You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

rcgen

Package Overview
Dependencies
Maintainers
1
Versions
50
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

rcgen - cargo Package Compare versions

Comparing version
0.14.6
to
0.14.7
+1
-1
.cargo_vcs_info.json
{
"git": {
"sha1": "5693362c2ecc8ac8315e48caa1facb18c76574db"
"sha1": "ee434c51053db0d4781e1b290ce9bae63fb8050b"
},
"path_in_vcs": "rcgen"
}

@@ -532,3 +532,3 @@ # This file is automatically @generated by Cargo.

name = "rcgen"
version = "0.14.6"
version = "0.14.7"
dependencies = [

@@ -535,0 +535,0 @@ "aws-lc-rs",

@@ -16,3 +16,3 @@ # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO

name = "rcgen"
version = "0.14.6"
version = "0.14.7"
build = false

@@ -19,0 +19,0 @@ autolib = false

@@ -1,2 +0,2 @@

Copyright (c) 2019-2025 est31 <MTest31@outlook.com> and contributors
Copyright (c) 2019-2026 est31 <MTest31@outlook.com> and contributors

@@ -15,3 +15,3 @@ Licensed under MIT or Apache License 2.0,

Copyright (c) 2019-2025 est31 <MTest31@outlook.com> and contributors
Copyright (c) 2019-2026 est31 <MTest31@outlook.com> and contributors

@@ -18,0 +18,0 @@ Permission is hereby granted, free of charge, to any person obtaining a copy

@@ -267,4 +267,16 @@ #[cfg(feature = "crypto")]

#[cfg(feature = "aws_lc_rs")]
if alg == &PKCS_ECDSA_P521_SHA512 {
if alg == &PKCS_ECDSA_P521_SHA256 {
KeyPairKind::Ec(ecdsa_from_pkcs8(
&signature::ECDSA_P521_SHA256_ASN1_SIGNING,
&serialized_der,
rng,
)?)
} else if alg == &PKCS_ECDSA_P521_SHA384 {
KeyPairKind::Ec(ecdsa_from_pkcs8(
&signature::ECDSA_P521_SHA384_ASN1_SIGNING,
&serialized_der,
rng,
)?)
} else if alg == &PKCS_ECDSA_P521_SHA512 {
KeyPairKind::Ec(ecdsa_from_pkcs8(
&signature::ECDSA_P521_SHA512_ASN1_SIGNING,

@@ -599,2 +611,16 @@ &serialized_der,

#[cfg(feature = "crypto")]
impl From<KeyPair> for PrivatePkcs8KeyDer<'static> {
fn from(val: KeyPair) -> Self {
val.serialize_der().into()
}
}
#[cfg(feature = "crypto")]
impl From<KeyPair> for PrivateKeyDer<'static> {
fn from(val: KeyPair) -> Self {
Self::from(PrivatePkcs8KeyDer::from(val))
}
}
/// The key size used for RSA key generation

@@ -601,0 +627,0 @@ #[cfg(all(feature = "crypto", feature = "aws_lc_rs"))]

@@ -67,2 +67,10 @@ use std::fmt;

#[cfg(feature = "aws_lc_rs")]
if self == &PKCS_ECDSA_P521_SHA256 {
return write!(f, "PKCS_ECDSA_P521_SHA256");
}
#[cfg(feature = "aws_lc_rs")]
if self == &PKCS_ECDSA_P521_SHA384 {
return write!(f, "PKCS_ECDSA_P521_SHA384");
}
#[cfg(feature = "aws_lc_rs")]
if self == &PKCS_ECDSA_P521_SHA512 {

@@ -103,2 +111,6 @@ return write!(f, "PKCS_ECDSA_P521_SHA512");

#[cfg(feature = "aws_lc_rs")]
&PKCS_ECDSA_P521_SHA256,
#[cfg(feature = "aws_lc_rs")]
&PKCS_ECDSA_P521_SHA384,
#[cfg(feature = "aws_lc_rs")]
&PKCS_ECDSA_P521_SHA512,

@@ -196,4 +208,36 @@ &PKCS_ED25519,

};
/// ECDSA signing using the P-521 curves and SHA-256 hashing as per [RFC 5758](https://tools.ietf.org/html/rfc5758#section-3.2)
///
/// Note that this algorithm is not widely supported, and is not supported in TLS 1.3.
///
/// Only supported with the `aws_lc_rs` backend.
#[cfg(feature = "aws_lc_rs")]
pub static PKCS_ECDSA_P521_SHA256: SignatureAlgorithm = SignatureAlgorithm {
oids_sign_alg: &[EC_PUBLIC_KEY, EC_SECP_521_R1],
#[cfg(feature = "crypto")]
sign_alg: SignAlgo::EcDsa(&signature::ECDSA_P521_SHA256_ASN1_SIGNING),
// ecdsa-with-SHA256 in RFC 5758
oid_components: &[1, 2, 840, 10045, 4, 3, 2],
params: SignatureAlgorithmParams::None,
};
/// ECDSA signing using the P-521 curves and SHA-384 hashing as per [RFC 5758](https://tools.ietf.org/html/rfc5758#section-3.2)
///
/// Note that this algorithm is not widely supported, and is not supported in TLS 1.3.
///
/// Only supported with the `aws_lc_rs` backend.
#[cfg(feature = "aws_lc_rs")]
pub static PKCS_ECDSA_P521_SHA384: SignatureAlgorithm = SignatureAlgorithm {
oids_sign_alg: &[EC_PUBLIC_KEY, EC_SECP_521_R1],
#[cfg(feature = "crypto")]
sign_alg: SignAlgo::EcDsa(&signature::ECDSA_P521_SHA384_ASN1_SIGNING),
// ecdsa-with-SHA384 in RFC 5758
oid_components: &[1, 2, 840, 10045, 4, 3, 3],
params: SignatureAlgorithmParams::None,
};
/// ECDSA signing using the P-521 curves and SHA-512 hashing as per [RFC 5758](https://tools.ietf.org/html/rfc5758#section-3.2)
/// Currently this is only supported with the `aws_lc_rs` feature
///
/// Only supported with the `aws_lc_rs` backend.
#[cfg(feature = "aws_lc_rs")]

@@ -200,0 +244,0 @@ pub static PKCS_ECDSA_P521_SHA512: SignatureAlgorithm = SignatureAlgorithm {

Sorry, the diff of this file is not supported yet