aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorthekuwayama <thekuwayama@gmail.com>2019-11-11 17:55:28 +0900
committerSamuel Williams <samuel.williams@oriontransfer.co.nz>2019-11-11 21:48:47 +0900
commitfccdac6c4b73069d4c3f79ee958c8f4a50d89aad (patch)
tree72cdc4ce10bca75391c96c8ed1d7b7611a2f83ab
parent58d17cc794696337e6a78240b0c0be562064b1cd (diff)
downloadruby-openssl-fccdac6c4b73069d4c3f79ee958c8f4a50d89aad.tar.gz
call ASN1Error.new when certificati extension format is invalid
-rw-r--r--lib/openssl/x509.rb6
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/openssl/x509.rb b/lib/openssl/x509.rb
index 9632d459..cf90510c 100644
--- a/lib/openssl/x509.rb
+++ b/lib/openssl/x509.rb
@@ -99,7 +99,7 @@ module OpenSSL
ski_asn1 = ASN1.decode(ext.value_der)
if ext.critical? || ski_asn1.tag_class != :UNIVERSAL || ski_asn1.tag != ASN1::OCTET_STRING
- raise ASN1::ASN1Error "invalid extension"
+ raise ASN1::ASN1Error.new("invalid extension")
end
ski_asn1.value
@@ -121,7 +121,7 @@ module OpenSSL
aki_asn1 = ASN1.decode(ext.value_der)
if ext.critical? || aki_asn1.tag_class != :UNIVERSAL || aki_asn1.tag != ASN1::SEQUENCE
- raise ASN1::ASN1Error "invalid extension"
+ raise ASN1::ASN1Error.new("invalid extension")
end
key_id = aki_asn1.value.find do |v|
@@ -146,7 +146,7 @@ module OpenSSL
cdp_asn1 = ASN1.decode(ext.value_der)
if cdp_asn1.tag_class != :UNIVERSAL || cdp_asn1.tag != ASN1::SEQUENCE
- raise ASN1::ASN1Error "invalid extension"
+ raise ASN1::ASN1Error.new("invalid extension")
end
crl_uris = cdp_asn1.map do |crl_distribution_point|