| { | ||
| "git": { | ||
| "sha1": "5693362c2ecc8ac8315e48caa1facb18c76574db" | ||
| "sha1": "ee434c51053db0d4781e1b290ce9bae63fb8050b" | ||
| }, | ||
| "path_in_vcs": "rcgen" | ||
| } |
+1
-1
@@ -532,3 +532,3 @@ # This file is automatically @generated by Cargo. | ||
| name = "rcgen" | ||
| version = "0.14.6" | ||
| version = "0.14.7" | ||
| dependencies = [ | ||
@@ -535,0 +535,0 @@ "aws-lc-rs", |
+1
-1
@@ -16,3 +16,3 @@ # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO | ||
| name = "rcgen" | ||
| version = "0.14.6" | ||
| version = "0.14.7" | ||
| build = false | ||
@@ -19,0 +19,0 @@ autolib = false |
+2
-2
@@ -1,2 +0,2 @@ | ||
| Copyright (c) 2019-2025 est31 <MTest31@outlook.com> and contributors | ||
| Copyright (c) 2019-2026 est31 <MTest31@outlook.com> and contributors | ||
@@ -15,3 +15,3 @@ Licensed under MIT or Apache License 2.0, | ||
| Copyright (c) 2019-2025 est31 <MTest31@outlook.com> and contributors | ||
| Copyright (c) 2019-2026 est31 <MTest31@outlook.com> and contributors | ||
@@ -18,0 +18,0 @@ Permission is hereby granted, free of charge, to any person obtaining a copy |
+27
-1
@@ -267,4 +267,16 @@ #[cfg(feature = "crypto")] | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| if alg == &PKCS_ECDSA_P521_SHA512 { | ||
| if alg == &PKCS_ECDSA_P521_SHA256 { | ||
| KeyPairKind::Ec(ecdsa_from_pkcs8( | ||
| &signature::ECDSA_P521_SHA256_ASN1_SIGNING, | ||
| &serialized_der, | ||
| rng, | ||
| )?) | ||
| } else if alg == &PKCS_ECDSA_P521_SHA384 { | ||
| KeyPairKind::Ec(ecdsa_from_pkcs8( | ||
| &signature::ECDSA_P521_SHA384_ASN1_SIGNING, | ||
| &serialized_der, | ||
| rng, | ||
| )?) | ||
| } else if alg == &PKCS_ECDSA_P521_SHA512 { | ||
| KeyPairKind::Ec(ecdsa_from_pkcs8( | ||
| &signature::ECDSA_P521_SHA512_ASN1_SIGNING, | ||
@@ -599,2 +611,16 @@ &serialized_der, | ||
| #[cfg(feature = "crypto")] | ||
| impl From<KeyPair> for PrivatePkcs8KeyDer<'static> { | ||
| fn from(val: KeyPair) -> Self { | ||
| val.serialize_der().into() | ||
| } | ||
| } | ||
| #[cfg(feature = "crypto")] | ||
| impl From<KeyPair> for PrivateKeyDer<'static> { | ||
| fn from(val: KeyPair) -> Self { | ||
| Self::from(PrivatePkcs8KeyDer::from(val)) | ||
| } | ||
| } | ||
| /// The key size used for RSA key generation | ||
@@ -601,0 +627,0 @@ #[cfg(all(feature = "crypto", feature = "aws_lc_rs"))] |
+45
-1
@@ -67,2 +67,10 @@ use std::fmt; | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| if self == &PKCS_ECDSA_P521_SHA256 { | ||
| return write!(f, "PKCS_ECDSA_P521_SHA256"); | ||
| } | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| if self == &PKCS_ECDSA_P521_SHA384 { | ||
| return write!(f, "PKCS_ECDSA_P521_SHA384"); | ||
| } | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| if self == &PKCS_ECDSA_P521_SHA512 { | ||
@@ -103,2 +111,6 @@ return write!(f, "PKCS_ECDSA_P521_SHA512"); | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| &PKCS_ECDSA_P521_SHA256, | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| &PKCS_ECDSA_P521_SHA384, | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| &PKCS_ECDSA_P521_SHA512, | ||
@@ -196,4 +208,36 @@ &PKCS_ED25519, | ||
| }; | ||
| /// ECDSA signing using the P-521 curves and SHA-256 hashing as per [RFC 5758](https://tools.ietf.org/html/rfc5758#section-3.2) | ||
| /// | ||
| /// Note that this algorithm is not widely supported, and is not supported in TLS 1.3. | ||
| /// | ||
| /// Only supported with the `aws_lc_rs` backend. | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| pub static PKCS_ECDSA_P521_SHA256: SignatureAlgorithm = SignatureAlgorithm { | ||
| oids_sign_alg: &[EC_PUBLIC_KEY, EC_SECP_521_R1], | ||
| #[cfg(feature = "crypto")] | ||
| sign_alg: SignAlgo::EcDsa(&signature::ECDSA_P521_SHA256_ASN1_SIGNING), | ||
| // ecdsa-with-SHA256 in RFC 5758 | ||
| oid_components: &[1, 2, 840, 10045, 4, 3, 2], | ||
| params: SignatureAlgorithmParams::None, | ||
| }; | ||
| /// ECDSA signing using the P-521 curves and SHA-384 hashing as per [RFC 5758](https://tools.ietf.org/html/rfc5758#section-3.2) | ||
| /// | ||
| /// Note that this algorithm is not widely supported, and is not supported in TLS 1.3. | ||
| /// | ||
| /// Only supported with the `aws_lc_rs` backend. | ||
| #[cfg(feature = "aws_lc_rs")] | ||
| pub static PKCS_ECDSA_P521_SHA384: SignatureAlgorithm = SignatureAlgorithm { | ||
| oids_sign_alg: &[EC_PUBLIC_KEY, EC_SECP_521_R1], | ||
| #[cfg(feature = "crypto")] | ||
| sign_alg: SignAlgo::EcDsa(&signature::ECDSA_P521_SHA384_ASN1_SIGNING), | ||
| // ecdsa-with-SHA384 in RFC 5758 | ||
| oid_components: &[1, 2, 840, 10045, 4, 3, 3], | ||
| params: SignatureAlgorithmParams::None, | ||
| }; | ||
| /// ECDSA signing using the P-521 curves and SHA-512 hashing as per [RFC 5758](https://tools.ietf.org/html/rfc5758#section-3.2) | ||
| /// Currently this is only supported with the `aws_lc_rs` feature | ||
| /// | ||
| /// Only supported with the `aws_lc_rs` backend. | ||
| #[cfg(feature = "aws_lc_rs")] | ||
@@ -200,0 +244,0 @@ pub static PKCS_ECDSA_P521_SHA512: SignatureAlgorithm = SignatureAlgorithm { |
Sorry, the diff of this file is not supported yet