Skip to content

Commit 646ae33

Browse files
rushilmehraghedo
authored andcommitted
X509Builder::append_extension2 -> X509Builder::append_extension
1 parent 8abba36 commit 646ae33

File tree

4 files changed

+20
-23
lines changed

4 files changed

+20
-23
lines changed

boring/examples/mk_certs.rs

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -43,18 +43,19 @@ fn mk_ca_cert() -> Result<(X509, PKey<Private>), ErrorStack> {
4343
let not_after = Asn1Time::days_from_now(365)?;
4444
cert_builder.set_not_after(&not_after)?;
4545

46-
cert_builder.append_extension(BasicConstraints::new().critical().ca().build()?)?;
46+
cert_builder.append_extension(BasicConstraints::new().critical().ca().build()?.as_ref())?;
4747
cert_builder.append_extension(
4848
KeyUsage::new()
4949
.critical()
5050
.key_cert_sign()
5151
.crl_sign()
52-
.build()?,
52+
.build()?
53+
.as_ref(),
5354
)?;
5455

5556
let subject_key_identifier =
5657
SubjectKeyIdentifier::new().build(&cert_builder.x509v3_context(None, None))?;
57-
cert_builder.append_extension(subject_key_identifier)?;
58+
cert_builder.append_extension(&subject_key_identifier)?;
5859

5960
cert_builder.sign(&privkey, MessageDigest::sha256())?;
6061
let cert = cert_builder.build();
@@ -106,32 +107,33 @@ fn mk_ca_signed_cert(
106107
let not_after = Asn1Time::days_from_now(365)?;
107108
cert_builder.set_not_after(&not_after)?;
108109

109-
cert_builder.append_extension(BasicConstraints::new().build()?)?;
110+
cert_builder.append_extension(BasicConstraints::new().build()?.as_ref())?;
110111

111112
cert_builder.append_extension(
112113
KeyUsage::new()
113114
.critical()
114115
.non_repudiation()
115116
.digital_signature()
116117
.key_encipherment()
117-
.build()?,
118+
.build()?
119+
.as_ref(),
118120
)?;
119121

120122
let subject_key_identifier =
121123
SubjectKeyIdentifier::new().build(&cert_builder.x509v3_context(Some(ca_cert), None))?;
122-
cert_builder.append_extension(subject_key_identifier)?;
124+
cert_builder.append_extension(&subject_key_identifier)?;
123125

124126
let auth_key_identifier = AuthorityKeyIdentifier::new()
125127
.keyid(false)
126128
.issuer(false)
127129
.build(&cert_builder.x509v3_context(Some(ca_cert), None))?;
128-
cert_builder.append_extension(auth_key_identifier)?;
130+
cert_builder.append_extension(&auth_key_identifier)?;
129131

130132
let subject_alt_name = SubjectAlternativeName::new()
131133
.dns("*.example.com")
132134
.dns("hello.com")
133135
.build(&cert_builder.x509v3_context(Some(ca_cert), None))?;
134-
cert_builder.append_extension(subject_alt_name)?;
136+
cert_builder.append_extension(&subject_alt_name)?;
135137

136138
cert_builder.sign(ca_privkey, MessageDigest::sha256())?;
137139
let cert = cert_builder.build();

boring/src/pkcs12.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ mod test {
260260
.unwrap();
261261
builder.set_subject_name(&name).unwrap();
262262
builder.set_issuer_name(&name).unwrap();
263-
builder.append_extension(key_usage).unwrap();
263+
builder.append_extension(&key_usage).unwrap();
264264
builder.set_pubkey(&pkey).unwrap();
265265
builder.sign(&pkey, MessageDigest::sha256()).unwrap();
266266
let cert = builder.build();

boring/src/x509/mod.rs

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -484,16 +484,9 @@ impl X509Builder {
484484
}
485485
}
486486

487-
/// Adds an X509 extension value to the certificate.
488-
///
489-
/// This works just as `append_extension` except it takes ownership of the `X509Extension`.
490-
pub fn append_extension(&mut self, extension: X509Extension) -> Result<(), ErrorStack> {
491-
self.append_extension2(&extension)
492-
}
493-
494487
/// Adds an X509 extension value to the certificate.
495488
#[corresponds(X509_add_ext)]
496-
pub fn append_extension2(&mut self, extension: &X509ExtensionRef) -> Result<(), ErrorStack> {
489+
pub fn append_extension(&mut self, extension: &X509ExtensionRef) -> Result<(), ErrorStack> {
497490
unsafe {
498491
cvt(ffi::X509_add_ext(self.0.as_ptr(), extension.as_ptr(), -1))?;
499492
Ok(())

boring/src/x509/tests/mod.rs

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -250,34 +250,36 @@ fn x509_builder() {
250250
.unwrap();
251251

252252
let basic_constraints = BasicConstraints::new().critical().ca().build().unwrap();
253-
builder.append_extension(basic_constraints).unwrap();
253+
builder
254+
.append_extension(basic_constraints.as_ref())
255+
.unwrap();
254256
let key_usage = KeyUsage::new()
255257
.digital_signature()
256258
.key_encipherment()
257259
.build()
258260
.unwrap();
259-
builder.append_extension(key_usage).unwrap();
261+
builder.append_extension(&key_usage).unwrap();
260262
let ext_key_usage = ExtendedKeyUsage::new()
261263
.client_auth()
262264
.server_auth()
263265
.other("2.999.1")
264266
.build()
265267
.unwrap();
266-
builder.append_extension(ext_key_usage).unwrap();
268+
builder.append_extension(&ext_key_usage).unwrap();
267269
let subject_key_identifier = SubjectKeyIdentifier::new()
268270
.build(&builder.x509v3_context(None, None))
269271
.unwrap();
270-
builder.append_extension(subject_key_identifier).unwrap();
272+
builder.append_extension(&subject_key_identifier).unwrap();
271273
let authority_key_identifier = AuthorityKeyIdentifier::new()
272274
.keyid(true)
273275
.build(&builder.x509v3_context(None, None))
274276
.unwrap();
275-
builder.append_extension(authority_key_identifier).unwrap();
277+
builder.append_extension(&authority_key_identifier).unwrap();
276278
let subject_alternative_name = SubjectAlternativeName::new()
277279
.dns("example.com")
278280
.build(&builder.x509v3_context(None, None))
279281
.unwrap();
280-
builder.append_extension(subject_alternative_name).unwrap();
282+
builder.append_extension(&subject_alternative_name).unwrap();
281283

282284
builder.sign(&pkey, MessageDigest::sha256()).unwrap();
283285

0 commit comments

Comments
 (0)