- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for CertificateInvalidError (0.25 sec)
-
src/crypto/x509/verify.go
CANotAuthorizedForExtKeyUsage ) // CertificateInvalidError results when an odd error occurs. Users of this // library probably want to handle all these errors uniformly. type CertificateInvalidError struct { Cert *Certificate Reason InvalidReason Detail string } func (e CertificateInvalidError) Error() string { switch e.Reason { case NotAuthorizedToSign:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:58:39 UTC 2024 - 35.7K bytes - Viewed (0) -
src/crypto/x509/verify_test.go
} } } func expectExpired(t *testing.T, err error) { if inval, ok := err.(CertificateInvalidError); !ok || inval.Reason != Expired { t.Fatalf("error was not Expired: %v", err) } } func expectUsageError(t *testing.T, err error) { if inval, ok := err.(CertificateInvalidError); !ok || inval.Reason != IncompatibleUsage { t.Fatalf("error was not IncompatibleUsage: %v", err) } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 01:00:11 UTC 2024 - 110.2K bytes - Viewed (0) -
src/crypto/tls/handshake_server.go
} for _, cert := range certs[1:] { opts.Intermediates.AddCert(cert) } chains, err := certs[0].Verify(opts) if err != nil { var errCertificateInvalid x509.CertificateInvalidError if errors.As(err, &x509.UnknownAuthorityError{}) { c.sendAlert(alertUnknownCA) } else if errors.As(err, &errCertificateInvalid) && errCertificateInvalid.Reason == x509.Expired {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 27.6K bytes - Viewed (0)