You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

rcgen

Package Overview
Dependencies
Maintainers
1
Versions
50
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

rcgen - cargo Package Compare versions

Comparing version
0.14.2
to
0.14.3
+1
-1
.cargo_vcs_info.json
{
"git": {
"sha1": "29c9c826d19b29978029a4bffb3ea05950e1cf14"
"sha1": "620e2195d8574bb4d4fd753a3c82fd5eca739b39"
},
"path_in_vcs": "rcgen"
}

@@ -555,3 +555,3 @@ # This file is automatically @generated by Cargo.

name = "rcgen"
version = "0.14.2"
version = "0.14.3"
dependencies = [

@@ -558,0 +558,0 @@ "aws-lc-rs",

@@ -16,3 +16,3 @@ # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO

name = "rcgen"
version = "0.14.2"
version = "0.14.3"
build = false

@@ -19,0 +19,0 @@ autolib = false

@@ -217,5 +217,2 @@ use std::net::IpAddr;

fn write_key_usage(&self, writer: DERWriter) {
// RFC 5280 defines 9 key usages, which we detail in our key usage enum
// We could use std::mem::variant_count here, but it's experimental
const KEY_USAGE_BITS: usize = 9;
if self.key_usages.is_empty() {

@@ -231,3 +228,12 @@ return;

});
writer.write_bitvec_bytes(&bit_string.to_be_bytes(), KEY_USAGE_BITS);
match u16::BITS - bit_string.trailing_zeros() {
bits @ 0..=8 => {
writer.write_bitvec_bytes(&bit_string.to_be_bytes()[..1], bits as usize)
},
bits @ 9..=16 => {
writer.write_bitvec_bytes(&bit_string.to_be_bytes(), bits as usize)
},
_ => unreachable!(),
}
});

@@ -1151,2 +1157,5 @@ }

if key_usage_oid_str == ext.oid.to_id_string() {
// should have the minimal number of octets, and no extra trailing zero bytes
// ref. https://github.com/rustls/rcgen/issues/368
assert_eq!(ext.value, vec![0x03, 0x02, 0x05, 0xe0]);
if let x509_parser::extensions::ParsedExtension::KeyUsage(usage) =

@@ -1153,0 +1162,0 @@ ext.parsed_extension()

@@ -130,3 +130,3 @@ use std::fmt;

/// RSA signing with PKCS#1 1.5 padding and SHA-256 hashing as per [RFC 4055](https://tools.ietf.org/html/rfc4055)
/// RSA signing with PKCS#1 1.5 padding and SHA-384 hashing as per [RFC 4055](https://tools.ietf.org/html/rfc4055)
pub static PKCS_RSA_SHA384: SignatureAlgorithm = SignatureAlgorithm {

@@ -133,0 +133,0 @@ oids_sign_alg: &[RSA_ENCRYPTION],

Sorry, the diff of this file is not supported yet