Skip to content

Commit 39580b2

Browse files
committed
Updated dependency
1 parent 83f807a commit 39580b2

File tree

6 files changed

+44
-45
lines changed

6 files changed

+44
-45
lines changed

Cargo.lock

Lines changed: 13 additions & 13 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

examples/client.rs

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,10 @@ use std::{
77

88
use clap::Parser;
99
use rustls::{
10-
CertificateType, ClientConfig, ClientConnection, PeerIdentity, RootCertStore, Stream,
10+
ClientConfig, ClientConnection, RootCertStore, Stream,
1111
client::{ClientCredentialResolver, CredentialRequest},
12-
sign::{CertifiedKey, CertifiedSigner},
12+
crypto::{Credentials, Identity, SelectedCredential},
13+
enums::CertificateType,
1314
};
1415
use rustls_pki_types::{CertificateDer, ServerName};
1516

@@ -46,14 +47,14 @@ fn get_chain(
4647
}
4748

4849
impl ClientCredentialResolver for ClientCertResolver {
49-
fn resolve(&self, server_hello: &CredentialRequest) -> Option<CertifiedSigner> {
50+
fn resolve(&self, server_hello: &CredentialRequest) -> Option<SelectedCredential> {
5051
println!("Server sig schemes: {:?}", server_hello.signature_schemes());
5152
let (chain, signing_key) = get_chain(&self.store, &self.cert_name).ok()?;
5253
if let Some(ref pin) = self.pin {
5354
signing_key.key().set_pin(pin).ok()?;
5455
}
55-
CertifiedKey::new_unchecked(
56-
Arc::new(PeerIdentity::from_cert_chain(chain).ok()?),
56+
Credentials::new_unchecked(
57+
Arc::new(Identity::from_cert_chain(chain).ok()?),
5758
Box::new(signing_key),
5859
)
5960
.signer(server_hello.signature_schemes())

examples/server.rs

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ use std::{
77

88
use clap::Parser;
99
use rustls::{
10-
PeerIdentity, RootCertStore, ServerConfig, ServerConnection, Stream,
10+
RootCertStore, ServerConfig, ServerConnection, Stream,
11+
crypto::{Credentials, Identity, SelectedCredential},
1112
server::{ClientHello, ServerCredentialResolver, WebPkiClientVerifier},
12-
sign::{CertifiedKey, CertifiedSigner},
1313
};
1414
use rustls_cng::{
1515
signer::CngSigningKey,
@@ -53,7 +53,7 @@ pub struct ServerCertResolver {
5353
}
5454

5555
impl ServerCredentialResolver for ServerCertResolver {
56-
fn resolve(&self, client_hello: &ClientHello) -> Result<CertifiedSigner, rustls::Error> {
56+
fn resolve(&self, client_hello: &ClientHello) -> Result<SelectedCredential, rustls::Error> {
5757
println!("Client hello server name: {:?}", client_hello.server_name());
5858
let name = client_hello
5959
.server_name()
@@ -83,12 +83,9 @@ impl ServerCredentialResolver for ServerCertResolver {
8383
.map_err(|_| rustls::Error::NoSuitableCertificate)?;
8484
let certs = chain.into_iter().map(Into::into).collect();
8585

86-
CertifiedKey::new_unchecked(
87-
Arc::new(PeerIdentity::from_cert_chain(certs)?),
88-
Box::new(key),
89-
)
90-
.signer(client_hello.signature_schemes())
91-
.ok_or_else(|| rustls::Error::General("No common schemes".to_owned()))
86+
Credentials::new_unchecked(Arc::new(Identity::from_cert_chain(certs)?), Box::new(key))
87+
.signer(client_hello.signature_schemes())
88+
.ok_or_else(|| rustls::Error::General("No common schemes".to_owned()))
9289
}
9390
}
9491

src/signer.rs

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,9 @@
33
use std::sync::Arc;
44

55
use rustls::{
6-
Error, OtherError, SignatureAlgorithm, SignatureScheme,
7-
sign::{Signer, SigningKey},
6+
crypto::{Signer, SigningKey},
7+
enums::{SignatureAlgorithm, SignatureScheme},
8+
error::{Error, OtherError},
89
};
910
use rustls_pki_types::SubjectPublicKeyInfoDer;
1011
use windows_sys::Win32::Security::Cryptography::{

tests/test_client_server.rs

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,10 @@ mod client {
1111
};
1212

1313
use rustls::{
14-
CertificateType, ClientConfig, ClientConnection, PeerIdentity, RootCertStore, Stream,
14+
ClientConfig, ClientConnection, RootCertStore, Stream,
1515
client::{ClientCredentialResolver, CredentialRequest},
16-
sign::{CertifiedKey, CertifiedSigner},
16+
crypto::{Credentials, Identity, SelectedCredential},
17+
enums::CertificateType,
1718
};
1819
use rustls_pki_types::CertificateDer;
1920

@@ -41,10 +42,10 @@ mod client {
4142
}
4243

4344
impl ClientCredentialResolver for ClientCertResolver {
44-
fn resolve(&self, server_hello: &CredentialRequest) -> Option<CertifiedSigner> {
45+
fn resolve(&self, server_hello: &CredentialRequest) -> Option<SelectedCredential> {
4546
let (chain, signing_key) = get_chain(&self.0, &self.1).ok()?;
46-
CertifiedKey::new_unchecked(
47-
Arc::new(PeerIdentity::from_cert_chain(chain).ok()?),
47+
Credentials::new_unchecked(
48+
Arc::new(Identity::from_cert_chain(chain).ok()?),
4849
Box::new(signing_key),
4950
)
5051
.signer(server_hello.signature_schemes())
@@ -98,17 +99,17 @@ mod server {
9899
};
99100

100101
use rustls::{
101-
PeerIdentity, RootCertStore, ServerConfig, ServerConnection, Stream,
102+
RootCertStore, ServerConfig, ServerConnection, Stream,
103+
crypto::{Credentials, Identity, SelectedCredential},
102104
server::{ClientHello, ServerCredentialResolver, WebPkiClientVerifier},
103-
sign::{CertifiedKey, CertifiedSigner},
104105
};
105106
use rustls_cng::{signer::CngSigningKey, store::CertStore};
106107

107108
#[derive(Debug)]
108109
pub struct ServerCertResolver(CertStore);
109110

110111
impl ServerCredentialResolver for ServerCertResolver {
111-
fn resolve(&self, client_hello: &ClientHello) -> Result<CertifiedSigner, rustls::Error> {
112+
fn resolve(&self, client_hello: &ClientHello) -> Result<SelectedCredential, rustls::Error> {
112113
let name = client_hello
113114
.server_name()
114115
.ok_or_else(|| rustls::Error::NoSuitableCertificate)?;
@@ -131,12 +132,9 @@ mod server {
131132
.map_err(|_| rustls::Error::NoSuitableCertificate)?;
132133
let certs = chain.into_iter().map(Into::into).collect();
133134

134-
CertifiedKey::new_unchecked(
135-
Arc::new(PeerIdentity::from_cert_chain(certs)?),
136-
Box::new(key),
137-
)
138-
.signer(client_hello.signature_schemes())
139-
.ok_or_else(|| rustls::Error::General("No common schemes".to_owned()))
135+
Credentials::new_unchecked(Arc::new(Identity::from_cert_chain(certs)?), Box::new(key))
136+
.signer(client_hello.signature_schemes())
137+
.ok_or_else(|| rustls::Error::General("No common schemes".to_owned()))
140138
}
141139
}
142140

tests/test_sign.rs

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
1-
use rustls::{SignatureAlgorithm, SignatureScheme, sign::SigningKey};
2-
1+
use rustls::{
2+
crypto::SigningKey,
3+
enums::{SignatureAlgorithm, SignatureScheme},
4+
};
35
use rustls_cng::{signer::CngSigningKey, store::CertStore};
46

57
const PFX: &[u8] = include_bytes!("assets/rustls-ec.p12");

0 commit comments

Comments
 (0)