the CA/Browser Forum Baseline Requirements and as recommended by RFC6125.

§

MalformedNameConstraint

A name constraint was malformed, potentially containing invalid characters or invalid labels.

§

MaximumNameConstraintComparisonsExceeded

The maximum number of name constraint comparisons has been reached.

§

MaximumPathBuildCallsExceeded

The maximum number of internal path building calls has been reached. Path complexity is too great.

§

MaximumPathDepthExceeded

The path search was terminated because it became too deep.

§

MaximumSignatureChecksExceeded

The maximum number of signature checks has been reached. Path complexity is too great.

§

NameConstraintViolation

The certificate violates one or more name constraints.

§

PathLenConstraintViolated

The certificate violates one or more path length constraints.

§

RequiredEkuNotFound

The certificate is not valid for the Extended Key Usage for which it is being validated.

§

SignatureAlgorithmMismatch

The algorithm in the TBSCertificate “signature” field of a certificate does not match the algorithm in the signature of the certificate.

§

UnknownIssuer

A valid issuer for the certificate could not be found.

§

UnsupportedCertVersion

The certificate is not a v3 X.509 certificate.

This error may be also reported if the certificate version field is malformed.

§

UnsupportedCriticalExtension

The certificate contains an unsupported critical extension.

§

UnsupportedCrlVersion

The CRL is not a v2 X.509 CRL.

The RFC 5280 web PKI profile mandates only version 2 be used. See section 5.1.2.1 for more information.

This error may also be reported if the CRL version field is malformed.

§

UnsupportedDeltaCrl

The CRL is an unsupported “delta” CRL.

§

UnsupportedIndirectCrl

The CRL contains unsupported “indirect” entries.

§

UnsupportedRevocationReason

The revocation reason is not in the set of supported revocation reasons.

§

UnsupportedCrlSignatureAlgorithm

The signature algorithm for a signature over a CRL is not in the set of supported signature algorithms given.

§

UnsupportedSignatureAlgorithm

The signature algorithm for a signature is not in the set of supported signature algorithms given.

§

UnsupportedCrlSignatureAlgorithmForPublicKey

The CRL signature’s algorithm does not match the algorithm of the issuer public key it is being validated for. This may be because the public key algorithm’s OID isn’t recognized (e.g. DSA), or the public key algorithm’s parameters don’t match the supported parameters for that algorithm (e.g. ECC keys for unsupported curves), or the public key algorithm and the signature algorithm simply don’t match (e.g. verifying an RSA signature with an ECC public key).

§

UnsupportedSignatureAlgorithmForPublicKey

The signature’s algorithm does not match the algorithm of the public key it is being validated for. This may be because the public key algorithm’s OID isn’t recognized (e.g. DSA), or the public key algorithm’s parameters don’t match the supported parameters for that algorithm (e.g. ECC keys for unsupported curves), or the public key algorithm and the signature algorithm simply don’t match (e.g. verifying an RSA signature with an ECC public key).

Trait Implementations§

§

impl Clone for Error

§

fn clone(&self) -> Error

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
§

impl Debug for Error

§

fn fmt(&self, f: &mut Formatter<'_>) -> Result<(), Error>

Formats the value using the given formatter. Read more
§

impl Display for Error

§

fn fmt(&self, f: &mut Formatter<'_>) -> Result<(), Error>

Formats the value using the given formatter. Read more
§

impl Error for Error

1.30.0 · source§

fn source(&self) -> Option<&(dyn Error + 'static)>

The lower-level source of this error, if any. Read more
1.0.0 · source§

fn description(&self) -> &str

👎Deprecated since 1.42.0: use the Display impl or to_string()
1.0.0 · source§

fn cause(&self) -> Option<&dyn Error>

👎Deprecated since 1.33.0: replaced by Error::source, which can support downcasting
source§

fn provide<'a>(&'a self, request: &mut Request<'a>)

🔬This is a nightly-only experimental API. (error_generic_member_access)
Provides type based access to context intended for error reports. Read more
§

impl From<EndOfInput> for Error

§

fn from(_: EndOfInput) -> Error

Converts to this type from the input type.
§

impl PartialEq for Error

§

fn eq(&self, other: &Error) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
§

impl Copy for Error

§

impl Eq for Error

§

impl StructuralEq for Error

§

impl StructuralPartialEq for Error

Auto Trait Implementations§

§

impl RefUnwindSafe for Error

§

impl Send for Error

§

impl Sync for Error

§

impl Unpin for Error

§

impl UnwindSafe for Error

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
§

impl<T> AsOut<T> for T
where T: Copy,

§

fn as_out(&mut self) -> Out<'_, T>

Returns an out reference to self.
§

impl<'a, T, E> AsTaggedExplicit<'a, E> for T
where T: 'a,

§

fn explicit(self, class: Class, tag: u32) -> TaggedParser<'a, Explicit, Self, E>

§

impl<'a, T, E> AsTaggedImplicit<'a, E> for T
where T: 'a,

§

fn implicit( self, class: Class, constructed: bool, tag: u32 ) -> TaggedParser<'a, Implicit, Self, E>

source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

§

fn equivalent(&self, key: &K) -> bool

Checks if this value is equivalent to the given key. Read more
§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

§

fn equivalent(&self, key: &K) -> bool

Compare self to key and return true if they are equal.
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

§

impl<T> Instrument for T

§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided [Span], returning an Instrumented wrapper. Read more
§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> Same for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for T
where T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T> ToString for T
where T: Display + ?Sized,

source§

default fn to_string(&self) -> String

Converts the given value to a String. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

§

fn vzip(self) -> V

§

impl<T> WithSubscriber for T

§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a [WithDispatch] wrapper. Read more
§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a [WithDispatch] wrapper. Read more
source§

impl<T> AnyError for T
where T: Error + Send + Sync + 'static,

§

impl<T> CacheError for T
where T: Error + Send + Sync + 'static,