diff options
author | thekuwayama <thekuwayama@gmail.com> | 2019-11-11 17:55:28 +0900 |
---|---|---|
committer | Samuel Williams <samuel.williams@oriontransfer.co.nz> | 2019-11-11 21:48:47 +0900 |
commit | fccdac6c4b73069d4c3f79ee958c8f4a50d89aad (patch) | |
tree | 72cdc4ce10bca75391c96c8ed1d7b7611a2f83ab | |
parent | 58d17cc794696337e6a78240b0c0be562064b1cd (diff) | |
download | ruby-openssl-fccdac6c4b73069d4c3f79ee958c8f4a50d89aad.tar.gz |
call ASN1Error.new when certificati extension format is invalid
-rw-r--r-- | lib/openssl/x509.rb | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/openssl/x509.rb b/lib/openssl/x509.rb index 9632d459..cf90510c 100644 --- a/lib/openssl/x509.rb +++ b/lib/openssl/x509.rb @@ -99,7 +99,7 @@ module OpenSSL ski_asn1 = ASN1.decode(ext.value_der) if ext.critical? || ski_asn1.tag_class != :UNIVERSAL || ski_asn1.tag != ASN1::OCTET_STRING - raise ASN1::ASN1Error "invalid extension" + raise ASN1::ASN1Error.new("invalid extension") end ski_asn1.value @@ -121,7 +121,7 @@ module OpenSSL aki_asn1 = ASN1.decode(ext.value_der) if ext.critical? || aki_asn1.tag_class != :UNIVERSAL || aki_asn1.tag != ASN1::SEQUENCE - raise ASN1::ASN1Error "invalid extension" + raise ASN1::ASN1Error.new("invalid extension") end key_id = aki_asn1.value.find do |v| @@ -146,7 +146,7 @@ module OpenSSL cdp_asn1 = ASN1.decode(ext.value_der) if cdp_asn1.tag_class != :UNIVERSAL || cdp_asn1.tag != ASN1::SEQUENCE - raise ASN1::ASN1Error "invalid extension" + raise ASN1::ASN1Error.new("invalid extension") end crl_uris = cdp_asn1.map do |crl_distribution_point| |